Comparative Analysis of Ontology Based Data Access Control and Security Enhancement in Healthcare Application

IF 0.5 Q4 PHYSICS, MULTIDISCIPLINARY Optoelectronics Instrumentation and Data Processing Pub Date : 2024-06-13 DOI:10.3103/s8756699024700353
Suthan Renuka, Chirathally Dyamanna Guruprakash
{"title":"Comparative Analysis of Ontology Based Data Access Control and Security Enhancement in Healthcare Application","authors":"Suthan Renuka, Chirathally Dyamanna Guruprakash","doi":"10.3103/s8756699024700353","DOIUrl":null,"url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>Formal, machine-readable theories, taxonomy definitions, and connections to human-readable language make up ontology, the formal specification of conceptualization. In addition to methodical definitions, it offers axioms that guide the interpretation of words. Many other sorts of relationships, both structural and nonstructural, including inheritance, generalization, aggregation, and instantiation, are supported by an ontology. It is necessary to handle a number of security issues, including identity management, cryptography, trust, application security, authentication, access control, and privacy. Access control is the process of maintaining resource privacy, project-based group membership, and role specificity in accordance with the goals of the ontology under the proposal. This research examines and contrasts three different ontology-based access control strategies: attribute-based access control (ABAC), context-based access control (CBAC), and role-based access control (RBAC). I-RBAC, BRBAC, SA-ODC and RBACSE are the RBAC approaches used for comparison. For analysing the CBAC procedure, ACAIA, CAHMS, CASPSA and FBCAAC algorithms are used. Finally for evaluating the ABAC method, OABAC, FABAC, AWS-IoTAC and ABAC-PHR algorithms are employed. CASPSA, CAHMS, ACAIA and FBCAAC has a data retrieval time of 1.8, 2.4, 6.1, and 9.4 s. IRBAC, BRBAC, SA-ODC and RBACSE has a turn around time of 66.3, 79.1, 150.5, and 177.2 s respectively. According to the experimental results, attribute based access control systems perform better for securing healthcare data.</p>","PeriodicalId":44919,"journal":{"name":"Optoelectronics Instrumentation and Data Processing","volume":"20 1","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Optoelectronics Instrumentation and Data Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3103/s8756699024700353","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"PHYSICS, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0

Abstract

Formal, machine-readable theories, taxonomy definitions, and connections to human-readable language make up ontology, the formal specification of conceptualization. In addition to methodical definitions, it offers axioms that guide the interpretation of words. Many other sorts of relationships, both structural and nonstructural, including inheritance, generalization, aggregation, and instantiation, are supported by an ontology. It is necessary to handle a number of security issues, including identity management, cryptography, trust, application security, authentication, access control, and privacy. Access control is the process of maintaining resource privacy, project-based group membership, and role specificity in accordance with the goals of the ontology under the proposal. This research examines and contrasts three different ontology-based access control strategies: attribute-based access control (ABAC), context-based access control (CBAC), and role-based access control (RBAC). I-RBAC, BRBAC, SA-ODC and RBACSE are the RBAC approaches used for comparison. For analysing the CBAC procedure, ACAIA, CAHMS, CASPSA and FBCAAC algorithms are used. Finally for evaluating the ABAC method, OABAC, FABAC, AWS-IoTAC and ABAC-PHR algorithms are employed. CASPSA, CAHMS, ACAIA and FBCAAC has a data retrieval time of 1.8, 2.4, 6.1, and 9.4 s. IRBAC, BRBAC, SA-ODC and RBACSE has a turn around time of 66.3, 79.1, 150.5, and 177.2 s respectively. According to the experimental results, attribute based access control systems perform better for securing healthcare data.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于本体的数据访问控制与医疗应用中安全性增强的比较分析
摘要 正规的、机器可读的理论、分类定义以及与人类可读语言的联系构成了本体,即概念化的正规规范。除了方法定义外,本体论还提供了指导词语解释的公理。本体还支持许多其他类型的关系,包括继承、泛化、聚合和实例化等结构性和非结构性关系。有必要处理一些安全问题,包括身份管理、密码学、信任、应用安全、身份验证、访问控制和隐私。访问控制是根据提案中本体的目标维护资源隐私、基于项目的小组成员资格和角色特定性的过程。本研究考察并对比了三种不同的基于本体的访问控制策略:基于属性的访问控制(ABAC)、基于上下文的访问控制(CBAC)和基于角色的访问控制(RBAC)。I-RBAC、BRBAC、SA-ODC 和 RBACSE 是用于比较的 RBAC 方法。在分析 CBAC 程序时,使用了 ACAIA、CAHMS、CASPSA 和 FBCAAC 算法。最后,为了评估 ABAC 方法,使用了 OABAC、FABAC、AWS-IoTAC 和 ABAC-PHR 算法。CASPSA、CAHMS、ACAIA 和 FBCAAC 的数据检索时间分别为 1.8、2.4、6.1 和 9.4 秒;IRBAC、BRBAC、SA-ODC 和 RBACSE 的周转时间分别为 66.3、79.1、150.5 和 177.2 秒。根据实验结果,基于属性的访问控制系统在确保医疗数据安全方面表现更好。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
1.00
自引率
50.00%
发文量
16
期刊介绍: The scope of Optoelectronics, Instrumentation and Data Processing encompasses, but is not restricted to, the following areas: analysis and synthesis of signals and images; artificial intelligence methods; automated measurement systems; physicotechnical foundations of micro- and optoelectronics; optical information technologies; systems and components; modelling in physicotechnical research; laser physics applications; computer networks and data transmission systems. The journal publishes original papers, reviews, and short communications in order to provide the widest possible coverage of latest research and development in its chosen field.
期刊最新文献
Event-Discrete Traffic Control Models Principle of Calibrating a Magnetometric Sensor by the Precise Measurement of Change in Its Spatial Position in a Constant Magnetic Field The Required Number of Elements for a Ring Antenna Array Measurement of Distances between Objects by a Series of Images Obtained from Several Shooting Points with a Small Angle Camera Synthesis and Optimization of a Stochastic Algorithm for Image Registration Using Shannon’s Maximum Mutual Information Criterion
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1