<?xml version="1.0" encoding="utf-8"?>
<journal>
<title>Signal and Data Processing</title>
<title_fa>پردازش علائم و داده‌ها</title_fa>
<short_title>JSDP</short_title>
<subject>Engineering &amp; Technology</subject>
<web_url>http://jsdp.rcisp.ac.ir</web_url>
<journal_hbi_system_id>1</journal_hbi_system_id>
<journal_hbi_system_user>admin</journal_hbi_system_user>
<journal_id_issn>2538-4201</journal_id_issn>
<journal_id_issn_online>2538-421X</journal_id_issn_online>
<journal_id_pii></journal_id_pii>
<journal_id_doi>10.61882/jsdp</journal_id_doi>
<journal_id_iranmedex></journal_id_iranmedex>
<journal_id_magiran></journal_id_magiran>
<journal_id_sid>1</journal_id_sid>
<journal_id_nlai>8888</journal_id_nlai>
<journal_id_science></journal_id_science>
<language>fa</language>
<pubdate>
	<type>jalali</type>
	<year>1399</year>
	<month>8</month>
	<day>1</day>
</pubdate>
<pubdate>
	<type>gregorian</type>
	<year>2020</year>
	<month>11</month>
	<day>1</day>
</pubdate>
<volume>17</volume>
<number>3</number>
<publish_type>online</publish_type>
<publish_edition>1</publish_edition>
<article_type>fulltext</article_type>
<articleset>
	<article>


