<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Monitoring for Confidentiality of Healthcare Data</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ahmed F. Siddiqui</string-name>
          <email>ahmedfarazsiddiqui1@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Aditya J. Paul</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sushruta Mishra</string-name>
          <email>sushruta.mishrafcs@kiit.ac.in</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Control</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>SADAC</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>MLS-ABAC</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>DF-RBAC-SC</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Internet-of-Medical-Things(IOMT)</institution>
          ,
          <addr-line>Risk Monitoring, Healthcare, Sensors, Privacy, Access</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Kalinga Institute of Industrial Technology</institution>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <fpage>31</fpage>
      <lpage>40</lpage>
      <abstract>
        <p>The Internet of Medical Things (IoMT), the newest component of the Internet of Things, offers uses for intelligent healthcare systems. It is crucial to the healthcare industry's efforts to improve the accuracy, reliability, and efficiency of electronic devices. IoMT can connect genuine, physical items in the real world for information sharing and communication. Therefore, it is crucial to utilize access control to guarantee the proper use of private data during the data sharing process. In this research paper we have tried to discuss three cutting edge access based control mechanisms in a comparative fashion to understand and overcome the limitations of the classical access control methods. The healthcare industry's future regarding their risk monitoring strategies was also covered in this research paper.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        The Internet-of-Medical-Things (IoMT) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] applies the Internet-of-Things (IoT) to the
medical and healthcare sectors by using edge computing and big data analytics to identify trends in
medical datasets and by connecting medical resources and services via a variety of network services.
The introduction of IoMT has made it possible to realize the link between medical personnel, patients,
and numerous pieces of medical equipment, giving patients with high-quality equipment assistance at
any time and location. To gather health data, sensor devices are placed into the bodies of patients [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3,
4, 5</xref>
        ]. These gadgets include sensors for weight, blood pressure, temperature, and heart rate. After using
this data for analysis, the user selects a pertinent diagnosis scheme for diagnosis based on the analysis'
findings. In this manner, a contact-less patient diagnostic working paradigm is described.
      </p>
      <p>Users may perform real-time interactions anytime, anyplace, and from any location to benefit
from services like tele-care because of the intelligent nature of IoMT networks and the openness of its
related applications. There are clearly issues with information security and privacy due to this instant
connectivity. It is crucial to regulate user behavior based on different access levels, or a multi-level
access control method. For instance, access to the information in a healthcare network is restricted to
authorized entities that meet the access control requirements (e.g., roles and resources).</p>
      <p>
        Access control is a key security feature that ensures that, when certain environmental criteria
are met, only authorized subjects have access to particular resources for a given activity [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The four
components that make up this concept are subjects (such as people or devices), resources or objects
(such as web pages, bank accounts, or database records), actions (such as read, write, and execute), and
environmental factors (e.g., date, location).
      </p>
      <p>
        The concepts and principles of access control implementations were introduced by Sandhu et
al. in 1994 [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], who also described many models that serve as the foundation for the majority of
contemporary access control implementations. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]
ORCID:
      </p>
      <p>0000-0003-3929-1100 (S.Mishra)</p>
      <p>2020 Copyright for this paper by its authors.</p>
    </sec>
    <sec id="sec-2">
      <title>Objectives of the Paper</title>
      <sec id="sec-2-1">
        <title>Advantages</title>
      </sec>
      <sec id="sec-2-2">
        <title>Disadvantages</title>
      </sec>
      <sec id="sec-2-3">
        <title>Easy to manage, search, authorization.</title>
      </sec>
      <sec id="sec-2-4">
        <title>Meet multi-level</title>
        <p>security
requirements.
Simplify access
management.</p>
        <p>When faced with
complex
environments,
multiple ACLs
are required and
difficult to
manage.</p>
        <p>Flexibility is</p>
        <p>poor.</p>
      </sec>
      <sec id="sec-2-5">
        <title>It is easy to cause character explosions.</title>
        <p>The objectives of the study are mentioned
below:●
●
●
●</p>
        <p>Determining the security issue with the healthcare industry's data sharing and storage
methods as well as the goals of the suggested solution.</p>
        <p>Comparison and defining three different access control models for healthcare.
