2023
DOI: 10.1109/access.2023.3335984
|View full text |Cite
|
Sign up to set email alerts
|

An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment

Ateeq Ur Rehman Butt,
Tariq Mahmood,
Tanzila Saba
et al.

Abstract: In today's world, services are improved and advanced in every field of life. Especially in the health sector, information technology (IT) plays a vigorous role in electronic health (e-health). To achieve benefits from e-health, its cloud-based implementation is necessary. With this environment's multiple benefits, privacy and security loopholes exist. As the number of users grows, the Electronic Healthcare System's (EHS) response time becomes slower. This study presented a trust mechanism for access control (A… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 52 publications
0
5
0
Order By: Relevance
“…The negative impact of implementation challenges on RBAC's effectiveness (H2) underscores the nuanced barriers organizations face, especially the administrative and technical hurdles that can diminish the system's efficacy. This complexity resonates with the challenges highlighted by existing studies on RBAC implementation [59] [26] [33].…”
Section: Discussionmentioning
confidence: 83%
See 2 more Smart Citations
“…The negative impact of implementation challenges on RBAC's effectiveness (H2) underscores the nuanced barriers organizations face, especially the administrative and technical hurdles that can diminish the system's efficacy. This complexity resonates with the challenges highlighted by existing studies on RBAC implementation [59] [26] [33].…”
Section: Discussionmentioning
confidence: 83%
“…Although scholars laud RBAC for its effectiveness in mitigating insider threats [26][32] [33], it is not devoid of challenges, as studies argue that the complexity of defining and managing roles can be a significant barrier, especially in large and dynamic organizations. There is also an ongoing debate about the potential for RBAC to become too restrictive, hindering operational efficiency.…”
Section: Rbac's Role In Mitigating Insider Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, with a cloud-based healthcare system, the role of 'Doctor' might have scoped access corresponding to its specialization, the 'Nurse' might have access rights that suit their duties, and the 'Administrator' might have admin access for managing the healthcare system. Its architecture matches the compliance requirements because it can put up with the development of distinct requirements, which are usually dependent on information security standards such as HIPAA or GDPR [2]. RBAC categorizes permissions according to roles and, as a result, offers a practical, scalable, and safe hierarchical structure for user authorizations in the cloud.…”
Section: Role-based Access Control (Rbac) In Cloud Storagementioning
confidence: 99%
“…RBAC's identified risk mitigation method is the effective way of accessing unintended data among multiple entities storing data in the cloud [1]. An essential aspect of the RBAC model is a structure adopting an approach based on the user roles, which rotates around the permit issuing and auditing [2]. The different phenomena in the case of traits-based access control (ABAC) are more of a dynamic and sophisticated model of authorization that confers access rights upon the features of the users and the environmental attributes [3].…”
Section: Introductionmentioning
confidence: 99%