• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Ullah, F. (Ullah, F..) | He, J. (He, J..) | Zhu, N. (Zhu, N..) | Wajahat, A. (Wajahat, A..) | Nazir, A. (Nazir, A..) | Qureshi, S. (Qureshi, S..) | Pathan, M.S. (Pathan, M.S..) | Dev, S. (Dev, S..)

Indexed by:

Scopus SCIE

Abstract:

In the realm of modern healthcare, Electronic Health Records EHR serve as invaluable assets, yet they also pose significant security challenges. The absence of EHR access auditing mechanisms, which includes the EHR audit trails, results in accountability gaps and magnifies security vulnerabilities. This situation effectively paves the way for unauthorized data alterations to occur without detection or consequences. Inadequate EHR compliance auditing procedures, particularly in verifying and validating access control policies, expose healthcare organizations to risks such as data breaches, and unauthorized data usage. These vulnerabilities result from unchecked unauthorized access activities. Additionally, the absence of EHR audit logs complicates investigations, weakens proactive security measures, and raises concerns to put healthcare institutions at risk. This study addresses the pressing need for robust EHR auditing systems designed to scrutinize access to EHR data, encompassing who accesses it, when, and for what purpose. Our research delves into the complex field of EHR auditing, which includes establishing an immutable audit trail to enhance data security through blockchain technology. We also integrate Purpose-Based Access Control (PBAC) alongside smart contracts to strengthen compliance auditing by validating access legitimacy and reducing unauthorized entries. Our contributions encompass the creation of audit trail of EHR access, compliance auditing via PBAC policy verification, the generation of audit logs, and the derivation of data-driven insights, fortifying EHR access security. © 2024 The Author(s)

Keyword:

Smart contract EHR audit logs EHR audit trail Access control pattern Purpose-based access control EHR access control policy verification

Author Community:

  • [ 1 ] [Ullah F.]Faculty of Information Technology, Beijing University of Technology, Beijing, China
  • [ 2 ] [He J.]Faculty of Information Technology, Beijing University of Technology, Beijing, China
  • [ 3 ] [Zhu N.]Faculty of Information Technology, Beijing University of Technology, Beijing, China
  • [ 4 ] [Wajahat A.]Faculty of Information Technology, Beijing University of Technology, Beijing, China
  • [ 5 ] [Nazir A.]Faculty of Information Technology, Beijing University of Technology, Beijing, China
  • [ 6 ] [Qureshi S.]Faculty of Information Technology, Beijing University of Technology, Beijing, China
  • [ 7 ] [Pathan M.S.]School of Computing, Dublin City University, Dublin, Ireland
  • [ 8 ] [Dev S.]School of Computer Science, University College Dublin, Dublin, Ireland

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

Heliyon

ISSN: 2405-8440

Year: 2024

Issue: 16

Volume: 10

4 . 0 0 0

JCR@2022

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 3

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:605/10552344
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.