Explaining the design of the access control models through a scenario of the healthcare
context.</p>
        <p>Discussing about the use, ramifications, and the potential of the suggested strategy in
future.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Related Works</title>
      <p>
        Most studies focus primarily on two aspects: encryption and access control, in order to
prevent unwanted access while guaranteeing data confidentiality, in order to address the issues
of privacy leaks created by centralized cloud storage. Conventional access control techniques,
like Discretionary Access Control (DAC) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], put the user first. The data owner creates access
policies, and an access control matrix and access control list are used to implement access
control (ACL). However only basic environments are appropriate for this technique. Using
static ACL, users may quickly query and control personal resources. Nevertheless, this
approach is only appropriate in straightforward environments. More ACLs are required for
remote environments where user rights frequently change, and it is challenging to maintain. Via
the central authority, Mandatory Access Control (MAC) [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] distributes the subject's and object's
access permissions in accordance with the security level. As a result, once the security level is
established, the access privileges follow suit. Consequently, the largest drawback of strict
access control is its lack of flexibility. RBAC [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] is a technique for allocating access privileges
to subjects in accordance with their jobs. Limited roles can represent several users,
which simplifies the administration of authority between the subject and the object. But the
conventional approach to role-based access control is typically centralized, the distribution of
user roles lacks fine granularity, and the distribution of roles and permissions is static, which is
incompatible with the modern dispersed and dynamic network design. As a result, DF-RBAC
was conceptualized, a dynamic and fine-grained role-based access control model that enables
resource proprietors to designate roles in a flexible manner while also ensuring the security of
those roles [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        The shortcomings of static authorization in the case of RBAC are efficiently solved by
Attraction-based Access Control (ABAC) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], a fine-grained and dynamic access control mechanism.
It is a versatile access control mechanism since it grants users access privileges in accordance with
qualities and supports complicated contexts. The National Institute of Standards and Technology
(NIST) provided a comprehensive ABAC guide in 2014, and it was updated in 2019 through [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. This
document begins by defining it and outlining the many parts that make it work. Second, it talks about
how ABAC is put into practice within a company. The guide's primary goal is to illustrate the key
difficulties that arise throughout such an implementation.
      </p>
      <p>
        Data confidentiality is not provided by the ABAC paradigm. The MLS-ABAC model, which
not only functions using the original workflow of the regular ABAC model but also assures data secrecy,
was developed to address this flaw [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. There ABAC implementations have been used in cloud storage
and the Internet of Things [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], where the use of blockchain technology is
recurrently considered to prevent data from manipulation or unauthorized access [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
      <p>
        Similar to ideas like "software as a service" or "malware as a service," security as a service
(SECaaS) has gained popularity in recent years [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. SECaaS is a business strategy in which a
service provider incorporates security services into a company infrastructure more efficiently than the
majority of people or businesses can do on their own (typically on a subscription basis). In this context,
SADAC (Security Attribute-based Dynamic Access Control), a novel method for dynamic access
control based on the subject's security attributes, was presented and is primarily meant to be used in
business networks and environments linked to ISPs [26].
4.
      </p>
    </sec>
    <sec id="sec-4">
      <title>Comparative Analysis of three access control models</title>
      <p>In this section, we shall discuss the various features of the following models:
●
●
●</p>
      <p>SADAC(Security Attribute-based Dynamic Access Control)
MLS-ABAC(Multilevel Attribute-based Access Control)
DF-RBAC-SC(Dynamic and Fine-grained Role-based access control using Smart
Contracts)</p>
    </sec>
    <sec id="sec-5">
      <title>4.1.SADAC(Security Attribute-based Dynamic Access Control)</title>
      <p>SADAC (Security Attribute-based Dynamic Access Control)[26] is a novel zero-trust network
access control scheme that collects (i) multiple security-related attributes about communications (such
as ports, IP addresses, data volume, and duration), applications installed and permissions involved,
resource consumption (such as RAM, CPU, and battery) and device protection mechanisms (such as
screen locking method); (ii) uses these attributes over time to authorize or deny access in a dynamic,
continuous manner. and (iii) the ML scheme that supports SADAC (MSNM) presents diagnosis
capabilities to allow identifying specific causes for access restrictions. The general operational
workflow shown in Figure 1.</p>
      <p>We shall understand this through an example of a device in a WiFi environment: Through an
Access Point, each mobile device communicates with the surroundings (AP). This kind of engagement
is deceptive. On the one hand, a mobile-network discussion is conducted in order to manage the access
itself. Nonetheless, the device offers the network some particular security features or properties. The
usage of a SADAC-specific app, which may be downloaded from the ISP network and installed on the
device, makes this process easier.</p>
      <p>The AP implements the dPEP module, so that:
● It obtains the security features connected to a certain device or user, which can be done
either once at the time of association with the AP or repeatedly over time.
