A Smart Contract-Based Access Control Framework For Smart Healthcare Systems (2024)

Article Navigation

Volume 67 Issue 2 February 2024
  • Next >

Journal Article

Get access

,

Amal Abid

ReDCAD, ENIS, University of Sfax

,

Tunisia

Corresponding author: amal.abid@redcad.org, amal.abid@enis.tn

Search for other works by this author on:

Oxford Academic

,

Saoussen Cheikhrouhou

ReDCAD, ENIS, University of Sfax

,

Tunisia

Search for other works by this author on:

Oxford Academic

,

Slim Kallel

ReDCAD, ENIS, University of Sfax

,

Tunisia

Search for other works by this author on:

Oxford Academic

,

Mohamed Jmaiel

ReDCAD, ENIS, University of Sfax

,

Tunisia

Search for other works by this author on:

Oxford Academic

The Computer Journal, Volume 67, Issue 2, February 2024, Pages 407–422, https://doi.org/10.1093/comjnl/bxac183

Published:

30 December 2022

Article history

Received:

10 March 2022

Revision received:

24 September 2022

Revision requested:

28 October 2022

Published:

30 December 2022

  • Views
    • Article contents
    • Figures & tables
    • Video
    • Audio
    • Supplementary Data
  • Cite

    Cite

    Amal Abid, Saoussen Cheikhrouhou, Slim Kallel, Zahir Tari, Mohamed Jmaiel, A Smart Contract-Based Access Control Framework For Smart Healthcare Systems, The Computer Journal, Volume 67, Issue 2, February 2024, Pages 407–422, https://doi.org/10.1093/comjnl/bxac183

    Close

Search

Close

Search

Advanced Search

Search Menu

Abstract

Security faces huge challenges in Internet of Things (IoT) environments. In particular, conventional access control standards and models tend to be less tailored for IoT due to the constrained nature of smart objects. Usually, a powerful third party is used to handle the access control logic. However, this third party is lacking in transparency and could harm user privacy. Therefore, providing a distributed access control solution, while considering transparency and privacy-preserving awareness in IoT smart systems, is of paramount importance. The described issue can be addressed using the emergent Blockchain technology that provides a promising choice to build a new generation of decentralized and transparent access control solutions. This paper proposes a smart contract-based access control framework for IoT smart healthcare systems, which is based on smart contracts to provide a distributed and trustworthy access control, combined with the GTRBAC model to express fine-grained access control policies while considering temporal authorization constraints. To prove the feasibility and validity of the proposed framework, this paper also provides a detailed technical description and an initial implementation and execution. An experimental evaluation shows that security properties’ analyses on smart contracts achieved the best possible evaluation with no vulnerabilities found, and the cost of access control operations increases linearly as the number of policy constraints increases. Besides, a comparative analysis reveals that the proposed approach can achieve good results with low gas costs and latency.

© The British Computer Society 2022. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

This article is published and distributed under the terms of the Oxford University Press, Standard Journals Publication Model (https://academic.oup.com/journals/pages/open_access/funder_policies/chorus/standard_publication_model)

Issue Section:

Section D: Security in Computer Systems and Networks

You do not currently have access to this article.

Download all slides

Sign in

Get help with access

Personal account

  • Sign in with email/username & password
  • Get email alerts
  • Save searches
  • Purchase content
  • Activate your purchase/trial code

Sign in Register

Institutional access

  1. Sign in through your institution A Smart Contract-Based Access Control Framework For Smart Healthcare Systems (3)
  2. Sign in with a library card Sign in with username/password Recommend to your librarian

Institutional account management

Sign in as administrator

Get help with access

Institutional access

Access to content on Oxford Academic is often provided through institutional subscriptions and purchases. If you are a member of an institution with an active account, you may be able to access content in one of the following ways:

IP based access

Typically, access is provided across an institutional network to a range of IP addresses. This authentication occurs automatically, and it is not possible to sign out of an IP authenticated account.

Sign in through your institution

Choose this option to get remote access when outside your institution. Shibboleth/Open Athens technology is used to provide single sign-on between your institution’s website and Oxford Academic.

  1. Click Sign in through your institution.
  2. Select your institution from the list provided, which will take you to your institution's website to sign in.
  3. When on the institution site, please use the credentials provided by your institution. Do not use an Oxford Academic personal account.
  4. Following successful sign in, you will be returned to Oxford Academic.

