skip to main content
10.1145/3625156.3625193acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicissConference Proceedingsconference-collections
research-article

Enhancing Secure Access and Authorization in Healthcare IoT through an Innovative Framework: Integrating OAuth, DIDs, and VCs

Published:21 November 2023Publication History

ABSTRACT

Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed framework, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. An Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector.

Skip Supplemental Material Section

Supplemental Material

References

  1. C. Allen, The path to self-sovereign identity. 2016.Google ScholarGoogle Scholar
  2. F. Wang and P. De Filippi, ‘Self-sovereign identity in a globalized world: Credentials-based identity systems as a driver for economic inclusion’, Front. Blockchain, vol. 2, 2020.Google ScholarGoogle Scholar
  3. A. Mühle, A. Grüner, T. Gayvoronskaya, and C. Meinel, ‘A survey on essential components of a Self-Sovereign Identity’, arXiv [cs.CR], 2018.Google ScholarGoogle ScholarCross RefCross Ref
  4. A. Abraham, C. Schinnerl, and S. More, SSI Strong Authentication using a Mobile-phone based Identity Wallet Reaching a High Level of Assurance: In: Proceedings of the 18th International Conference on Security and Cryptography. 2021.Google ScholarGoogle Scholar
  5. N. Naik and P. Jenkins, ‘Self-sovereign identity specifications: Govern your identity through your digital wallet using blockchain technology’, in 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2020.Google ScholarGoogle ScholarCross RefCross Ref
  6. F. Schardong and R. Custódio, ‘Self-Sovereign Identity: A systematic review, mapping and taxonomy’, Sensors (Basel), vol. 22, no. 15, 2022.Google ScholarGoogle Scholar
  7. ‘Decentralized Identifiers (DIDs) v1.0’, Github.io. [Online]. Available: https://w3c.github.io/did-core/. [Accessed: 30-May-2023].Google ScholarGoogle Scholar
  8. M. Sharma and J. Lim, ‘A survey of methods guaranteeing user privacy based on blockchain in internet-of -things’, in Proceedings of the 2019 2nd International Conference on Data Science and Information Technology, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. ‘Verifiable credentials data model v2.0’, Github.io. [Online]. Available: https://w3c.github.io/vc-data-model/. [Accessed: 30-May-2023].Google ScholarGoogle Scholar
  10. T. Zhou, X. Li, and H. Zhao, ‘EverSSDI: blockchain-based framework for verification, authorisation and recovery of self-sovereign identity using smart contracts’, Int. J. Comput. Appl. Technol., vol. 60, no. 3, p. 281, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. L. Bathen , ‘SelfIs: Self-Sovereign Biometric IDs’, in 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2019.Google ScholarGoogle ScholarCross RefCross Ref
  12. D. Hardt, ‘The OAuth 2.0 authorization framework’, RFC Editor, 2012.Google ScholarGoogle Scholar
  13. ‘What is OAuth 2.0 and what does it do for you?’, Auth0. [Online]. Available: https://auth0.com/intro-to-iam/what-is-oauth-2. [Accessed: 30-May-2023].Google ScholarGoogle Scholar
  14. Auth, ‘Which OAuth 2.0 flow should I use?’, Auth0 Docs. [Online]. Available: https://auth0.com/docs/get-started/authentication-and-authorization-flow/which-oauth-2-0-flow-should-i-use. [Accessed: 30-May-2023].Google ScholarGoogle Scholar
  15. L. Seitz, S. Gerdes, G. Selander, M. Mani, and S. Kumar, ‘RFC 7744: Use cases for authentication and authorization in constrained environments’, IETF Datatracker, 29-Jan-2016. [Online]. Available: https://datatracker.ietf.org/doc/html/rfc7744. [Accessed: 31-May-2023].Google ScholarGoogle Scholar
  16. M. B. Jones, E. Wahlstroem, S. Erdtman, and H. Tschofenig, ‘RFC 8392: CBOR Web Token (CWT)’, IETF Datatracker, 08-May-2018. [Online]. Available: https://datatracker.ietf.org/doc/html/rfc8392. [Accessed: 31-May-2023].Google ScholarGoogle Scholar
  17. ‘Federated authorization for user-managed access (UMA) 2.0’, Kantarainitiative.org. [Online]. Available: https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-federated-authz-2.0.html. [Accessed: 31-May-2023].Google ScholarGoogle Scholar
  18. ‘OpenID Connect Core 1.0 incorporating errata set 1’, Openid.net. [Online]. Available: https://openid.net/specs/openid-connect-core-1_0.html. [Accessed: 31-May-2023].Google ScholarGoogle Scholar
  19. S. C. Tamane, V. K. Solanki, and M. S. Joshi, ‘The basics of big data and security concerns’, in Privacy and Security Policies in Big Data, IGI Global, 2017, pp. 1–12.Google ScholarGoogle Scholar
  20. M. Yamin and A. A. A. Sen, ‘Improving privacy and security of user data in location Based Services’, in Research Anthology on Privatizing and Securing Data, IGI Global, 2021, pp. 1411–1437.Google ScholarGoogle Scholar
  21. P. Mahalle, S. Babar, N. R. Prasad, and R. Prasad, ‘Identity management framework towards internet of things (IoT): Roadmap and key challenges’, in Recent Trends in Network Security and Applications, Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 430–439.Google ScholarGoogle ScholarCross RefCross Ref
