Open Research Newcastle
Browse

Policy-based access control for constrained healthcare resources in the context of the Internet of Things

Download (977.49 kB)
journal contribution
posted on 2025-05-08, 23:08 authored by Shantanu Pal, Michael Hitchens, Vijayaraghavan VaradharajanVijayaraghavan Varadharajan, Tahiry Rabehaja
The Internet of Things (IoT), smart sensors and mobile wearable devices are helping to provide healthcare systems that are more ubiquitous, smarter, faster and easily accessible to users. However, security is a significant concern for the IoT, with access control being one of the major issues. With the growing size and presence of these systems an important question is how to manage policies in a manner that is both scalable and flexible. In this paper, we propose an access control architecture for constrained healthcare resources in the IoT. Our policy-based approach provides fine-grained access for authorized users to services while protecting valuable resources from unauthorized access. We use a hybrid approach by employing attributes, roles and capabilities for our authorization design. We apply attributes for role membership assignment and in permission evaluation. Membership of roles grants capabilities. The capabilities which are issued may be parameterized based on further attributes of the user and are then used to access specific services provided by IoT devices. This significantly reduces the number of policies required for specifying access control settings. The proposed scheme is XACML driven. We have implemented a proof of concept prototype and provide a detailed performance analysis of the implementation. Evaluation results show that, our approach requires minimal additional overhead when compared to other proposals employing capabilities for access control in the IoT.

History

Journal title

Journal of Network and Computer Applications

Volume

139

Issue

1 August 2019

Pagination

57-74

Publisher

Elsevier

Language

  • en, English

College/Research Centre

Faculty of Engineering and Built Environment

School

Advanced Cyber Security Engineering Research Centre

Rights statement

© 2019. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/.

Usage metrics

    Publications

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC