Secure role-based access control over outsourced EMRs against unwanted leakage

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Along with large scale deployment of electronic medical record systems, huge amount of health data is collected. To protect the sensitive information, it must be securely stored and accessed. Considering secure storage on cloud servers, we summary a series of attack behaviors and present the security model against many types of unwanted privacy leakage. In this model, the privacy of unleaked medical records is guaranteed, and the influences of privacy leakage are confined in a strict manner. We also propose a role-based access control scheme for hierarchical healthcare organizations to achieve flexible access on these private records. One can access medical records only if his role satisfies the defined access policy, which implies a fine-grained access control. Theoretical and experimental analyses show the efficiency of our scheme in terms of computation and communication.

Cite

CITATION STYLE

APA

Zhou, X., Chen, J., Zhang, Z., Liu, J., & Wu, Q. (2017). Secure role-based access control over outsourced EMRs against unwanted leakage. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10581 LNCS, pp. 411–426). Springer Verlag. https://doi.org/10.1007/978-3-319-69471-9_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free