Research on Medical Security System Based on Zero Trust

被引:6
|
作者
Wang, Zhiqiang [1 ]
Yu, Xinyue [1 ]
Xue, Peiyang [1 ]
Qu, Yunhan [1 ]
Ju, Lei [1 ]
机构
[1] Beijing Elect Sci & Technol Inst, Beijing 100070, Peoples R China
基金
中国博士后科学基金;
关键词
network security threats; zero-trust security system; trust assessment; dynamic access control;
D O I
10.3390/s23073774
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With the rapid development of Internet of Things technology, cloud computing, and big data, the combination of medical systems and information technology has become increasingly close. However, the emergence of intelligent medical systems has brought a series of network security threats and hidden dangers, including data leakage and remote attacks, which can directly threaten patients' lives. To ensure the security of medical information systems and expand the application of zero trust in the medical field, we combined the medical system with the zero-trust security system to propose a zero-trust medical security system. In addition, in its dynamic access control module, based on the RBAC model and the calculation of user behavior risk value and trust, an access control model based on subject behavior evaluation under zero-trust conditions (ABEAC) was designed to improve the security of medical equipment and data. Finally, the feasibility of the system is verified through a simulation experiment.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Cloud-Native Security Using Zero Trust
    Moyle, Ed
    ISACA Journal, 2022, 3 : 33 - 41
  • [32] Research of Web Security Model based on Zero Knowledge Protocol
    Al-Bajjari, Amro Louay
    Yuan, Ling
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 68 - 71
  • [33] Integrating Zero Trust in the cyber supply chain security
    Stuckert do Amaral, Thiago Melo
    Costa Gondim, Joao Jose
    2021 WORKSHOP ON COMMUNICATION NETWORKS AND POWER SYSTEMS (WCNPS), 2021,
  • [34] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT
    Azad, Muhammad Ajmal
    Abdullah, Sidrah
    Arshad, Junaid
    Lallie, Harjinder
    Ahmed, Yussuf Hassan
    INTERNET OF THINGS, 2024, 27
  • [35] Fine-grained Big Data Security Method Based on Zero Trust Model
    Yang Tao
    Zhu Lei
    Peng Ruxiang
    2018 IEEE 24TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2018), 2018, : 1040 - 1045
  • [36] Research on Recommender System based on Social Trust
    Ren, Yi
    Chi, Cuirong
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND EDUCATION RESEARCH (SSER 2018), 2018, 238 : 352 - 356
  • [37] Security and trust enhanced mobile agent based system design
    Foster, D
    Varadharajan, V
    Third International Conference on Information Technology and Applications, Vol 1, Proceedings, 2005, : 155 - 160
  • [38] Towards Zero-Trust Hardware Architectures in Safety and Security Critical System-on-Chips
    Restuccia, Francesco
    Kastner, Ryan
    2024 IEEE 3RD REAL-TIME AND INTELLIGENT EDGE COMPUTING WORKSHOP, RAGE 2024, 2024, : 33 - 36
  • [39] A Trust-Based Security Research Method for Internet of Things Terminal
    Liu, Zhe
    Zhao, Bo
    Li, Jiyang
    TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 267 - 280
  • [40] Research of Trust Model Based on Peer-to-Peer Network Security
    Kun, Huang
    Lu, Wang
    2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA), 2013, : 126 - 129