If your institution is not listed or you cannot sign in to your institution’s website, please contact your librarian or administrator.

Sign in with a library card

Enter your library card number to sign in. If you cannot sign in, please contact your librarian.

Society Members

Society member access to a journal is achieved in one of the following ways:

Sign in through society site

Many societies offer single sign-on between the society website and Oxford Academic. If you see ‘Sign in through society site’ in the sign in pane within a journal:

  1. Click Sign in through society site.
  2. When on the society site, please use the credentials provided by that society. Do not use an Oxford Academic personal account.
  3. Following successful sign in, you will be returned to Oxford Academic.

If you do not have a society account or have forgotten your username or password, please contact your society.

Sign in using a personal account

Some societies use Oxford Academic personal accounts to provide access to their members. See below.

Personal account

A personal account can be used to get email alerts, save searches, purchase content, and activate subscriptions.

Some societies use Oxford Academic personal accounts to provide access to their members.

Viewing your signed in accounts

Click the account icon in the top right to:

  • View your signed in personal account and access account management features.
  • View the institutional accounts that are providing access.

Signed in but can't access content

Oxford Academic is home to a wide variety of products. The institutional subscription may not cover the content that you are trying to access. If you believe you should have access to that content, please contact your librarian.

Institutional account management

For librarians and administrators, your personal account also provides access to institutional account management. Here you will find options to view and activate subscriptions, manage institutional settings and access options, access usage statistics, and more.

Purchase

Subscription prices and ordering for this journal

Purchasing options for books and journals across Oxford Academic

Short-term Access

To purchase short-term access, please sign in to your personal account above.

Don't already have a personal account? Register

A Smart Contract-Based Access Control Framework For Smart Healthcare Systems - 24 Hours access

EUR €15.00

GBP £13.00

USD $16.00

Rental

A Smart Contract-Based Access Control Framework For Smart Healthcare Systems (4)

This article is also available for rental through DeepDyve.

Advertisem*nt

Citations

Views

162

Altmetric

More metrics information

Metrics

Total Views 162

104 Pageviews

58 PDF Downloads

Since 12/1/2022

Month: Total Views:
December 2022 3
January 2023 29
February 2023 15
March 2023 21
April 2023 6
May 2023 4
June 2023 5
July 2023 8
September 2023 5
October 2023 4
November 2023 5
December 2023 10
January 2024 4
February 2024 22
March 2024 21

Citations

Powered by Dimensions

Altmetrics

×

Email alerts

Article activity alert

Advance article alerts

New issue alert

Receive exclusive offers and updates from Oxford Academic

Citing articles via

Google Scholar

  • Latest

  • Most Read

  • Most Cited

Color Patterns And Enhanced Texture Learning For Detecting Computer-Generated Images
Deep Learning-Based Cyberbullying Detection in Kurdish Language
Concept Drift–Based Intrusion Detection For Evolving Data Stream Classification In IDS: Approaches And Comparative Study
Service Function Placement Optimization For Cloud Service With End-to-End Delay Constraints
An Improved Density Peaks Clustering Algorithm Based On Density Ratio

More from Oxford Academic

Computer Science

Science and Mathematics

Books

Journals

Advertisem*nt

A Smart Contract-Based Access Control Framework For Smart Healthcare Systems (2024)

FAQs

What is access control in smart contract? ›

Access control is a critical aspect of smart contract security, governing who can interact with various functionalities within the contract. However, improper implementation of access control can lead to severe vulnerabilities, allowing unauthorized users to manipulate the contract's state or even drain its funds.

What is role based access control smart contracts? ›

To ensure security, smart contracts often apply a simple form of role-based access control (RBAC), where a dedicated administrator assigns users to roles that are authorized to invoke specific smart contract functions.

What is smart health in IoT? ›

Internet of Things (IoT) in Healthcare

IoT technology brings numerous applications in healthcare, from remote monitoring to smart sensors to medical device integration. It keeps the patients safe and healthy as well as improves the physician delivers care towards the patients.