● The dPDP will determine the appropriate security profiles for the device/user based on the
security features that the AP has forwarded to it.
● If the dPDP determines that a particular device or user is not complying with a security
policy, it instructs the AP/dPEP to restrict or even forbid the device from continuing to
access the network.</p>
      <p>Each mobile device's security profile is estimated by the dPDP module using the related security
attributes. Also, it will decide whether to expand or restrict network access. Both the security policy
repository created for the environment and the repository of security attributes for the network's
connected devices are taken into account in order to accomplish this [27] [28].</p>
      <p>SADAC is capable of diagnostics and is based on security. Additionally, it can be combined
with the usage of additional traits and circumstances, whether or not they are security-related, to make
more complicated and ambitious access control decisions. Moving the estimation and diagnosis
modules to the final devices would also make it simple to expand it in order to strengthen user privacy.
The security profile of people and devices should be taken into account as a confidence measure to
allow access to ICT environments, despite the sensitive nature of the problem itself and the potential
remedies to be adopted.</p>
    </sec>
    <sec id="sec-6">
      <title>4.2.MLS-ABAC(Multilevel Attribute-based Access Control)</title>
      <p>MLS-ABAC(Multilevel Attribute-based Access Control) scheme[30], the cloud server first
determines the data user’s security level, then searches the database based on the security level.</p>
      <p>NIST's ABAC Figure 2 The model is satisfied by the Multi-Level Security ABAC
(MLSABAC) scheme. This design is effective and is based on the Ciphertext-Policy ABE decryption
technique. Furthermore, based on actual application circumstances, only authorized data users are able
to decrypt the ciphertext and verify the message's integrity after retrieval.</p>
      <p>Anything that is transferred to the cloud that is sensitive (such as medical records) should be
securely kept (i.e. encrypted). The data should only be readable by an authorized user who possesses
the security key. As a result, incorporating ABAC into Attribute-Based Encryption (ABE) gives us the
opportunity to encrypt the information that has been outsourced and shield it from the cloud system
itself. Even if a cloud system were sincere and curious, it would be impossible for it to access the private
data using ABE Figure 3 depicts the MLS-ABAC architecture.</p>
      <p>Attribute Authority Server (AAS) - It is a dependable party that creates both the secret
keys and system parameters for the data users.</p>
      <p>Identity and Access Management Server (IAMS) - Based on sets of security levels, the
Identity and Access Management Server (IAMS) generates tokens for users corresponding
to their access security level. Notably, these sets are created, deleted, and updated by AAS,
who then submits them to the IAMS.
● Cloud Server (CS) - In order to store ciphertexts that are offloaded from IoT data
providers, the Cloud Server (CS) functions as a repository. As a data consumer, CS also
verifies the authenticity of the tokens it has obtained from another IoT device. The defined
predicate functions are then used by CS to determine whether access should be permitted.
● Data Owner(DO) - By specifying a security level, Data Owner (DO), an IoT data producer,
can share a sensitive message with consumers. In order to achieve this, it creates a
ciphertext that also contains certain metadata. Consequently, in order to stop data leaking,
the DO selects the ciphertext's security level and uploads the ciphertext together with the
corresponding security level to CS.
● Data User(DU) - A lightweight IoT device called Data User (DU) wishes to read data from
the CS using its credentials (i.e., data consumer). It communicates the token to CS after
requesting one from the IAMS in order to accomplish this. The DU can get the ciphertext
if it successfully completes the verification process. Lastly, the DU can decrypt the
ciphertext to discover information if its properties meet the access policy. Otherwise, it
learns nothing.</p>
      <p>We shall explain the methodology with an example of a hospital: In Figure 4, the set of static
characteristics is {UserType, HospitalId}, while the set of dynamic attributes is {Section, Time}. The
four security levels in our suggested paradigm are Top Secret, Secret, Confidential, and Unclassified,
with User A belonging to Security Level Secret. User A belongs to the security level Top Secret, User
B and User C to Secret, User D and User E to Confidential, and User F to Unclassified. Users are given
this partial order hierarchy by the system administrator (in this case, IAMS), who also notifies them
when the system's rules change[29].</p>
      <p>In this system, the entity User E has the ability to download information that has been uploaded
with Confidential and Unclassified security levels, as well as to decrypt information that has been
encrypted with User E's static and dynamic properties. Additionally, if User E's security level is raised
to Secret, it will be able to download any material posted to security levels Secret and lower and decode
any information that has been encrypted using the static and dynamic characteristics of the application.
According to the aforementioned situation, the system administrator can easily grant User E access to
the wrapped data that has been uploaded to the Confidential security level.</p>
      <p>The management of access control is made easier and the security and privacy of IoT systems
are improved by adding a security level verification before partial decryption. MLS-ABAC is effective
when lightweight alternatives to heavyweight functions are used, such as the suggested lightweight
CPABE[30], lightweight Ascon-hash, and Ascon[29],[31], authenticated encryption algorithms. In
addition to taking security level verification and dynamic attributes into account, MLS-ABAC uses an
authorized encryption strategy to safeguard the data integrity of the plain text in the event of outsourced
decryption. As an added bonus, it formalizes the suggested access control model by including a
conceptual and formal model as well as performance metrics to illustrate the use-case and
implementation of the MLS-ABAC scheme.</p>
    </sec>
    <sec id="sec-7">
      <title>4.3.DF-RBAC-SC(Dynamic and Fine-grained Role-based access control using Smart Contracts)</title>
      <p>Using DF-RBAC-SC(Dynamic and Fine-grained Role-based access control using Smart
Contacts) [32] [33] [34] we can verify the user-role assignments of organizations in a secure way in a
cross-organizational setting. DF-RBAC-SC is a smart contract-based authentication mechanism that is
suitable for the trans-organizational exploitation of roles, in order to accomplish these objectives. A
challenge-response protocol and a smart contract make up the two primary components of the
DFRBAC-SC. The user-role assignments are made using the smart contract (SC), which is subsequently
broadcast on the blockchain. Figure 5 depicts the DF-RBAC-SC access framework.</p>
      <p>We shall explain the methodology using an example of a hospital: Imagine that a hospital
(AHospital), a role-issuing entity, wants to administer a "patient" role for its patients. The RBAC-smart
SC's contract would then be made and published on the Ethereum network. Utilizing the clever contract,
it may carry out a command to add a user (patient) to the database. In addition to the role that will be
assigned to the patient, A-Hospital will also include the patient's externally owned address (EOA), the
role's expiration date and any other personalizations. The user then claims to have the patient's position
from A-Hospital and asks for a service from a service-providing company such as a pathology lab.</p>
      <p>The service provider(pathology lab) checks the smart contract made by A-Hospital based on
the claim and uses that to verify all the facts it requires. Following a thorough review of all the
information, the hospital can use the challenge-response protocol to determine whether the unknown
user has access to the corresponding EOA that was given the role, conclusively demonstrating that the
unknown user was, in fact, given a patient role by A-Hospital. Because the information the
hospital needs is available publicly or is already in the user's possession, it is important to note that the
hospital does not need to be aware of the role in advance and is not required to enter into any agreements
with or contact A-Hospital on behalf of the patient who received the role.</p>
      <p>It is suggested to use DF-RBAC-SC with cryptography. This framework enables the resource
owner to assign user responsibilities in a flexible manner. At the same time, it may confirm the roles
that have been allocated, carry out the function of accessing the activity log for security audit purposes,
and guarantee the security of the entire architecture. It has demonstrated through safety and
experimental research that our framework is workable.</p>
    </sec>
    <sec id="sec-8">
      <title>Future scope of healthcare informatics</title>
      <p>The digital transformation has only steadily and graciously affected the medical industry
[35].High-end sensors and other similar devices are being used in smart hospitals and related
environments to generate and gather massive volumes of extremely complicated medical data in
realtime with demanding data processing needs. The growth of AI and the internet of medical things (IoMT)
as well as the advent of digital health care reforms has been closely related. These systems, also known
as health care IoT, are made up of a networked arrangement of medical devices—mostly sensors and
small-scale devices—and software programmes that enable communication across various
softwarebased healthcare systems [36].</p>
      <p>When it comes to managing medical records, the health care sector has already experienced a
significant level of digitization in the form of electronic health records (EHR) [37]. The bulk of the
pharmaceutical and related sectors already use digital datasets or cloud-based systems to start electronic
record-keeping for massive amounts of organizational and research data. The term "edge computing"
(EC) is a new one, but it has the ability to fully address the needs relating to system reaction times and
data privacy protection [38]. It serves as a framework for adding privacy protection and a means for
lessening load in server-based solutions. The "man-in-the-middle" function is often performed by the
edge server, which also serves as an instantaneous query and data management system and only