  22. N. Ambritta P, P. N. Railkar, P. N. Mahalle, Department of Computer Engineering, Smt. Kashibai Navale College of Engineering,University of Pune, Pune, India-411041, Department of Computer Engineering, Smt. Kashibai Navale College of Engineering,University of Pune, Pune, India-411041, and Department of Computer Engineering, Smt. Kashibai Navale College of Engineering,University of Pune, Pune, India-411041, ‘Proposed identity and access management in future internet (IAMFI): A behavioral modeling approach’, J. ICT Stand., vol. 2, no. 1, pp. 1–36, 2014.Google ScholarGoogle Scholar
  23. S. Ben Mokhtar, P.-G. Raverdy, A. Urbieta, and R. S. Cardoso, ‘Interoperable semantic and syntactic service discovery for ambient computing environments’, in Innovative Applications of Ambient Intelligence, IGI Global, 2011, pp. 213–232.Google ScholarGoogle Scholar
  24. P. A. Shelar, P. N. Mahalle, and G. Shinde, ‘Secure data transmission in underwater sensor network: Survey and discussion’, in Studies in Systems, Decision and Control, Cham: Springer International Publishing, 2020, pp. 323–360.Google ScholarGoogle Scholar
  25. ‘Vehicular networks security: attacks, requirements, challenges and current contributions’, Int. J. Ambient Comput. Intell.Google ScholarGoogle Scholar
  26. M. B. Salunke, P. N. Mahalle, and P. S. Dhotre, ‘Comprehensive threat analysis and activity modelling of physical layer attacks in internet of things’, in Handbook on ICT in Developing Countries, 1st Edition., New York: River Publishers, 2022, pp. 237–267.Google ScholarGoogle ScholarCross RefCross Ref
  27. K. Assa-Agyei, F. Olajide, and A. Lotfi, ‘Security and privacy issues in IoT healthcare application for disabled users in developing economies’, J. Internet Technol. Secur. Trans., vol. 10, no. 1, pp. 770–779, 2022.Google ScholarGoogle ScholarCross RefCross Ref
  28. I. Keshta, ‘AI-driven IoT for smart health care: Security and privacy issues’, Inform. Med. Unlocked, vol. 30, no. 100903, p. 100903, 2022.Google ScholarGoogle ScholarCross RefCross Ref
  29. I. Sadek, J. Codjo, S. U. Rehman, and B. Abdulrazak, ‘Security and privacy in the internet of things healthcare systems: Toward a robust solution in real-life deployment’, Comput. Methods Programs Biomed. Update, vol. 2, no. 100071, p. 100071, 2022.Google ScholarGoogle ScholarCross RefCross Ref
  30. I. Makhdoom, I. Zhou, M. Abolhasan, J. Lipman, and W. Ni, ‘PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities’, Comput. Secur., vol. 88, no. 101653, p. 101653, 2020.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. I. Sadek, S. U. Rehman, J. Codjo, and B. Abdulrazak, ‘Privacy and security of IoT based healthcare systems: Concerns, solutions, and recommendations’, in How AI Impacts Urban Living and Public Health, Cham: Springer International Publishing, 2019, pp. 3–17.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. A. Delignat-Lavaud, C. Fournet, M. Kohlweiss, and B. Parno, ‘Cinderella: Turning shabby X.509 certificates into elegant anonymous credentials with the magic of verifiable computation’, in 2016 IEEE Symposium on Security and Privacy (SP), 2016.Google ScholarGoogle ScholarCross RefCross Ref
  33. E. Rescorla, K. Oku, N. Sullivan, and C. A. Wood, ‘Encrypted Server Name Indication for TLS 1.3’, IETF Datatracker. [Online]. Available: https://datatracker.ietf.org/doc/html/draft-ietf-tls-esni-02. [Accessed: 31-May-2023].Google ScholarGoogle Scholar
  34. ‘Decentralized identifiers (DIDs) v1.0’, Www.w3.org. [Online]. Available: https://www.w3.org/TR/did-core/. [Accessed: 31-May-2023].Google ScholarGoogle Scholar
  35. ‘Verifiable credentials data model v1.1’, Www.w3.org. [Online]. Available: https://www.w3.org/TR/vc-data-model/. [Accessed: 31-May-2023].Google ScholarGoogle Scholar
  36. L. Seitz, G. Selander, E. Wahlstroem, S. Erdtman, and H. Tschofenig, ‘Authentication and authorization for constrained environments using the OAuth 2.0 framework (ACE-OAuth)’, RFC Editor, 2022.Google ScholarGoogle Scholar
  37. D. Lagutin, Y. Kortesniemi, N. Fotiou, and V. A. Siris, ‘Enabling decentralised identifiers and verifiable credentials for constrained IoT devices using OAuth-based delegation’, in Proceedings 2019 Workshop on Decentralized IoT Systems and Security, 2019Google ScholarGoogle ScholarCross RefCross Ref
  38. P. Wouters, H. Tschofenig, J. Gilmore, S. Weiler, and T. Kivinen, “Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS),” IETF RFC7250, 2014Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Enhancing Secure Access and Authorization in Healthcare IoT through an Innovative Framework: Integrating OAuth, DIDs, and VCs

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICISS '23: Proceedings of the 2023 6th International Conference on Information Science and Systems
      August 2023
      301 pages
      ISBN:9798400708206
      DOI:10.1145/3625156

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 November 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)31
      • Downloads (Last 6 weeks)3

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format