Abstract
This paper proposes a secure data access control framework that utilizes the attribute values and the user specific usage details to provide secure and fine-grained data access. It aims to minimize the data leakage during data retrieval which is a critical challenge for handling health data. No standard data retrieval policies are in place for preserving the privacy of medical data though any data breach may have a disastrous effect on society. In our proposed framework data is divided into different segments based on data sensitivity and data utility and users are authorized based on attribute details. An Integer Linear Programming (ILP) based solution is designed here to optimize the amount of information a user can retrieve from the application while minimizing the data leakage. The data storage technique and the user authorization technique complement each other to decide upon access to the portion of the information available to that particular user. An experimental result shows the sensitivity score calculation of the data items, ILP based privilege value assignment of the users and data retrieval strategy to minimize data leakage. The technique is validated on the benchmark datasets. The results show the utility of the sensitivity score of the data items and user privilege values while ensuring faster data retrieval time as compared to state-of-the-art works.
Similar content being viewed by others
References
Abdulghani HA, Nijdam NA, Collen A, Konstantas D (2019) A study on security and privacy guidelines, countermeasures, threats: IoT data at rest perspective. Symmetry 11(6):774
Azeez NA, Van der Vyver C (2018) Security and privacy issues in e-health cloud-based system: A comprehensive content analysis, Egyptian Informatics Journal. https://doi.org/10.1016/j.eij.2018.12.001
Barua M, Liang X, Lu R, Shen X (2011) ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing. Int J Security Netw 6(2–3):67–76. https://doi.org/10.1504/IJSN.2011.043666
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on security and privacy (SP’07). IEEE
Bhatt CA, Kankanhalli MS (2011) Multimedia data mining: state of the art and challenges. Multimed Tools Appl 51:35–76
Celikel E, Kantarcioglu M, Thuraisingham B, Bertino E (2009) A risk management approach to RBAC. Risk Decis Anal 1(2):21–33
Chadwick DW, Fatema K (2012) A privacy preserving authorisation system for the cloud. J Comput Syst Sci 78(5):13591373. https://doi.org/10.1016/j.jcss.2011.12.019
Chase M, Chow SS (2009) Improving privacy and security in Multi-Authority Attribute-Based encryption. In: Proceedings 16th ACM Conference computer and communications security. pp 121–130. https://doi.org/10.1109/ACCESS.2018.2820182
di Vimercati SDC, Foresti S, Samarati P (2014) Selective and fine-grained access to data in the cloud. Secure Cloud Computing. Springer New York, 123–148
Eom J, Lee DH, Lee K (2016) Patient-Controlled Attribute-Based Encryption for secure electronic health records system. J Med Syst 40 (12):253. https://doi.org/10.1007/s10916-016-0621-3
Garain A, Dawn R, Singh S, Chowdhury C (2022) Differentially private human activity recognition for smartphone users. Multimed Tools Appl 81(28):40827–40848
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security (pp 89–98). ACM. https://doi.org/10.1145/1180405.1180418
Harel A, Shabtai A, Rokach L, Elovici Y (2012) M-score:, A misuseability weight measure. IEEE Trans Dependable Secure Comput 9(3):414–428
Hur J, Noh DK (2011) Attribute-Based Access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221. https://doi.org/10.1109/TPDS.2010.203
Jayapradha J, Prakash M, Alotaibi Y, Khalaf OI, Alghamdi SA (2022) Heap Bucketization anonymity—an efficient privacy-preserving data publishing model for multiple sensitive attributes. IEEE Access 10:28773–28791
Kement CE et al (2017) Comparative analysis of load-shaping-based privacy preservation strategies in a smart grid. IEEE Trans Indus Inf 13.6:3226–3235. https://doi.org/10.1109/TII.2017.2718666
Khan LS, Khan M, Hazzazi MM, Jamal SS (2023) A novel combination of information confidentiality and data hiding mechanism. Multimed Tools Appl 82(5):6917–6941
Krishnan R (2015) Access control and privacy policy challenges in big data, position paper, NSF Workshop on big data security and privacy. http://csi.utdallas.edu/events/NSF/papers/paper10.pdf
Kudryavtsev LD, Samarin MK (2011) Lagrange interpolation formula. Encyclopedia of Mathematics,[On-line]. Available: http://www.encyclopediaofmath.org/index.php.
