EAI Endorsed Transactions on Scalable Information Systems (Jul 2019)

Privacy-Preserving Data Sharing using Multi-layer Access Control Model in Electronic Health Environment

  • Shekha Chenthara,
  • Khandakar Ahmed,
  • Frank Whittaker

DOI
https://doi.org/10.4108/eai.13-7-2018.159356
Journal volume & issue
Vol. 6, no. 22

Abstract

Read online

Electronic Health Data (EHD) is an emerging health information exchange model that facilitates healthcareproviders and patients to efficiently store and share their private healthcare information from any place and at any time as per demand. Generally, Cloud services provide the infrastructure by reducing the cost of storing, processing and updating information with improved efficiency and quality. However, the privacy of Electronic Health Records (EHR) is a significant hurdle while outsourcing private health data in the cloud because there is a higher peril of leaking health information to unauthorized parties. Several existing techniques are able to analyse the security and privacy issues associated with e-healthcare services. These methods are designed for single database, or databases, with an authentication centre and thus cannot adequately protect the data frominsider attacks. Therefore, this research study mainly focusses on how to ensure the patient privacy whilesharing the sensitive data between same or different organisations as well as healthcare providers in a cloudenvironment. This paper proposes a multi-layer access control mechanism named MLAC Model to construct asecure and privacy-preserving EHR system that enables patients to share their data with stakeholders. In this paper, we use a Dual layer access control model named Pseudo-Role Attribute based access control (PR-ABAC) mechanism that integrates attributes with roles for the secure sharing of EHR between multiple collaborators. The proposed framework also uses the concept of Provenance to ensure the Integrity of patient data. This work is expected to provide a foundation for developing security solutions against cyber-attacks, and thus contribute to the robustness of healthcare information sharing environments.

Keywords