	<language>fa</language>
	<article_id_doi></article_id_doi>
	<title_fa>مدل کنترل دسترسی پویای حافظ حریم خصوصی با قابلیت وکالت دسترسی درسلامت الکترونیکی</title_fa>
	<title>Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth</title>
	<subject_fa>مقالات گروه امنیت اطلاعات</subject_fa>
	<subject>Paper</subject>
	<content_type_fa>پژوهشي</content_type_fa>
	<content_type>Research</content_type>
	<abstract_fa>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family:B Nazanin;&quot;&gt;&lt;span style=&quot;font-size:10.0pt;&quot;&gt;گسترش استفاده از فناوری اطلاعات و به&#8204;طور خاص اینترنت اشیا در حوزه سلامت الکترونیکی، مسائل مختلفی را به&#8204;همراه دارد که از مهم&#8204;ترین آنها مسأله امنیت و کنترل دسترسی است. در این راستا نیازمندی&#8204;های مختلفی از جمله مسأله دسترسی پزشک به پرونده بیمار بر اساس موقعیت فیزیکی پزشک، مسأله تشخیص شرایط اضطراری و اعطای پویای دسترسی موقت به پزشک حاضر، حفظ حریم خصوصی بیمار بر اساس ترجیحات وی و مسأله اعطای وکالت دسترسی به حقوق دسترسی پزشک دیگر &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span style=&quot;font-family:B Nazanin;&quot;&gt;&lt;span style=&quot;font-size:10.0pt;&quot;&gt;مطرح است که در مدل&#8204;های ارائه&#8204;شده تاکنون پوشش داده نشده است&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span style=&quot;font-family:B Nazanin;&quot;&gt;&lt;span style=&quot;font-size:10.0pt;&quot;&gt;. در این مقاله یک مدل کنترل دسترسی پویا و حافظ حریم خصوصی با قابلیت وکالت دسترسی در سلامت الکترونیکی با نام &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span dir=&quot;LTR&quot;&gt;&lt;span style=&quot;font-size:8.0pt;&quot;&gt;TbDAC&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span style=&quot;font-family:B Nazanin;&quot;&gt;&lt;span style=&quot;font-size:10.0pt;&quot;&gt; ارائه شده است؛ به&#8204;طوری&#8204;که هنگام دسترسی پزشکان و پرستاران به پرونده بیمار بتواند چالش&#8204;های امنیتی مطرح در این محیط&#8204;ها را برطرف&#8204;کند&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span dir=&quot;LTR&quot;&gt;&lt;span style=&quot;font-size:8.0pt;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span style=&quot;font-family:B Nazanin;&quot;&gt;&lt;span style=&quot;font-size:10.0pt;&quot;&gt; با پیاده&#8204;سازی یک سامانه کنترل دسترسی بر اساس مدل پیشنهادی و بررسی سناریوهایی واقعی در محیط بیمارستانی با استفاده از آن، کاربرد عملی این مدل در محیط واقعی و کارایی آن نشان داده شده است&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span style=&quot;font-family:B Nazanin;&quot;&gt;&lt;span style=&quot;font-size:10.0pt;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;</abstract_fa>
	<abstract>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this regard, different security requirements have been defined; such as the physician&amp;rsquo;s access to the patient&amp;rsquo;s EHR (electronic health record) based on the physician&amp;rsquo;s physical location, detection of emergency conditions and dynamically granting access to the existing physician or nurse, preserving patients&amp;rsquo; privacy based on their preferences, and delegation of duties and related permissions. In security and access control models presented in the literature, we cannot find a model satisfying all these requirements altogether. To fill this gap, in this paper, we present a privacy preserving dynamic access control model with access delegation capability in eHealth (called TbDAC). The proposed model is able to tackle the security challenges of these environments when the physicians and nurses access the patients&amp;rsquo; EHR. The model also includes the data structures, procedures, and the mechanisms necessary for providing the access delegation capability.&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;The proposed access control model in this paper is in fact a family of models named TbDAC for access control in eHealth considering the usual hospital procedures. In the core model (called TbDAC&lt;sub&gt;0&lt;/sub&gt;), two primitive concepts including team and role are employed for access control in hospitals. In this model, a set of permission-types is assigned to each role and a medical team (including a set of hospital staff with their roles) is assigned to each patient. In fact the role of a person in a team determines his/her permissions on the health information of the patient. Since patients&amp;rsquo; vital information is collected from some IoT sensors, a dynamic access control using a set of dynamic and context-aware access rules is considered in this model. Detecting emergency conditions and providing proper permissions for the nearest physicians and nurses (using location information) is a key feature in this model. &lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Since health information is one of the most sensitive individuals&amp;rsquo; personal information, the core model has been enhanced to be a privacy preserving access control model (named TbDAC&lt;sub&gt;1&lt;/sub&gt;). To this aim, the purpose of information usage and the privacy preferences of the patients are considered in the access control enforcement procedure. &lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Delegation of duties is a necessity in medical care. Thus, we added access delegation capability to the core model and proposed the third member of the model family, which is named TbDAC&lt;sub&gt;2&lt;/sub&gt;. The complete model that considers all security requirements of these environments including emergency conditions, privacy, and delegation is the last member of this family, named TbDAC&lt;sub&gt;3&lt;/sub&gt;. In each one of the presented models, the therapeutic process carried out in the hospitals, the relational model, and the entities used in the model are precisely and formally defined. Furthermore in each model, the access control process and the dynamic access rules for different situations are defined. &lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Evaluation of the proposed model is carried out using three approaches; comparing the model with the models proposed in related research, assessing the real-world scenarios in a case study, and designing and implementing a prototype of an access control system based on the proposed model for mobile Android devices. The evaluations show the considerable capabilities of the model in satisfying the security requirements in comparison to the existing models which proposed in related research and also its applicability in practice for different simple and complicated access scenarios.&lt;/strong&gt;&lt;/div&gt;</abstract>
	<keyword_fa>سلامت الکترونیکی, اینترنت اشیا, کنترل دسترسی پویا, حفظ حریم خصوصی, وکالت دسترسی</keyword_fa>
	<keyword>eHealth, IoT, Dynamic Access Control, Privacy, Access Delegation</keyword>
	<start_page>109</start_page>
	<end_page>140</end_page>
	<web_url>http://jsdp.rcisp.ac.ir/browse.php?a_code=A-10-550-1&amp;slc_lang=fa&amp;sid=1</web_url>


<author_list>
	<author>
	<first_name>Faegheh</first_name>
	<middle_name></middle_name>
	<last_name>Ghofrani</last_name>
	<suffix></suffix>
	<first_name_fa>فائقه</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>غفرانی</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>ghofrani@ce.sharif.edu</email>
	<code>10031947532846009359</code>
	<orcid>10031947532846009359</orcid>
	<coreauthor>No</coreauthor>
	<affiliation>Sharif University of Technology</affiliation>
	<affiliation_fa>دانشکده مهندسی کامپیوتر، دانشگاه صنعتی شریف</affiliation_fa>
	 </author>


	<author>
	<first_name>Morteza</first_name>
	<middle_name></middle_name>
	<last_name>Amini</last_name>
	<suffix></suffix>
	<first_name_fa>مرتضی</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>امینی</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>amini@sharif.edu</email>
	<code>10031947532846009360</code>
	<orcid>10031947532846009360</orcid>
	<coreauthor>Yes
</coreauthor>
	<affiliation>Sharif University of Technology</affiliation>
	<affiliation_fa>دانشکده مهندسی کامپیوتر، دانشگاه صنعتی شریف</affiliation_fa>
	 </author>


</author_list>


	</article>
</articleset>
</journal>
