Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare

被引:0
|
作者
Jin, Wenzhong [1 ,2 ]
Wu, Shanjun [1 ,2 ]
Feng, Yu [1 ,2 ]
Wang, Huijing [2 ,3 ]
Fu, Chunyu [2 ,4 ]
机构
[1] Shanghai Ninth Peoples Hosp, Dept Informat Ctr, Shanghai, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Med, Shanghai, Peoples R China
[3] Shanghai Ninth Peoples Hosp, Dept Informat Ctr, Shanghai, Peoples R China
[4] Shanghai Gen Hosp, Dept Informat Ctr, Shanghai, Peoples R China
关键词
Artificial intelligence; intelligent healthcare system; sustainable development; big data; healthcare; 5G communication; information safety; security;
D O I
10.34028/iajit/22/2/5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The fundamental attributes of the 5G network, namely its high bandwidth and concurrency, reduced latency, and ability to handle high-mobility big data platforms, render it valuable in tackling forthcoming healthcare challenges and emerging health demands like as the COVID-19 pandemic. The enforcement of the security component within a 5G-based Intelligent Healthcare System (IHS), which encompasses critical information and facilities, is more imperative and significant. In the context of deploying a healthcare system in a distributed manner, the effectiveness of passive security measures, such as information encryption and isolation, employed on traditional health platforms is insufficient to address the requirements for information and facility interchange across "cloud-edge-terminals" in the era of 5G. This study proposes a security solution for an intelligent health platform based on the Zero-Trust Model (ZTM) in the context of 5G technology. This study presents fundamental principles like the real-time monitoring of network asset security, risk evaluation of individual access requests, and access permission and decision-making through the use of a dynamic trust algorithm. The 5G IHS encompasses four primary dimensions, namely "theme" which includes people, terminals, and applications, "item" which encompasses information, platforms, and facilities, "behavior," and "environment". With the highest accuracy (98.9), precision (95.9), recall (98), and F1-score (95.5) among the several approaches, the suggested ZTM method better the others consistently. These overall numerical results for accuracy, precision, recall, and F1-score across methodologies are shown. A lower but more variable Optimized Gated Recurrent Unit (DEO-GRU) across all measures. The proposed security system has been subjected to thorough testing and implementation at an industrial level, showcasing its ability to fulfill the criteria for dynamic shield and end-to-end safety execution of information, users, and facilities present in an Intelligent Healthcare (IH) scheme based on 5G technology.
引用
收藏
页码:263 / 277
页数:15
相关论文
共 50 条
  • [41] Zero Trust Security Architecture for 6G Open Radio Access Networks (ORAN)
    Moudoud, Hajar
    Houda, Zakaria Abou El
    Brik, Bouziane
    IEEE Networking Letters, 2024, 6 (04): : 272 - 275
  • [42] Physical Layer Security in 5G Wireless Networks for Data Protection
    Munisankaraiah, Sreeram
    Kumar, Arun A.
    PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 883 - 887
  • [43] Security Enhancements to Subscriber Privacy Protection Scheme in 5G Systems
    Liu, Fuwen
    Su, Li
    Yang, Bo
    Du, Haitao
    Qi, Minpeng
    He, Shen
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 451 - 456
  • [44] A Trust-Based Security Scheme for 5G UAV Communication Systems
    Su, Yu
    Zhou, Jian
    Guo, Zhinuan
    2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 371 - 374
  • [45] Design of a Security and Trust Framework for 5G Multi-domain Scenarios
    Jorquera Valero, Jose Maria
    Sanchez Sanchez, Pedro Miguel
    Lekidis, Alexios
    Fernandez Hidalgo, Javier
    Gil Perez, Manuel
    Shuaib Siddiqui, M.
    Huertas Celdran, Alberto
    Martinez Perez, Gregorio
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2022, 30 (01)
  • [46] Empowering Security and Trust in 5G and Beyond: A Deep Reinforcement Learning Approach
    Moudoud, Hajar
    Cherkaoui, Soumaya
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2023, 4 : 2410 - 2420
  • [47] Design of a Security and Trust Framework for 5G Multi-domain Scenarios
    José María Jorquera Valero
    Pedro Miguel Sánchez Sánchez
    Alexios Lekidis
    Javier Fernandez Hidalgo
    Manuel Gil Pérez
    M. Shuaib Siddiqui
    Alberto Huertas Celdrán
    Gregorio Martínez Pérez
    Journal of Network and Systems Management, 2022, 30
  • [48] Attacks and Threats Verification Based on 4G/5G Security Architecture
    Yang, Lie
    Weng, Chien-Erh
    Chen, Hsing-Chung
    Chen, Yang-Cheng-Kuang
    Yao, Yung-Cheng
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2023, 2023, 177 : 240 - 249
  • [49] Trust, Security and Privacy through Remote Attestation in 5G and 6G Systems
    Oliver, Ian
    2021 IEEE 4TH 5G WORLD FORUM (5GWF 2021), 2021, : 368 - 373
  • [50] An Intelligent and Trust UAV-Assisted Code Dissemination 5G System for Industrial Internet-of-Things
    Liang, Jingpu
    Liu, Wei
    Xiong, Neal N.
    Liu, Anfeng
    Zhang, Shaobo
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (04) : 2877 - 2889