The Internet of Things (IoT) has made a successful impact on our personal and professional life. More specifically, the internet of medical things (IoMT) is capturing a crucial role in improving healthcare and providing medical facilities to human-being worldwide. Different smart sensors are connected to patients and transfer important data to the healthcare system to monitor and provide better patient treatment. As a result, the number of users is increasing drastically. Connected Internet of Things (IoT) devices will be 52.2 billion by 2022. Although IoMT is counted as a promising apart in healthcare, the security of patients’ information is still a challenging issue that should be thoroughly addressed. Access control is one of the leading security mechanisms introduced to healthcare to limit access to patients’ information to only authorised individuals. In healthcare, access to the medical record of patient’s within a minimal time is also extremely important because less time maybe save a life. In this research, we design an access control architecture (ACA). That uses a hybrid approach by combining a fine-grained attribute-based access control model (ACM), role-based access control model (RBAC), Capability-based access control model (CBAC), and using fog computing. Fog computing is a new era of cloud computing that provides computation, storage, and application services to end-users. This implemented schema is eXtensible Access Control Markup Language (XACML) driven. Our designed architecture reduces the existing processing time and the number of policies. We have emulated a testbed, provided a performance evaluation of our architecture, and made it compatible for practical use.

1.
Kayla
Matthews
, “
Is The Internet of Medical Things (IoMT) on Par With the IoT Market as a Whole?
” in https://hitconsultant.net/2019/01/30/is-iomt-tech-iot-market-as-a-whole.
2.
J. A.
Jerkins
, “
Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code
” in
2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC
)(
Las Vegas
,
NV, USA
, Mar.
2017
).
3.
M. T. Abu
Bakar
and
A. A.
Jamal
,
Latency issues in internet of things: A review of literature and solution
(Sci. Eng.,
2020
) pp.
83
91
4.
S.
Salonikias
,
I.
Mavridis
, and
D.
Gritzalis
, “
Access control issues in utilizing fog computing for transport infrastructure
,” in
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
,
2016
, vol.
9578
, pp.
15
26
5.
F. A.
Kraemer
,
A. E.
Braten
,
N.
Tamkittikhun
, and
D.
Palma
,
Fog Computing in Healthcare-A Review and Discussion
(
IEEE Access, Institute of Electrical and Electronics Engineers Inc
.,
2017
), pp.
9206
9222
6.
M.
Maksimović
,
Implementation of Fog computing in IoT-based healthcare system
(
JITA-J. Inf. Technol. Appl. (Banja Luka)-APEIRON
, Jan.
2018
), vol.
14
, no.
2
.
7.
M.
Mukherjee
et al,
Security and Privacy in Fog Computing: Challenges
(
IEEE Access
, Sep.
2017
), vol.
5
, pp.
19293
19304
.
8.
N.
Dilawar
,
M.
Rizwan
,
F.
Ahmad
, and
S.
Akram
,
Blockchain: Securing internet of medical things (IoMT
) (
Int. J. Adv. Comput. Sci. Appl.
,
2019
), vol.
10
, no.
1
, pp.
82
89
.
9.
IT Pros Admit Unauthorised Access, Malware and DoS Attacks are Top Three Cloud Security Concerns Today-IT Security Guru.
https://www.itsecurityguru.org/2016/11/16/pros-admit-unauthorised-access-malware-dos-attacks-top-three-cloud-security-concerns-today/ (accessed Aug. 12,
2020
).
10.
S.
Alnefaie
,
A.
Cherif
, and
S.
Alshehri
,
Towards a Distributed Access Control Model for IoT in Healthcare
(
IEEE Access
, May
2019
)
11.
V.
Suhendra
, “A survey on access control deployment,” in
Communications in Computer and Information Science
,
2011
, vol.
259
CCIS
, pp.
11
20
.
12.
A.
Ouaddah
,
H.
Mousannif
,
A. Abou
Elkalam
, and
A. Ait
Ouahman
, Access control in the Internet of Things: Big challenges and new opportunities (
Computer Networks
, Jan. 15,
2017
), vol.
112
.
Elsevier B.V
., pp.
237
262
.
13.
D.
Hussein
,
E.
Bertin
, and
V.
Frey
, “
Access control in IoT: From requirements to a candidate vision
,” in
Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks
(
ICIN
2017, Apr.
2017
), pp.
328
330
.
14.
S. M.
Bhaskaran
and
R.