What are smart contract applications within blockchain technology? ›

Smart contracts are typically used to automate the execution of an agreement so that all participants can be immediately certain of the outcome, without any intermediary's involvement or time loss. They can also automate a workflow, triggering the next action when predetermined conditions are met.

What are the three 3 types of access control? ›

The 3 types of access control are Role-Based Access Control (RBAC) systems, Attribute-Based Access Control (ABAC) and Discretionary Access Control (DAC).

What are the 4 types of access control? ›

There are four types of access control methods: Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Discretionary Access Control (DAC), and Rule-Based Access Control (RBAC or RB-RBAC). A method is chosen based on the level of access needed by each user, security requirement, infrastructure, etc.

What is an example of a smart contract program? ›

A smart contract is a program that executes automatically based on if-then logic. A smart contract example in the real world would be a jukebox. If a person puts in a quarter and presses the code corresponding with a certain song, the machine will process the transaction and play the requested song.

What are the three main components of a role-based access control solution? ›

Three common principles of RBAC
  • User role assignment defines users' permission or access rights based on a role or task.
  • User role authorization confirms that a user is approved for a role and to perform related functions.
  • User role permission and access rights define specifically what a user can and cannot do.
Mar 20, 2023

What are the two types of role-based access control? ›

RBAC vs.

Whereas RBAC restricts user access based on static roles, PBAC determines access privileges dynamically based on rules and policies. Although PBAC is fairly similar to ABAC, ABAC requires more IT and development resources (e.g., XML coding) as the number of attributes required increases.

What is a smart device in healthcare? ›

Smart medical devices represent a new frontier in healthcare by integrating advanced technologies and intelligent capabilities into conventional medical devices. These devices harness the power of sensors, connectivity solutions, and data analysis systems to enable real-time monitoring, analysis, and decision-making.

What is smart healthcare technology? ›

SMART Health IT is an open, standards based technology platform that enables innovators to create apps that seamlessly and securely run across the healthcare system.

What is an example of IoT in healthcare? ›

IoT Healthcare Example: Connected Contact Lenses

An example of these lenses in action includes IoT-based contact lenses monitoring tear glucose levels for early diabetes detection. These devices can also dispense medication into the eye when needed, which is a healthier and easier solution for your eyes.

What are the most common smart contracts? ›

The five most popular smart contract platforms, Ethereum, Hyperledger Fabric, Corda, Stellar, and Rootstock, are discussed in this section.

Do you need blockchain for smart contracts? ›

Smart Contracts cannot function without Blockchain

Smart contracts cannot work without blockchain technology, as blokchain's unique features allows contracts to be conducted and executed without a third party.

What is the most used blockchain for smart contracts? ›

It is common for public blockchains to support smart contracts and decentralized applications (dApps), enabling complex programmable use cases. Popular public blockchains include Ethereum, Binance Smart Chain (BSC), and Polkadot.

What is access control in Blockchain? ›

Access control is a required security part of almost all applications. Blockchain specific characteristics such as immutability, durability, auditability, and reliability lead to considering blockchain as a supplementary solution for access control systems.

What does access control mean? ›

Access control defined

Access control is an essential element of security that determines who is allowed to access certain data, apps, and resources—and in what circ*mstances. In the same way that keys and preapproved guest lists protect physical spaces, access control policies protect digital spaces.

What is the basic concept of access control? ›

Access control is a data security process that enables organizations to manage who is authorized to access corporate data and resources. Secure access control uses policies that verify users are who they claim to be and ensures appropriate control access levels are granted to users.

What is considered access control? ›

Access control is a fundamental component of data security that dictates who's allowed to access and use company information and resources. Through authentication and authorization, access control policies make sure users are who they say they are and that they have appropriate access to company data.

Top Articles
Latest Posts
Article information

Author: Rob Wisoky

Last Updated:

Views: 5996

Rating: 4.8 / 5 (48 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Rob Wisoky

Birthday: 1994-09-30

Address: 5789 Michel Vista, West Domenic, OR 80464-9452

Phone: +97313824072371

Job: Education Orchestrator

Hobby: Lockpicking, Crocheting, Baton twirling, Video gaming, Jogging, Whittling, Model building

Introduction: My name is Rob Wisoky, I am a smiling, helpful, encouraging, zealous, energetic, faithful, fantastic person who loves writing and wants to share my knowledge and understanding with you.