Kumar TA, Liu H, Thomas JP, Hou X (2017) Content sensitivity based access control framework for Hadoop. Digit Commun Netw 3(4):213–225
Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Advances in Cryptology–EUROCRYPT 2010: 29th Annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30–June 3, 2010. Proceedings 29, pp 62–91. Springer Berlin Heidelberg
Li S, Mu N, Le J, Liao X (2019) A novel algorithm for privacy preserving utility mining based on integer linear programming. Eng Appl Artif Intell 81:300–312
Li S, Mu N, Le J, Liao X (2019) A novel algorithm for privacy preserving utility mining based on integer linear programming. Eng Appl Artif Intell 81:300–312
Li W, Ni W, Liu D, Liu RP, Wang P, Luo S (2017) Fine-grained access control for personal health records in cloud computing. In: 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), pp 1–5. IEEE
Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute based encryption. IEEE Trans Parall Distr 24(1):131–143. https://doi.org/10.1109/TPDS.2012.97
Liu Y, Zhang Y, Ling J, Liu Z (2018) Secure and fine-grained access control on e-healthcare records in mobile cloud computing. Futur Gener Comput Syst 78:1020–1026
Majeed A, Lee S (2020) Attribute susceptibility and entropy based data anonymization to improve users community privacy and utility in publishing data. Appl Intell 50.8:2555–2574
Musthafa S, Student MT, Sudarsa DB (2013) Patient–Centric Secure data sharing frame work for Cloud-Based PHR systems. Int J Eng Sci Invent 2.5:17–26
Qiu M, Gai K, Thuraisingham B, Tao L, Zhao H (2018) Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Gener Comput Syst 80:421–429
Roy M, Chowdhury C, Ahmed G, Aslam N, Chattopadhyay S, Islam SU (2022) Intra WBAN routing using Zipf’s law and intelligent transmission power switching approach (ZITA). J Ambient Intell Humanized Comput 13(9):4135–4149
Saha S, Mallick S, Neogy S (2022) Privacy-Preserving healthcare data modeling based on sensitivity and utility. SN Comput Sci 3.6:482. https://doi.org/10.1007/s42979-022-01372-x
Saha S, Saha P, Neogy S (2018) Hierarchical metadata-based secure data retrieval technique for healthcare application. In: Advanced computing and communication technologies, Springer, Singapore, vol 2018, pp 175–182
Satyanarayanan M (2001) Pervasive computing: Vision and challenges. Pers Commun IEEE 8.4:10–17
TK AK, Liu H, Thomas JP, Mylavarapu G (2015) Identifying sensitive data items within hadoop. In: 2015 IEEE 17th International conference on high performance computing and communications, 2015 IEEE 7th International symposium on cyberspace safety and security, and 2015 IEEE 12th International conference on embedded software and systems, pp 1308–1313. IEEE
Tang PC, Ash JS, Bates DW, Overhage JM, Sands DZ (2006) Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption. J Am Med Inf Assoc 13(2):121–126
The GDPR Act (2016) https://gdpr-info.eu/
The HIPAA Act (2000) http://www.hhs.gov/ocr/privacy/
The Sarbanes-Oxley Act (2002) http://www.soxlaw.com/
Ullah I, Khusro S (2023) On the analysis and evaluation of information retrieval models for social book search. Multimed Tools Appl 82(5):6431–6478
Varriale A, Prinetto P, Carelli A, Trotta P (2016) SECube (TM): Data at rest and data in motion protection. In: Proceedings of the International conference on security and management (SAM), p 138. The steering committee of the world congress in computer science, computer engineering and applied computing (WorldComp)
Wang Y, Liu F, Pang Z, Hassan A, Lu W (2019) Privacy-preserving content-based image retrieval for mobile computing. J Inf Secur Appl 49:102399
Wazid M, Das AK, Kumar N, Rodrigues JJ (2017) Secure three-factor user authentication scheme for renewable-energy-based smart grid environment. IEEE Trans Indus Inf 13(6):3144–3153
Weisstein EW (2004) Lagrange interpolating polynomial. https://mathworld.wolfram.com/
Wu R, Ahn GJ, Hu H (2012) Secure sharing of electronic health records in clouds. In: 8th International conference collaborative computing, networking, application and Worksharing (CollaborateCom), Pittsburgh, PA, USA, Oct, pp 711–718. https://doi.org/10.4108/icst.collaboratecom.2012.250497
Wu Y, Wei Z, Deng RH (2013) Attribute-based access to scalable media in cloud-assisted content sharing networks. IEEE Trans Multimed 15 (4):778–788. https://doi.org/10.1109/TMM.2013.2238910
Yang Z, Liang Z (2018) Automated identification of sensitive data from implicit user specification. Cybersecurity 1:1–15
Yang H, Oleshchuk VA (2015) Traceable hierarchical attribute-based authentication for the cloud. IEEE Conference on Communications and Network Security (CNS). IEEE. https://doi.org/10.1109/CNS.2015.7346888
Yang P, Xiong N, Ren J (2020) Data security and privacy protection for cloud storage: a survey. IEEE Access 8:131723–131740
Yao L, Chen Z, Wang X, Liu D, Wu G (2019) Sensitive label privacy preservation with anatomization for data publishing. IEEE Trans Dependable Secure Comput 18(2):904–917
Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp 1-9. IEEE
Zeng W, Yang Y, Luo B (2014) Content-based access control: Use data content to assist access control for large-scale content-centric databases. In: 2014 IEEE International conference on Big Data (Big Data), Washington, DC USA, pp 701–710. https://doi.org/10.1109/BigData.2014.7004294
Zhang X, Sun S, Zhang K (2018) An information content-based approach for measuring concept semantic similarity in WordNet. Wirel Pers Commun 103.1:117–132. https://doi.org/10.1007/s11277-018-5429-7
Zhou J, Lin X, Dong X, Cao Z (2014) PSMPA: Patient Self-controllable and multi-level privacy-preserving cooperative authentication in distributedm-healthcare cloud computing system. IEEE Trans Parallel Distrib Syst 26(6):1693–1703
Author information
Authors and Affiliations
Contributions
Sayantani Saha: Conceptualization, Software, Investigation, Writing - original draft, Writing - review & editing. Sarmistha Neogy: Conceptualization, Visualization, Supervision. Chandreyee Chowdhury: Visualization, Writing - review & editing.
Corresponding author
Ethics declarations
Conflict of Interests
The authors declare that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Saha, S., Chowdhury, C. & Neogy, S. A novel two phase data sensitivity based access control framework for healthcare data. Multimed Tools Appl 83, 8867–8892 (2024). https://doi.org/10.1007/s11042-023-15427-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15427-5