{"title":"Comparative Analysis of Ontology Based Data Access Control and Security Enhancement in Healthcare Application","authors":"Suthan Renuka, Chirathally Dyamanna Guruprakash","doi":"10.3103/s8756699024700353","DOIUrl":null,"url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>Formal, machine-readable theories, taxonomy definitions, and connections to human-readable language make up ontology, the formal specification of conceptualization. In addition to methodical definitions, it offers axioms that guide the interpretation of words. Many other sorts of relationships, both structural and nonstructural, including inheritance, generalization, aggregation, and instantiation, are supported by an ontology. It is necessary to handle a number of security issues, including identity management, cryptography, trust, application security, authentication, access control, and privacy. Access control is the process of maintaining resource privacy, project-based group membership, and role specificity in accordance with the goals of the ontology under the proposal. This research examines and contrasts three different ontology-based access control strategies: attribute-based access control (ABAC), context-based access control (CBAC), and role-based access control (RBAC). I-RBAC, BRBAC, SA-ODC and RBACSE are the RBAC approaches used for comparison. For analysing the CBAC procedure, ACAIA, CAHMS, CASPSA and FBCAAC algorithms are used. Finally for evaluating the ABAC method, OABAC, FABAC, AWS-IoTAC and ABAC-PHR algorithms are employed. CASPSA, CAHMS, ACAIA and FBCAAC has a data retrieval time of 1.8, 2.4, 6.1, and 9.4 s. IRBAC, BRBAC, SA-ODC and RBACSE has a turn around time of 66.3, 79.1, 150.5, and 177.2 s respectively. According to the experimental results, attribute based access control systems perform better for securing healthcare data.</p>","PeriodicalId":44919,"journal":{"name":"Optoelectronics Instrumentation and Data Processing","volume":"20 1","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Optoelectronics Instrumentation and Data Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3103/s8756699024700353","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"PHYSICS, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0
Abstract
Formal, machine-readable theories, taxonomy definitions, and connections to human-readable language make up ontology, the formal specification of conceptualization. In addition to methodical definitions, it offers axioms that guide the interpretation of words. Many other sorts of relationships, both structural and nonstructural, including inheritance, generalization, aggregation, and instantiation, are supported by an ontology. It is necessary to handle a number of security issues, including identity management, cryptography, trust, application security, authentication, access control, and privacy. Access control is the process of maintaining resource privacy, project-based group membership, and role specificity in accordance with the goals of the ontology under the proposal. This research examines and contrasts three different ontology-based access control strategies: attribute-based access control (ABAC), context-based access control (CBAC), and role-based access control (RBAC). I-RBAC, BRBAC, SA-ODC and RBACSE are the RBAC approaches used for comparison. For analysing the CBAC procedure, ACAIA, CAHMS, CASPSA and FBCAAC algorithms are used. Finally for evaluating the ABAC method, OABAC, FABAC, AWS-IoTAC and ABAC-PHR algorithms are employed. CASPSA, CAHMS, ACAIA and FBCAAC has a data retrieval time of 1.8, 2.4, 6.1, and 9.4 s. IRBAC, BRBAC, SA-ODC and RBACSE has a turn around time of 66.3, 79.1, 150.5, and 177.2 s respectively. According to the experimental results, attribute based access control systems perform better for securing healthcare data.
期刊介绍:
The scope of Optoelectronics, Instrumentation and Data Processing encompasses, but is not restricted to, the following areas: analysis and synthesis of signals and images; artificial intelligence methods; automated measurement systems; physicotechnical foundations of micro- and optoelectronics; optical information technologies; systems and components; modelling in physicotechnical research; laser physics applications; computer networks and data transmission systems. The journal publishes original papers, reviews, and short communications in order to provide the widest possible coverage of latest research and development in its chosen field.