Author:
Pu Xuetao,Jiang Rong,Song Zhiming,Liang Zhihong,Yang Liang
Abstract
The rapid development of the Hospital Information System has significantly enhanced the convenience of medical research and the management of medical information. However, the internal misuse and privacy leakage of medical big data are critical issues that need to be addressed in the process of medical research and information management. Access control serves as a method to prevent data misuse and privacy leakage. Nevertheless, traditional access control methods, limited by their single usage scenario and susceptibility to single point failures, fail to adapt to the polymorphic, real-time, and sensitive characteristics of medical big data scenarios. This paper proposes a smart contracts and risk-based access control model (SCR-BAC). This model integrates smart contracts with traditional risk-based access control and deploys risk-based access control policies in the form of smart contracts into the blockchain, thereby ensuring the protection of medical data. The model categorizes risk into historical and current risk, quantifies the historical risk based on the time decay factor and the doctor’s historical behavior, and updates the doctor’s composite risk value in real time. The access control policy, based on the comprehensive risk, is deployed into the blockchain in the form of a smart contract. The distributed nature of the blockchain is utilized to automatically enforce access control, thereby resolving the issue of single point failures. Simulation experiments demonstrate that the access control model proposed in this paper effectively curbs the access behavior of malicious doctors to a certain extent and imposes a limiting effect on the internal abuse and privacy leakage of medical big data.
Reference38 articles.
1. Application of secure data exchange technology in HIS;Hongqiao;Comput Eng,2008
2. Big data and medical research in China;Luxia;BMJ,2018
3. Privacy in the age of medical big data;Price;Nat Med,2019
4. Fine-granularity discretionary access control based on user's role;Li-feng;J Comp Appl,2009
5. Application system-oriented mandatory access control model;Lu;Comp Eng Appl,2010