Skip to Main Content
Frequently Asked Questions
Submit an ETD
Global Search Box
Need Help?
Keyword Search
Participating Institutions
Advanced Search
School Logo
Files
File List
MahaAllouzi_DissertationV56.pdf (4.89 MB)
ETD Abstract Container
Abstract Header
IoMT AUTHENTICATION AND AUTHORIZATION ACCESS CONTROL BASED ON MULTIPARTY TRUST NEGOTIATION
Author Info
Allouzi, Maha Ali
Permalink:
http://rave.ohiolink.edu/etdc/view?acc_num=kent1650371854035773
Abstract Details
Year and Degree
2022, PHD, Kent State University, College of Arts and Sciences / Department of Computer Science.
Abstract
Lately, medical data and services interchanges throughout the Internet of Medical Things (IoMT) have become not only possible but essential. Nowadays, interactions involving doctor's tablets, patients' insulin pumps, Heart monitors, etc., are becoming everyday occurrences. In such a scenario, traditional assumptions for establishing and enforcing access control regulations no longer hold. The entities need to authenticate and trust each other to exchange sensitive medical information. Interactions are further complicated because the interacting entities usually belong to different security domains or don't have preexistent relationships. To address such issues; Trust Management can be used. Trust management is essentially the study of access control policies, digital credentials, and building trust relationships for a widely distributed environment where authorization cannot be based on identity authentication. The term trust management was first coined by Blaze, Feigenbaum, and Laze (M. Blaze, 1996) IoMT deals with a patient-data-rich segment, making security and privacy a severe concern to patients. Therefore, access control is a significant issue to ensure trust in the IoMT. However, deploying existing authentication and authorization solutions to the IoMT is not straightforward because of highly dynamic and possibly unprotected environments and resource limitations. This dissertation proposes Soter, a negotiation-based access control system for constrained devices in the IoMT environment. This dissertation aims to provide new approaches to automatic, secure, and efficient trust establishment among multiple parties in a constrained environment of the IoMT. The implementation of an access control system can be divided into three design layers: • Access Control Policy language, • Access Control Model, and • Access Control Mechanisms. So, in this dissertation, we used these abstraction layers, and we designed Soter, a HIPPA-based access control system for the constraints of IoMT environments.
Committee
Javed Khan (Advisor)
Javed Khan (Committee Chair)
Hassan Peyravi (Committee Member)
Pratim Datta (Committee Member)
Kambiz Ghazinour (Committee Member)
Elena Novak (Committee Member)
Jong-Hoon Kim (Committee Member)
Pages
156 p.
Subject Headings
Computer Science
Keywords
Trust Management, Access Control, Authentication, HIPAA
Recommended Citations
Refworks
EndNote
RIS
Mendeley
Citations
Allouzi, M. A. (2022).
IoMT AUTHENTICATION AND AUTHORIZATION ACCESS CONTROL BASED ON MULTIPARTY TRUST NEGOTIATION
[Doctoral dissertation, Kent State University]. OhioLINK Electronic Theses and Dissertations Center. http://rave.ohiolink.edu/etdc/view?acc_num=kent1650371854035773
APA Style (7th edition)
Allouzi, Maha.
IoMT AUTHENTICATION AND AUTHORIZATION ACCESS CONTROL BASED ON MULTIPARTY TRUST NEGOTIATION.
2022. Kent State University, Doctoral dissertation.
OhioLINK Electronic Theses and Dissertations Center
, http://rave.ohiolink.edu/etdc/view?acc_num=kent1650371854035773.
MLA Style (8th edition)
Allouzi, Maha. "IoMT AUTHENTICATION AND AUTHORIZATION ACCESS CONTROL BASED ON MULTIPARTY TRUST NEGOTIATION." Doctoral dissertation, Kent State University, 2022. http://rave.ohiolink.edu/etdc/view?acc_num=kent1650371854035773
Chicago Manual of Style (17th edition)
Abstract Footer
Document number:
kent1650371854035773
Download Count:
20
Copyright Info
© 2022, all rights reserved.
This open access ETD is published by Kent State University and OhioLINK.