Sridhar
,
Hybrid solution for privacy-preserving access control for healthcare data
(
Adv. Electr. Comput. Eng.
, May
2017
), vol.
17
, no.
2
, pp.
31
38
.
15.
I.
Ungurean
,
N. C.
Gaitan
, and
V. G.
Gaitan
, “
An IoT architecture for things from industrial environment
”, in
2014 10th International Conference on Communications (COMM
)(
IEEE
,
Bucharest, Romania
,
2014
).
16.
Bitcoin: A Peer-to-Peer Electronic Cash System
.” https://www.researchgate.net/publication/228640975_Bitcoin_A_Peer-to-Peer_Electronic_Cash_System (accessed Apr. 20,
2021
).
17.
F.
Sabrina
, “
Blockchain and Structural Relationship Based Access Control for IoT: A Smart City Use Case
,” in
Proceedings-Conference on Local Computer Networks
(LCN, Oct.
2019
, vol.
2019
-October), pp.
137
140
.
18.
D. R.
Putra
,
B.
Anggorojati
, and
A. P. P.
Hartono
, “
Blockchain and smart-contract for scalable access control in Internet of Things
”, in
2019 International Conference on ICT for Smart Society (ICISS
)(
IEEE
,
Bandung, Indonesia
, Nov.
2019
).
19.
R.
Xu
,
S. Y.
Nikouei
,
Y.
Chen
,
E.
Blasch
, and
A.
Aved
, “
BlendMAS: A blockchain-enabled decentralized microservices architecture for smart public safety
,” in
Proceedings-2019 2nd IEEE International Conference on Blockchain, Blockchain 2019
(
IEEE
,
Atlanta, GA, USA
, Jul.
2019
), pp.
564
571
.
20.
Q.
Le-Dang
and
T.
Le-Ngoc
, “
Scalable Blockchain-based Architecture for Massive IoT Reconfiguration
”, in
2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE
)(
IEEE
,
Edmonton, AB, Canada
, May
2019
).
21.
N.
Sivaselvan
,
V. K.
Bhat
, and
M.
Rajarajan
, “
Blockchain-based Scheme for Authentication and Capability-based Access Control in IoT Environment
,” in
11th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference
(
UEMCON
2020, Oct.
2020
), pp.
0323
0330
.
22.
S.
Pal
,
M.
Hitchens
,
V.
Varadharajan
, and
T.
Rabehaja
, “
Policy-based access control for constrained healthcare resources in the context of the Internet of Things
,” (
J. Netw. Comput. Appl.
,
2019
).
23.
M. U.
Aftab
,
M. A.
Habib
,
N.
Mehmood
,
M.
Aslam
, and
M.
Irfan
, “
Attributed role-based access control model
,” in
Proceedings-2015 Conference on Information Assurance and Cyber Security
, (
CIACS
2015, Jan.
2016
), pp.
83
89
.
24.
V. C.
Hu
et al, “
Guide to Attribute Based Access Control (ABAC) Definition and Considerations
,” in
NIST Special Publication
800-162, edited by
Vincent C.
Hu
et al. (
Gaithersburg
, MD, Jan.
2014
).
25.
SQLite Home Page
.” https://www.sqlite.org/index.html (accessed Apr. 21,
2021
).
26.
NodeMcu--An open-source firmware based on ESP8266 wifi-soc
.” https://www.nodemcu.com/index_en.html (accessed Apr. 21,
2021
).
27.
The Programming Language Lua
.” http://www.lua.org/ (accessed Apr. 21,
2021
).
28.
S.
Monir
, “
A Lightweight Attribute-Based Access Control System for IoT
”, MSc thesis,
University of Saskatchewan
,
2016
.
29.
Nandy
,
T.
,
Idris
,
M. Y. I.
,
Noor
,
R. M.
,
Wahab
,
A. W. A.
,
Bhattacharyya
,
S.
,
Kolandaisamy
,
R.
, &
Yahuza
,
M.
(
2021
).
A secure, privacy-preserving, and lightweight Authentication scheme for VANETs
.
IEEE Sensors Journal
,
21
(
18
),
20998
21011
.
30.
Kolandaisamy
,
R.
,
Subaramaniam
,
K.
, &
Jalil
,
A. B.
(
2021
, March).
A Study on Comprehensive Risk Level Analysis of IoT Attacks
. In
2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS
) (pp. 1391-1396).
IEEE
.
This content is only available via PDF.
You do not currently have access to this content.