connects to the server for high priority or high complexity tasks [39]. Many attempts are being
undertaken to study and broaden EC's reach into closely linked and related sectors, wherever there is
potential for distributed architecture, as a result of substantial research being done in this area. As a
result, many distributed learning models have been developed, including Edge intelligence [40],
distributed learning, and federated learning.</p>
    </sec>
    <sec id="sec-9">
      <title>6. Conclusion</title>
      <p>These days, ICT security is of the utmost importance. The upcoming use of technologies like
IoT(Internet of Things) and BYOD(Bring Your Own Device) will make this scenario even worse. The
security profile of the subjects in healthcare system (devices/users) is dynamically evaluated in order to
allow, limit, or refuse access to services and resources of the network over time, in light of the growing
relevance and impact of security threats. We intended to provide a deep insight into some of the access
control models that can be used to identify risks of data leak and privacy loss in the healthcare industry
as the data is sensitive, personal and very detailed.</p>
      <p>We can conclude that among DAC, MAC, RBAC we prefer RBAC as it is a great combination
of both DAC and MAC and it gives us the best of both worlds. RBAC is an intermediate model between
MAC and DAC, as it provides greater flexibility than MAC while it is more manageable than DAC.
This has boosted the acceptance of RBAC in the corporate world. Hence we discussed the three most
suitable models under RBAC i.e. SADAC, MLS-ABAC, DF-RBAC-SC for a healthcare system that
can help us protect sensitive information and identify risks and deal with them.</p>
    </sec>
    <sec id="sec-10">
      <title>7. Acknowledgements</title>
      <p>I would like to extend my heartfelt appreciation to everyone who helped make this research
effort a success. First and foremost, I would like to express my sincere gratitude to Dr. Sushruta Mishra
who served as my research guide for the study for all of his tremendous support. Also want to express
my gratitude to my co-author Ahmed Faraz Siddiqui, who worked with me on the studies and paper
preparation. .</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Kumar</surname>
            <given-names>P</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gupta</surname>
            <given-names>GP</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tripathi</surname>
            <given-names>R.</given-names>
          </string-name>
          <article-title>An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks</article-title>
          .
          <source>Comput Commun</source>
          <volume>166</volume>
          . (
          <year>2021</year>
          ):
          <fpage>110</fpage>
          -
          <lpage>124</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Kumar</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Verma</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumar</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ijaz</surname>
            <given-names>MF</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rawat</surname>
            <given-names>DB</given-names>
          </string-name>
          , et al.
          <article-title>ANAF-IoMT: A novel architectural framework for IoMT-enabled smart healthcare system by enhancing security based on RECC-VC</article-title>
          .
          <source>IEEE Trans Ind Inform</source>
          <volume>18</volume>
          (
          <issue>12</issue>
          ). (
          <year>2022</year>
          ):
          <fpage>8936</fpage>
          -
          <lpage>8943</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Wang</surname>
            <given-names>R-B</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang W-F</surname>
            , Xu
            <given-names>L</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            <given-names>J-S</given-names>
          </string-name>
          , Chu S-C.
          <article-title>Improved DV-hop based on parallel and compact whale optimization algorithm for localization in wireless sensor networks Wirel</article-title>
          . Netw. (
          <year>2022</year>
          ):
          <fpage>1</fpage>
          -
          <lpage>18</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Chen C-M</surname>
            , Chen
            <given-names>Z</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumari</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lin M-C.</surname>
          </string-name>
          LAP-IoHT:
          <article-title>A lightweight authentication protocol for the internet of health things</article-title>
          <source>Sensors</source>
          <volume>22</volume>
          (
          <issue>14</issue>
          ). (
          <year>2022</year>
          ):
          <fpage>5401</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Liang</surname>
            <given-names>L-L</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chu</surname>
            <given-names>S-C</given-names>
          </string-name>
          ,
          <article-title>Du</article-title>
          <string-name>
            <surname>Z-G</surname>
            , Pan
            <given-names>J-S</given-names>
          </string-name>
          .
