ABAC Scheme on Electronic Health Records Using Hyperledger Fabric

Authors

  • Ashwin Rupak S A B Department of Computer Science and Engineering, K. Ramakrishnan College of Engineering, Tamil Nadu, India Author
  • Janarthanan J 1 Department of Computer Science and Engineering, K. Ramakrishnan College of Engineering, Tamil Nadu, India Author
  • Kishore Kumar N Department of Computer Science and Engineering, K. Ramakrishnan College of Engineering, Tamil Nadu, India 2Assistant Professor, Department of Computer Science and Engineering, K. Ramakrishnan College of Engineering, T Author
  • Harissh S Department of Computer Science and Engineering, K. Ramakrishnan College of Engineering, Tamil Nadu, India Author
  • Sasi Kumar R Assistant Professor, Department of Computer Science and Engineering, K. Ramakrishnan College of Engineering, Tamil Nadu, India Author

DOI:

https://doi.org/10.47392/irjash.2023.S065

Keywords:

Attribute Based Access Control (ABAC), Hyperledger Fabric, Electronic Health Record (EHR), Rivest Shamir Adleman (RSA), Patient records, Interplanetary File System (IPFS)

Abstract

In this modern world, data is getting more significant with new emerging technologies, and a transparent system must be made with security mechanisms. For example, an Electronic Health Record (EHR) is a system that records patient data in a digital format across different healthcare settings. The ultimate benefits of Blockchain technology are to safeguard patient records and pave a path for health centers, clinics, and medicals. A high-level invulnerable system is required to prevent the rising cybersecurity threats targeting these organizations. A Blockchain that fulfills the HIPAA regulation is a protective barrier and transparency required by many fields. Attribute-based access control (ABAC) is a scheme that provides an effective authentication and authorization model that considers attributes from the user, instead of roles, to grant permission to the user to access. This system makes it easier for Certificate Authorities (CA) to manage user permissions by assigning specific rights and privileges based on the individual’s characteristics. Thus, writing policies will secure data transparency as the one requested can only view the data if they satisfy the policy’s criteria.

Downloads

Published

2023-05-28