2018
DOI: 10.4108/eai.20-3-2018.154370
|View full text |Cite
|
Sign up to set email alerts
|

Fine-Grained Access Control for Smart Healthcare Systems in the Internet of Things

Abstract: There has been tremendous growth in the application of the Internet of Things (IoT) in our daily lives. Yet with this growth has come numerous security concerns and privacy challenges for both the users and the systems. Smart devices have many uses in a healthcare system, e.g. collecting and reporting patient data and controlling the administration of treatment. In this paper, we address the specific security issue of access control for smart healthcare systems and the protection of smart things from unauthori… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
3
1

Relationship

3
7

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 32 publications
0
7
0
Order By: Relevance
“…In a centralized IIoT system, a user's confidential data are stored inside a traditional server,; however, in the case of a large-scale IIoT system, sensitive information can also be stored in distributed locations. Therefore, IIoT systems experence issues, e.g., protecting business's confidential information and individual confidential information [105,106] One of the common ways to get a user's confidential and private information (e.g., username, password, bank details, etc.) unlawfully is a phishing attack.…”
Section: Security Issue 8-data Confidentialitymentioning
confidence: 99%
“…In a centralized IIoT system, a user's confidential data are stored inside a traditional server,; however, in the case of a large-scale IIoT system, sensitive information can also be stored in distributed locations. Therefore, IIoT systems experence issues, e.g., protecting business's confidential information and individual confidential information [105,106] One of the common ways to get a user's confidential and private information (e.g., username, password, bank details, etc.) unlawfully is a phishing attack.…”
Section: Security Issue 8-data Confidentialitymentioning
confidence: 99%
“…It typically demands precise user assignment to specific roles and holds only pre-defined, including static, policies. In an IoT context, this is difficult given the high dynamics (for both users and devices) present in the system [17].…”
Section: Motivation and Problem Statementmentioning
confidence: 99%
“…The solution proposed by the developers of the mHealth application [22] is also quite similar to ours, the main differences being that its policy engine is deployed as part of the cloud services and the engine is an implementation of the NIST NGAC framework, with the evaluation process based on traversing a Neo4j graph database. The infrastructure and principle designed by Ray, I et al [27] also have similar features, with policy enforcement based on the XACML format.…”
Section: Related Workmentioning
confidence: 99%