          <article-title>Surrogate-assisted Phasmatodea population evolution algorithm applied to wireless sensor networks Wirel</article-title>
          . Netw. (
          <year>2022</year>
          ):
          <fpage>1</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Sandhu</surname>
            <given-names>RS</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Samarati</surname>
            <given-names>P</given-names>
          </string-name>
          .
          <article-title>Access control: Principle and practice</article-title>
          .
          <source>IEEE Commun Mag</source>
          <volume>32</volume>
          (
          <issue>9</issue>
          ). (
          <year>1994</year>
          ):
          <fpage>40</fpage>
          -
          <lpage>48</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Benantar</surname>
            <given-names>M.</given-names>
          </string-name>
          <article-title>Access control systems: Security, identity management</article-title>
          and trust models: Springer. (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Qihua</surname>
            <given-names>W</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hongxia</surname>
            <given-names>J</given-names>
          </string-name>
          .
          <article-title>Data leakage mitigation for discretionary access control in collaboration clouds</article-title>
          .
          <source>Proceedings of the 16th ACM symposium on access control models and technologies</source>
          . (
          <year>2011</year>
          ), pp.
          <fpage>103</fpage>
          -
          <lpage>112</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Sven</surname>
            <given-names>B</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stephen</surname>
            <given-names>H</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ahmad-Reza S</surname>
          </string-name>
          .
          <article-title>Flexible and fine-grained mandatory access control on android for diverse security and privacy policies 22nd {USENIX} security symposium ({</article-title>
          <source>USENIX} security 13)</source>
          . (
          <year>2013</year>
          ), pp.
          <fpage>131</fpage>
          -
          <lpage>146</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Hongjiao</surname>
            <given-names>L</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shan</surname>
            <given-names>W</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xiuxia</surname>
            <given-names>T</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weimin</surname>
            <given-names>W</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chaochao</surname>
            <given-names>S.</given-names>
          </string-name>
          <article-title>A survey of extended rolebased access control in cloud computing</article-title>
          .
          <source>In: Proceedings of the 4th international conference on computer engineering</source>
          and networks: Springer. (
          <year>2015</year>
          ), pp.
          <fpage>821</fpage>
          -
          <lpage>831</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Liu</surname>
            <given-names>D</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dong</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yan</surname>
            <given-names>B</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            <given-names>J</given-names>
          </string-name>
          . DF-RBAC:
          <article-title>Dynamic and fine-grained role-based access control scheme with smart contract</article-title>
          .
          <source>Procedia Comput Sci</source>
          <volume>187</volume>
          . (
          <year>2021</year>
          ):
          <fpage>359</fpage>
          -
          <lpage>364</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Hu Vincent</surname>
            <given-names>C</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Richard</surname>
            <given-names>KD</given-names>
          </string-name>
          , Ferraiolo David F,
          <string-name>
            <surname>Jeffrey</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>Attribute-based access control Computer 48(2</article-title>
          ). (
          <year>2015</year>
          ):
          <fpage>85</fpage>
          -
          <lpage>88</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Hu</surname>
            <given-names>VC</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ferraiolo</surname>
            <given-names>D</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuhn</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schnitzer</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sandlin</surname>
            <given-names>K</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miller</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Scarfone</surname>
            <given-names>K.</given-names>
          </string-name>
          <article-title>Guide to attribute based access control (ABAC) definition and considerations</article-title>
          .
          <source>NIST Spec Publ 800- 162</source>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Aghili</surname>
            <given-names>SF</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sedaghat</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singelée</surname>
            <given-names>D</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gupta M-A.</surname>
          </string-name>
          MLS-ABAC:
          <article-title>Efficient Multi-Level Security Attribute-Based Access Control scheme</article-title>
          .
          <source>Future Gener Comput Syst</source>
          <volume>131</volume>
          . (
          <year>2022</year>
          ):
          <fpage>75</fpage>
          -
          <lpage>90</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Hao</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huang</surname>
            <given-names>C</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ni</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rong</surname>
            <given-names>H</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xian</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shen</surname>
            <given-names>X</given-names>
          </string-name>
          .
          <article-title>Fine-grained data access control with attribute-hiding policy for cloud-based IoT</article-title>
          .
          <source>Comput Netw</source>
          <volume>153</volume>
          . (
          <year>2019</year>
          ):
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Ravidas</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lekidis</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Paci</surname>
            <given-names>F</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zannone</surname>
            <given-names>N.</given-names>
          </string-name>
          <article-title>Access control in internet-of-things: A survey</article-title>
          .
