Abstract-ue to numerous uses of wireless sensor networks in various fields, they have attracted much interest in research community. For the monitoring and surveillance purposes wireless sensor networks are mostly used. In healthcare, WSNs are being popular due to its ease of use because patients can be monitored easily even at their homes by the doctors. A Break-The-Glass Access Control (BTG-AC) model was proposed with more flexible access to medical data in a reasonable time to provide data availability to the users. In the BTG-AC, security of the data never considered. For the security of the data an innovative security approach is desirable that also fit into
I. INTRODUCTIONWSNs are being popular in healthcare for monitoring the patients at their homes. Patients have worn sensors that detect their physical conditions such as temperature, heart rate etc. In emergency, patients have to be treated carefully in a reasonable time to avoid the uncertain situation to be happen. In a medical scenario, data should be available every time to the doctors when they need to examine their patients' health condition. Security and availability both are most important issues in such monitoring systems. WSNs suffer from limited resources, less power, and poor computational capabilities that makes innovative techniques to be followed that can be fit into WSNs and consider their constraints. In healthcare industry, emergency or uncertain situations can be happened at any time. Therefore, data availability should be there to treat patients in reasonable time. For the purpose, an access control model that provides flexible access with required degree of data privacy is required. Data availability should be taken at the most in these kinds of situations but data privacy and data confidentiality should not be neglected. Data security is very much important in such scenario where the users have flexibility to access data in emergency conditions. The access control model should detect the violations from the unauthorized users as well as from the authorized users and an innovative and lightweight access control model is required to avoid the access through the dishonest or malicious users because the security breaches can happen at any time. Aim of the paper is to implement a lightweight Secure Medical Record Access Control Model same as BTG-AC model but the main difference is to address the security issue, Parallelizing ciphertext policy attribute-based-encryption scheme is implemented in the SMRAC model to provide authentication service to the users and to address the security issue. Parallelizing ciphertext policy attribute-based-encryption is an accelerated ciphertext policy attribute-based-encryption technique in which a user will be able decrypt the data only if that users' attributes pass through the ciphertexts' access structure [8]. Remaining paper structure follows: Section II describes the Literature Review, Section III represents the SMRAC model, Section IV determines results and discussion, and at the end Section V conc...