Secure fine grained access control for telecare medical communication system
Amitesh Kumar Pandit (),
Kakali Chatterjee () and
Ashish Singh ()
Additional contact information
Amitesh Kumar Pandit: National Institute of Technology Patna
Kakali Chatterjee: National Institute of Technology Patna
Ashish Singh: KIIT Deemed to be University
Telecommunication Systems: Modelling, Analysis, Design and Management, 2023, vol. 84, issue 1, No 1, 21 pages
Abstract:
Abstract Modern healthcare institutions are now equipped to provide telecare services because of substantial improvements in telecommunication. Numerous services are provided through the telecare system. For efficient utilization of telecare service, Personal Health Information (PHI) must be shared among various stakeholders. Due to sensitiveness of healthcare data, sharing may create a slew of security and privacy challenges. The Attribute-Based Access Control (ABAC) seems an appropriate cryptographic solution. But, a small amount of healthcare data may reveal a patient’s identity or other information. The minimum amount of PHI sharing is recommended to maintain an individual’s privacy. However, the existing ABAC does not support partial access control on PHI. They either allow access to the entire PHI or restrict it completely. To achieve this finest level of access control, if ABAC applies on each data attribute separately, it will increase computation and communication overhead. Therefore, existing ABAC protocols are unsuitable for a Telecare Medical Communication System (TMCS). The paper proposes a fine-grain access control framework for TMCS based on Multi-authority Attribute Based Access Control. It provides partial access control over PHI and assures the security and privacy of PHI. During the PHI access phase, multiple attribute authorities perform most of the computation simultaneously, increasing the present scheme’s efficiency and scalability. Further, symmetric bilinear pairing enhances its efficiency and makes it suitable for resource constraint environments. The k-out-of-n oblivious transfer protocol hides the data access pattern and maintains privacy. Security analysis proves that the present scheme is secure under the hardness of the discrete logarithm problem and the Decisional Bilinear Diffie–Hellman assumption.
Keywords: TMCS; Access control; MABAC; Bilinear Diffie–Hellman; PHI sharing; ABAC; Symmetric bilinear pairing; Patient centric access control (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
http://link.springer.com/10.1007/s11235-023-01033-1 Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:84:y:2023:i:1:d:10.1007_s11235-023-01033-1
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235
DOI: 10.1007/s11235-023-01033-1
Access Statistics for this article
Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan
More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().