Attribute-based Access Control Model in Healthcare Systems with Blockchain Technology
نویسندگان
چکیده
Blockchain and the healthcare sector have a serious concern with context to scalability, which has challenge of converting arbitrary values fixed values. The transfer data coming from diverse resources another point in blockchain. In this paper, author proposed model that will receive sources convert it type value. paper also proposes an access control scheme various permission consensus level protocols allow reduction block size respect scalability. individual or group users each via considering granted nodes addition levels only restricted pass model. Once is verified approved by levels, then all set be part introduces where time taken create new hash 0.15625 microseconds. A total number 64 transactions throughput calculated for are considered. After applying formula, 32.5 By lighter can made available patients. research patients so they keep track their medical history deaths due overdose medicines reduced.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملBlockchain Based Access Control
Access Control systems are used in computer security to regulate the access to critical or valuable resources. The rights of subjects to access such resources are typically expressed through access control policies, which are evaluated at access request time against the current access context. This paper proposes a new approach based on blockchain technology to publish the policies expressing t...
متن کاملA combination of semantic and attribute-based access control model for virtual organizations
A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...
متن کاملRole-Attribute-Based Encryption (RABE) Access Control for Healthcare Cloud Systems
J u n e , 2 0 1 6 w w w . c i r w o r l d . c o m Role-Attribute-Based Encryption (RABE) Access Control for Healthcare Cloud Systems Monica Suleiman, Paolina Centonze 1 Research Scholar, Department of Computer Science, Iona College 715 North Avenue, New Rochelle NY 10801 [email protected] 2 Professor, Department of Computer Science, Iona College 715 North Avenue, New Rochelle NY 10801 p...
متن کاملAttribute-Based Oblivious Access Control
In an attribute-based system (ABS), users are identified by various attributes, instead of their identities. Since its seminal introduction, the attribute-based mechanism has attracted a lot of attention. However, current ABS schemes have a number of drawbacks: (i) the communication cost is linear in the number of the required attributes; (ii) the computation cost is linear in the number of the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2023
ISSN: ['2158-107X', '2156-5570']
DOI: https://doi.org/10.14569/ijacsa.2023.0140584