IEEE Access (Jan 2024)

Secure Healthcare Access Control System (SHACS) for Anomaly Detection and Enhanced Security in Cloud-Based Healthcare Applications

  • S. K. B. Sangeetha,
  • C. Selvarathi,
  • Sandeep Kumar Mathivanan,
  • Jaehyuk Cho,
  • Sathishkumar Veerappampalayam Easwaramoorthy

DOI
https://doi.org/10.1109/ACCESS.2024.3492024
Journal volume & issue
Vol. 12
pp. 164543 – 164559

Abstract

Read online

The growing reliance on distributed cloud technology in mobile healthcare applications has introduced critical challenges in ensuring secure and efficient access to Electronic Health Records (EHR). Traditional methods have prolonged authentication times and access delays, compromising both the efficiency and security of healthcare systems. To address these issues, this study proposes the Secure Healthcare Access Control System (SHACS), a robust framework specifically designed to enhance security and efficiency in healthcare environments. SHACS provides a sophisticated combination of role-based access control, attribute-based policies, and dynamic rules to streamline authentication processes and safeguard data access. SHACS architecture provides the central authority and system authorities, responsible for enforcing access control policies and verifying the authenticity of users requesting access to medical records. SHACS also integrates real-time anomaly detection capabilities, utilizing the MIMIC-III dataset to identify and respond to unusual access patterns, thereby mitigating potential security breaches. Following successful authentication, SHACS generates secure decryption tokens and keys, enabling swift and secure access to EHRs while continuously updating a dynamic access list to monitor and reduce access delays. Experimental results demonstrate that SHACS significantly improves system performance, reducing authentication times by 30% and access delays by 25% compared to traditional methods. For instance, SHACS decreased the average authentication time from 40 seconds to 28 seconds and enhanced system responsiveness, lowering average access delays from 15 seconds to 11 seconds. The implementation of SHACS underscores the importance of privacy-enhancing technologies in safeguarding medical records, ensuring that only authorized personnel access sensitive data. Through rigorous testing and analysis, SHACS proves its efficacy in strengthening the security posture of cloud-based healthcare systems, ultimately contributing to the quality and accessibility of remote healthcare services.

Keywords