Blockchain enabled policy-based access control mechanism to restrict unauthorized access to electronic health records

View article
PeerJ Computer Science

Main article text

 

Introduction

Problem statement

Research questions

  • What are the issues in existing access control mechanisms when applied to make robust electronic health record systems, and how can these issues be solved using policy-based access control?

  • How can policy-based access control meet some regulatory requirements within the healthcare industry?

  • What policies are implemented by the subject, controller, and requester during their interaction, and what are the resulting outputs for each entity?

  • How can the latest tools and techniques be effectively applied to PBAC systems to enhance privacy in healthcare?

Our contribution and article organization

  • We propose a model to formally define resilient properties for assessing the security and privacy of PBAC systems. This model encompasses establishing and enforcing the subject policy, controller policy, and requester policy to regulate data access and usage within the system.

  • We explore how various components within a PBAC system interact. This model emphasizes the collaborative efforts of policy entities.

  • We emphasize the PBAC system’s functionality in accurately enforcing policies and controlling access based on predefined conditions and policies.

Theoretical foundations of pbac

Why did previous access control have issues?

Entities involve in adhering policies

The importance of GDPR in ensuring data privacy and compliance in healthcare

Methodology

Proposed model

System architecture

Generalized policy equation

  • Effect: Enable or disable the rule.

  • Users: Subject, Controller, Requester.

  • Conditions: Conditions for data usage consent (whole, partial, specific).

  • Actions: Store data, check logs, revoke consent.

  • Permission: Allow or deny actions.

Use-case 1: subject perspective

  • Effect: Enable (1) or disable (0).

  • Users: Subject, Controller

  • Conditions: Consent type (whole, partial, specific).

  • Actions:

    • Store data (A1)

    • Check logs (A2)

    • Consent Statement (A3)

    • Revoke consent (A4)

  • Permission: Allow (1) or deny (0).

Use case 2: controller perspective

  • Managing data storage and verification

  • Ensuring patient consent

  • Providing access to consent logs

  • Processing consent revocation

  • Handling access requests

  • Managing audits and logs

  • Effect (E): Enable (1) or disable (0).

  • Users (U): Controller, Patient.

  • Conditions (C): Consent type, Compliance criteria.

  • Actions (A):

    • Verify data

    • Store data

    • Provide access to logs

    • Process revocation

    • Receive access requests

    • Manage audits

  • Permission (p): Allow (1) or deny (0).

Use case 3: requester perspective

  • Effect (E): Enable (1) or disable (0).

  • Users (U): Requester, Controller.

  • Conditions (C): Purpose justification, Compliance with patient consent.

  • Actions (A):

    • Submit request

    • Justify purpose

    • Adhere to audit and logging

  • Permission (p): Allow (1) or deny (0).

System setup

System implementation and evaluation

Smart contract installation

Results

Comparison with related works

Discussion and limitations

Conclusion and future work

Supplemental Information

Code used for implementation.

DOI: 10.7717/peerj-cs.2647/supp-1

Additional Information and Declarations

Competing Interests

Author Contributions

Data Availability

Funding

This research was funded by a National Research Foundation of Korea grant: RS-2024-0041926912982076870101 and RS-2024-00449882. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

696 Visitors 608 Views 51 Downloads