Loading...

Privacy Preserving Access Control in IoT for eHealth

Hashemi Beni, Fereshteh | 2016

2055 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 48496 (19)
  4. University: Sharif University of Technology
  5. Department: Computer Engineering
  6. Advisor(s): Amini, Morteza
  7. Abstract:
  8. One of the applications of Internet of things (IoT) is its usage in the eHealth area. Various types of sensors (e.g., sensor to measure heart health, blood sugar levels, and respiratory) exist that not only provide required information for patients, but also send the health information to hospital staff through the network. Leveraging this technology in various intensive care units of hospital facilitate nurses and medical staff in monitoring of patients. However, moving towards these environments leads to new security challenges. One of the most important challenges is controlling access to sensors’ data and preserving patients privacy so that doctor and nurses should access patients’ information considering the defined access rules (based on the patient’s condition, time,location, and generally environmental conditions). The aim of this thesis is presenting a model and mechanism of access control to provide privacy preserving access control for application of IoT in eHealth. The porposed mechanism can address requirements in such environments (e.g., access control based on location or patients emergency conditions) while doctors, nurses and other hospital staff accessing the sensors and databases. In addition,sensors inaccuracy and uncertainty of their collected data has a significant impact on access control. Thus, the proposed framework and mechanism consider a risk management component to examine the issue. The proposed access control is based on a composition of team-based and role-based access control models in which a subset of hospital staff with different roles constitute a team for a patient and get the required access rights based on their roles in the team. The case studies provided in this thesis and the implementation of a prototype based on the porposed access control model indicates the applicability of the proposed model
  9. Keywords:
  10. Internet of Things ; Access Control ; Privacy Preserving ; Electronic Health

 Digital Object List

 Bookmark

...see more