Abstract
This study applied a Lagrange Interpolation based access control mechanism in the cloud Personal Health Record (PHR) system. We proposed an access control mechanism to make sure that health care information sharing is secure through the public key cryptosystem and Lagrange interpolation. Additionally, the access authority and the privacy setting have to be confined severely when we consider personal health records and private information. The PHR ought to prevent unauthorized users on the top of providing users with the access authority. As a result, we analyzed the mechanism’s security of the network attackers. On the basis of our analysis consequent, the access control and key management mechanism that we proposed can protect the health care information which can be shared among medical institutions efficiently and effectively.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
U.S. Department of health and human services personal health records and the HIPAA privacy rule (2008). http://www.hhs.gov
Shete, S.S., Kulkarni, C.S.: Database security using role-based access control system. Int. J. Eng. Sci. Comput. 6(6), 8047-5053 (2016)
Karimi, F., Esmaeilpour, M.: A dynamic media access control protocol for controlling congestion in wireless sensor network by using fuzzy logic system and learning automata. Int. J. Comput. Sci. Inf. Secur. 14(4), 445–460 (2016)
Onarliogluamd, K., Robertson, W.: Overhaul: input-driven access control for better privacy on traditional operating systems. In: International Conference on Dependable Systems and Networks, pp. 443–454 (2016)
Xiao, P., He, J.H., Fu, Y.F.: Distributed group key management in wireless mesh networks. Int. J. Secur. Appl. 6(2), 115–120 (2012)
Bogaerts, J., Lagaisse, B., Joosen, W.: Idea: supporting policy-based access control on database systems. In: International Symposium on Engineering Secure Software and Systems, pp. 251–259 (2016)
Rathore, N.C., Tripathy, S.: A trust-based collaborative access control model with policy aggregation for online social networks. Soc. Netw. Anal. Min. 7, 7 (2017)
Kongsgard, K.W., Nordbotten, N.A., Mancini, F., Engelstad, P.E.: Data loss prevention based on text classification in controlled environments. In: International Conference on Information Systems Security, pp. 131–150 (2016)
Zhang, P., et al.: FHIRChain: applying block chain to securely and scalable share clinical data. Comput. Struct. Biotechnol. J. 16, 267–278 (2018)
Thummavet, P., Vasupongayya, S.: Privacy-preserving emergency access control for personal health records. Int. J. Sci. Technol. 9(1), 108–120 (2015)
Mehrabian, A.R., Khorasani, K.: Distributed formation recovery control of heterogeneous multiagent euler-lagrange systems subject to network switching and diagnostic imperfections. IEEE Trans. Control Syst. Technol. 24(6), 2158–2166 (2016)
Liu, Y.C.: Leaderless consensus for multiple euler-lagrange systems with event-triggered communication. In: IEEE International Conference on Systems, Man, and Cybernetics (SMC), October 2018
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Tai, KY., Chiang, DL., Chuang, CY., Chen, TS., Lin, F.YS. (2020). Apply Lagrange Interpolation Based Access Control Mechanism in Personal Health Record Medical System. In: Barolli, L., Hellinckx, P., Enokido, T. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2019. Lecture Notes in Networks and Systems, vol 97. Springer, Cham. https://doi.org/10.1007/978-3-030-33506-9_29
Download citation
DOI: https://doi.org/10.1007/978-3-030-33506-9_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33505-2
Online ISBN: 978-3-030-33506-9
eBook Packages: EngineeringEngineering (R0)