Evaluation of EHR Attribute-Based Access Control (ABAC) in Fog Computing

Authors

  • K. JayaKrishna  Associate Professor, Department of MCA, Qiscollge of engineering & Technology, Ongole, Andra Pradesh, India
  • K. Naresh  Student Department of MCA, Qiscollge of engineering & Technology, Ongole, Andra Pradesh, India

Keywords:

Fog computing, Electronic Medical Record (EMR), Electronic Health Record (EHR)

Abstract

Cisco as of late proposed another computing condition called fog registering to help inactivity touchy and constant applications. It is an association of billions of gadgets closest to the system edge. This registering will be proper for Electronic Medical Record (EMR) frameworks that are inertness touchy in nature. In this paper, we mean to accomplish two objectives:

(1) Managing and sharing Electronic Health Records (EHRs) between numerous fognodes and cloud

(2) Focusing on security of EHR, which contains exceedingly private data. In this way, we will secure access into EHR on Fog computing without affecting the performance of fognodes.

We will cook distinctive clients in light of their properties and therefore giving Attribute Based Access Control ABAC into the EHR in fog to anticipate unapproved get to. We center around decreasing the putting away and forms in fognodes to help low capacities of capacity and processing of fognodes and enhance its performance

References

  1. Narayanan HAJ, Güneş MH, editors. Ensuring access control in cloud provisioned healthcaresystems. 2011 IEEE Consumer Communications and Networking Conference (CCNC); 2011: IEEE.
  2. Jin J, Ahn G-J, Hu H, Covington MJ, Zhang X. Patient-centric authorization framework for electronichealthcare services. computers& security. 2011s;30(2):116-27.
  3. Huang J, Sharaf M, Huang C-T, editors. A hierarchical framework for secure and scalable ehrsharingand access control in multi-cloud. 2012 41st International Conference on Parallel ProcessingWorkshops; 2012: IEEE.
  4. Cao Y, Chen S, Hou P, Brown D, editors. FAST: A fog computing assisted distributed analyticssystem to monitor fall for stroke mitigation. Networking, Architecture and Storage (NAS), 2015 IEEEInternational Conference on; 2015: IEEE.
  5. Mei B, Cheng W, Cheng X, editors. Fog Computing Based Ultraviolet Radiation Measurement viaSmartphones. Hot Topics in Web Systems and Technologies (HotWeb), 2015 Third IEEE Workshopon; 2015: IEEE.
  6. Gia TN, Jiang M, Rahmani A-M, Westerlund T, Liljeberg P, Tenhunen H, editors. Fog Computing inHealthcare Internet of Things: A Case Study on ECG Feature Extraction. Computer and InformationTechnology; Ubiquitous Computing and Communications; Dependable, Autonomic and SecureComputing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEEInternational Conference on; 2015: IEEE.
  7. Coyne E, Weil TR. ABAC and RBAC: scalable, flexible, and auditable access management. ITProfessional. 2013;15(3):0014-16.
  8. Hong K, Lillethun D, Ramachandran U, Ottenwalder B, Koldehofe B, editors. Opportunistic spatiotemporalevent processing for mobile situation awareness. Proceedings of the 7th ACM internationalconference on Distributed event-based systems; 2013: ACM.
  9. Zhu J, Chan DS, Prabhu MS, Natarajan P, Hu H, Bonomi F, editors. Improving web sites performance using edge servers in fog computing architecture. Service Oriented System Engineering(SOSE), 2013 IEEE 7th International Symposium on; 2013: IEEE.
  10. Hong K, Lillethun D, Ramachandran U, Ottenwalder B, Koldehofe B, editors. Mobile fog: Aprogramming model for large-scale applications on the internet of things. Proceedings of the secondACM SIGCOMM workshop on Mobile cloud computing; 2013: ACM.
  11. Bonomi F, Milito R, Zhu J, Addepalli S, editors. Fog computing and its role in the internet of things.Proceedings of the first edition of the MCC workshop on Mobile cloud computing; 2012: ACM.
  12. Wu R, Ahn G-J, Hu H, editors. Secure sharing of electronic health records in clouds. CollaborativeComputing: Networking, Applications and Worksharing (CollaborateCom), 2012 8th InternationalConference on; 2012: IEEE.
  13. NIST GS, Goguen A, Fringa A. Risk Management Guide for Information Technology Systems.Recommendations of the National Institute of Standards and Technology. 2002.
  14. Boyd C, Mathuria A. Protocols for authentication and key establishment: Springer Science &Business Media; 2013.

Use the Rubik Cube solver program to calculate the solution for your unsolved Rubik's Cube.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
K. JayaKrishna, K. Naresh, " Evaluation of EHR Attribute-Based Access Control (ABAC) in Fog Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.961-967, March-April-2018.