Secure Access Control Realization Based on Self-Sovereign Identity for Cloud CDM

نویسندگان

چکیده

Public healthcare has transformed from treatment to preventive care and disease management. The Common Data Model (CDM) provides a standard data structure defined utilize hospitals’ data. Digital identity takes significant role as the body of information about an individual used by computer systems identify establish trust among organizations. CDM research network, composed users handling medical information, several digital identities associated with their activity. A high central authority cost can be reduced Distributed Ledger Technology (DLT). It enables control independently third party. To preserve privacy researchers in clinical studies, secure identification is main concern identifying researcher its agents. do so, they should pose legally verifiable credential cloud CDM. By presenting proof represented capability that user has, each access linked authentication verify. Assurance one’s confirmed asserting claims capability, providing entity This paper describes user-centric claim-based operation model based on use cases handle In this model, credentials are designed presented them SPs provide well-controlled CDM, we build prototype management system.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

The evolution of cloud computing is driving the next generation of diagnostic imaging (DI) systems. Migrating DI systems to cloud platform is cost-effective and improves the quality of DI services. However, a major challenge is managing the identity of various participants (users, devices, applications) and ensuring that all service providers offer equivalent access control in cloud ecosystem. ...

متن کامل

Trust-Based Access Control for Secure Cloud Computing

Multi-tenancy, elasticity and dynamicity pose several novel challenges for access control in a cloud environment. Accessing subjects may dynamically change, resources requiring protection may be created or modified, and subject access requirements to resources may change during the course of the application execution. Users may need to acquire different permissions from different administrative...

متن کامل

Access Control Management for Secure Cloud Storage

With the widespread success and adoption of cloud-based solutions, we are witnessing an ever increasing reliance on external providers for storing and managing data. This evolution is greatly facilitated by the availability of solutions typically based on encryption ensuring the confidentiality of externally outsourced data against the storing provider itself. Selective application of encryptio...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

A Secure Access Control system in Cloud

Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients' control over access to their own PHRs, i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2022

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app12199833