          <source>J Netw Comput Appl</source>
          <volume>144</volume>
          (
          <issue>15</issue>
          ). (
          <year>2019</year>
          ):
          <fpage>79</fpage>
          -
          <lpage>101</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Kayes</surname>
            <given-names>ASM</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rahayu</surname>
            <given-names>W</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Watters</surname>
            <given-names>P</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alazab</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dillon</surname>
            <given-names>T</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chang</surname>
            <given-names>E</given-names>
          </string-name>
          .
          <article-title>Achieving security scalability and flexibility using fog-based context-aware access control</article-title>
          .
          <source>Future Gener Comput Syst</source>
          <volume>107</volume>
          . (
          <year>2020</year>
          ):
          <fpage>307</fpage>
          -
          <lpage>323</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Aftab</surname>
            <given-names>MU</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oluwasanmi</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alharbi</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sohaib</surname>
            <given-names>O</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nie</surname>
            <given-names>X</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qin</surname>
            <given-names>Z</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ngo</surname>
            <given-names>ST</given-names>
          </string-name>
          .
          <article-title>Secure and dynamic access control for the Internet of Things (IoT) based traffic system PeerJ Comput</article-title>
          . Sci. (
          <year>2021</year>
          ):
          <fpage>1</fpage>
          -
          <lpage>26</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Bhatt</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pham</surname>
            <given-names>TK</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gupta</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Benson</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Park</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sandhu</surname>
            <given-names>R</given-names>
          </string-name>
          .
          <article-title>Attribute-based access control for AWS Internet of Things and secure industries of the future</article-title>
          .
          <source>IEEE Access 9</source>
          . (
          <year>2021</year>
          ):
          <fpage>107200</fpage>
          -
          <lpage>107223</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Zhang</surname>
            <given-names>Y</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yutaka</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sasabe</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kasahara S</surname>
          </string-name>
          .
          <article-title>Attribute-based access control for smart cities: A smart-contract-driven framework</article-title>
          .
          <source>IEEE Internet Things J</source>
          <volume>8</volume>
          (
          <issue>8</issue>
          ). (
          <year>2021</year>
          ):
          <fpage>6372</fpage>
          -
          <lpage>6384</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Lyu</surname>
            <given-names>Q</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qi</surname>
            <given-names>Y</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            <given-names>Z</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            <given-names>H</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            <given-names>Q</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zheng</surname>
            <given-names>N.</given-names>
          </string-name>
          <article-title>SBAC: A secure blockchain-based access control framework for information-centric networking Netw</article-title>
          .
          <source>J Comput Appl</source>
          <volume>149</volume>
          . (
          <year>2020</year>
          ):
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Ghaffari</surname>
            <given-names>F</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bertin</surname>
            <given-names>E</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Crespi</surname>
            <given-names>N</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Behrad</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hatin</surname>
            <given-names>J.</given-names>
          </string-name>
          <article-title>A novel access control method via smart contracts for internet-based service provisioning</article-title>
          .
          <source>IEEE Access 9</source>
          . (
          <year>2021</year>
          ):
          <fpage>81253</fpage>
          -
          <lpage>81273</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Liu</surname>
            <given-names>Y</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qiu</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            <given-names>M.</given-names>
          </string-name>
          <article-title>Blockchain-based access control approaches</article-title>
          ,
          <source>8th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud/7th IEEE International Conference on Edge Computing and Scalable Cloud</source>
          ,
          <string-name>
            <surname>EdgeCom.</surname>
          </string-name>
          (
          <year>2021</year>
          ), pp.
          <fpage>127</fpage>
          -
          <lpage>132</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Carvalho</surname>
            <given-names>M SE.</given-names>
          </string-name>
          <article-title>CaaS-security as a service</article-title>
          .
          <source>Inf Syst</source>
          . (
          <year>2011</year>
          ):
          <fpage>20</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Sharma</surname>
            <given-names>D</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dhote</surname>
            <given-names>CA</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potey</surname>
            <given-names>M</given-names>
          </string-name>
          .
          <article-title>Security-as-a-service from clouds: A comprehensive analysisInt</article-title>
          .
          <source>J Comput Appl</source>
          <volume>67</volume>
          (
          <issue>3</issue>
          ). (
          <year>2011</year>
          ):
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>