Skip to Main Content
 

Global Search Box

 
 
 
 

ETD Abstract Container

Abstract Header

IoMT AUTHENTICATION AND AUTHORIZATION ACCESS CONTROL BASED ON MULTIPARTY TRUST NEGOTIATION

Abstract Details

2022, PHD, Kent State University, College of Arts and Sciences / Department of Computer Science.
Lately, medical data and services interchanges throughout the Internet of Medical Things (IoMT) have become not only possible but essential. Nowadays, interactions involving doctor's tablets, patients' insulin pumps, Heart monitors, etc., are becoming everyday occurrences. In such a scenario, traditional assumptions for establishing and enforcing access control regulations no longer hold. The entities need to authenticate and trust each other to exchange sensitive medical information. Interactions are further complicated because the interacting entities usually belong to different security domains or don't have preexistent relationships. To address such issues; Trust Management can be used. Trust management is essentially the study of access control policies, digital credentials, and building trust relationships for a widely distributed environment where authorization cannot be based on identity authentication. The term trust management was first coined by Blaze, Feigenbaum, and Laze (M. Blaze, 1996) IoMT deals with a patient-data-rich segment, making security and privacy a severe concern to patients. Therefore, access control is a significant issue to ensure trust in the IoMT. However, deploying existing authentication and authorization solutions to the IoMT is not straightforward because of highly dynamic and possibly unprotected environments and resource limitations. This dissertation proposes Soter, a negotiation-based access control system for constrained devices in the IoMT environment. This dissertation aims to provide new approaches to automatic, secure, and efficient trust establishment among multiple parties in a constrained environment of the IoMT. The implementation of an access control system can be divided into three design layers: • Access Control Policy language, • Access Control Model, and • Access Control Mechanisms. So, in this dissertation, we used these abstraction layers, and we designed Soter, a HIPPA-based access control system for the constraints of IoMT environments.
Javed Khan (Advisor)
Javed Khan (Committee Chair)
Hassan Peyravi (Committee Member)
Pratim Datta (Committee Member)
Kambiz Ghazinour (Committee Member)
Elena Novak (Committee Member)
Jong-Hoon Kim (Committee Member)
156 p.

Recommended Citations

Citations

  • Allouzi, M. A. (2022). IoMT AUTHENTICATION AND AUTHORIZATION ACCESS CONTROL BASED ON MULTIPARTY TRUST NEGOTIATION [Doctoral dissertation, Kent State University]. OhioLINK Electronic Theses and Dissertations Center. http://rave.ohiolink.edu/etdc/view?acc_num=kent1650371854035773

    APA Style (7th edition)

  • Allouzi, Maha. IoMT AUTHENTICATION AND AUTHORIZATION ACCESS CONTROL BASED ON MULTIPARTY TRUST NEGOTIATION. 2022. Kent State University, Doctoral dissertation. OhioLINK Electronic Theses and Dissertations Center, http://rave.ohiolink.edu/etdc/view?acc_num=kent1650371854035773.

    MLA Style (8th edition)

  • Allouzi, Maha. "IoMT AUTHENTICATION AND AUTHORIZATION ACCESS CONTROL BASED ON MULTIPARTY TRUST NEGOTIATION." Doctoral dissertation, Kent State University, 2022. http://rave.ohiolink.edu/etdc/view?acc_num=kent1650371854035773

    Chicago Manual of Style (17th edition)