A preview of this full-text is provided by Wiley.
Content available from Transactions on Emerging Telecommunications Technologies
This content is subject to copyright. Terms and conditions apply.
Received: 24 December 2021 Revised: 7 March 2022 Accepted: 13 June 2022
DOI: 10.1002/ett.4589
RESEARCH ARTICLE
Ontology-based data access control model supported with
grid computing for improving security in healthcare data
G. M. Kiran1N. Nalini2
1Computer Science and Engineering,
Shridevi Institute of Engineering and
Technology, Tumakuru, Karnataka, India
2Computer Science and Engineering,
NITTE Meenakshi Institute of
Technology, Bengaluru, Karnataka, India
Correspondence
G. M. Kiran, Shridevi Institute of
Engineering and Technology, Tumakuru,
Karnataka 572106, India.
Email: Kirangm900@gmail.com
Abstract
Ontology is broadly applied in various fields for creating trust-based data access
control models. In the case of the medical field, utilizing ontology is highly
recommended for securing the medical report and patient information. Here,
ontology is integrated with the grid computing system for achieving better
authentication and security in the healthcare system. Various ontology based
data access control models are designed by different authors for achieving
enhanced user authorization and security. Security is still found to be a major
issue in the existing techniques. To overcome this issue, the proposed work
developedamedicalontologywiththreetiersecureaccesscontrol.The proposed
method is processed in three layers. In the first layer, job scheduling for user
is achieved. Job scheduling is carried out by scheduler using a deadline prior-
ity based scheduling algorithm. Users are scheduled with a different job based
on their priority level such as low, medium, and high. In the second layer, role
based policy is developed for finding and eliminating the accessing of unau-
thorized users. The third layer is used for securing medical database. Medical
database is secured from various through encrypting the data using XOR cryp-
tography algorithm. The proposed architecture is validated using some of the
metrics such as turnaround time, tardiness, actual time delay, and throughput.
The turnaround time, tardiness, and actual-time delay attains for the proposed
architecture are 64.60, 4.90, and 1.52seconds, respectively. Then, the through-
put value reaches for 25 bits length of encryption is 0.88Mbps. The simulation
analysis reveals that the proposed architecture reduces the waiting time of users
and improves medical data security.
1INTRODUCTION
Ontology is the formal definition of conceptualization, which defines co-concepts, taxonomy, relationship to
human-readable text, and formal, machine-readable theories.1It provides systematic definitions and axioms of control-
linginterpretationsof terms. An ontology allows for a varietyofstructuralandnonstructuraltypes, such as generalization,
aggregation, inheritance, and instantiation. Ontology is a collection of concepts and their interrelationships collectively
providing a concise overview of an application domain. The uses of ontology are a semantic description of vocabulary for
complex processes, and that requires a careful study of specific knowledge.2,3 An ontology is distributed as well as shared
for utilization, and tools of ontology are provided interoperability. The user application is programmed to improve the
Trans Emerging Tel Tech. 2022;33:e4589. wileyonlinelibrary.com/journal/ett © 2022 John Wiley & Sons, Ltd. 1of19
https://doi.org/10.1002/ett.4589