Skip to main content

Apply Lagrange Interpolation Based Access Control Mechanism in Personal Health Record Medical System

  • Conference paper
  • First Online:
  • 1118 Accesses

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 97))

Abstract

This study applied a Lagrange Interpolation based access control mechanism in the cloud Personal Health Record (PHR) system. We proposed an access control mechanism to make sure that health care information sharing is secure through the public key cryptosystem and Lagrange interpolation. Additionally, the access authority and the privacy setting have to be confined severely when we consider personal health records and private information. The PHR ought to prevent unauthorized users on the top of providing users with the access authority. As a result, we analyzed the mechanism’s security of the network attackers. On the basis of our analysis consequent, the access control and key management mechanism that we proposed can protect the health care information which can be shared among medical institutions efficiently and effectively.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. U.S. Department of health and human services personal health records and the HIPAA privacy rule (2008). http://www.hhs.gov

  2. Shete, S.S., Kulkarni, C.S.: Database security using role-based access control system. Int. J. Eng. Sci. Comput. 6(6), 8047-5053 (2016)

    Google Scholar 

  3. Karimi, F., Esmaeilpour, M.: A dynamic media access control protocol for controlling congestion in wireless sensor network by using fuzzy logic system and learning automata. Int. J. Comput. Sci. Inf. Secur. 14(4), 445–460 (2016)

    Google Scholar 

  4. Onarliogluamd, K., Robertson, W.: Overhaul: input-driven access control for better privacy on traditional operating systems. In: International Conference on Dependable Systems and Networks, pp. 443–454 (2016)

    Google Scholar 

  5. Xiao, P., He, J.H., Fu, Y.F.: Distributed group key management in wireless mesh networks. Int. J. Secur. Appl. 6(2), 115–120 (2012)

    Google Scholar 

  6. Bogaerts, J., Lagaisse, B., Joosen, W.: Idea: supporting policy-based access control on database systems. In: International Symposium on Engineering Secure Software and Systems, pp. 251–259 (2016)

    Google Scholar 

  7. Rathore, N.C., Tripathy, S.: A trust-based collaborative access control model with policy aggregation for online social networks. Soc. Netw. Anal. Min. 7, 7 (2017)

    Article  Google Scholar 

  8. Kongsgard, K.W., Nordbotten, N.A., Mancini, F., Engelstad, P.E.: Data loss prevention based on text classification in controlled environments. In: International Conference on Information Systems Security, pp. 131–150 (2016)

    Chapter  Google Scholar 

  9. Zhang, P., et al.: FHIRChain: applying block chain to securely and scalable share clinical data. Comput. Struct. Biotechnol. J. 16, 267–278 (2018)

    Article  Google Scholar 

  10. Thummavet, P., Vasupongayya, S.: Privacy-preserving emergency access control for personal health records. Int. J. Sci. Technol. 9(1), 108–120 (2015)

    Google Scholar 

  11. Mehrabian, A.R., Khorasani, K.: Distributed formation recovery control of heterogeneous multiagent euler-lagrange systems subject to network switching and diagnostic imperfections. IEEE Trans. Control Syst. Technol. 24(6), 2158–2166 (2016)

    Article  Google Scholar 

  12. Liu, Y.C.: Leaderless consensus for multiple euler-lagrange systems with event-triggered communication. In: IEEE International Conference on Systems, Man, and Cybernetics (SMC), October 2018

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kuang-Yen Tai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tai, KY., Chiang, DL., Chuang, CY., Chen, TS., Lin, F.YS. (2020). Apply Lagrange Interpolation Based Access Control Mechanism in Personal Health Record Medical System. In: Barolli, L., Hellinckx, P., Enokido, T. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2019. Lecture Notes in Networks and Systems, vol 97. Springer, Cham. https://doi.org/10.1007/978-3-030-33506-9_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-33506-9_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-33505-2

  • Online ISBN: 978-3-030-33506-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics