Research on Medical Security System Based on Zero Trust

被引:6
|
作者
Wang, Zhiqiang [1 ]
Yu, Xinyue [1 ]
Xue, Peiyang [1 ]
Qu, Yunhan [1 ]
Ju, Lei [1 ]
机构
[1] Beijing Elect Sci & Technol Inst, Beijing 100070, Peoples R China
基金
中国博士后科学基金;
关键词
network security threats; zero-trust security system; trust assessment; dynamic access control;
D O I
10.3390/s23073774
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With the rapid development of Internet of Things technology, cloud computing, and big data, the combination of medical systems and information technology has become increasingly close. However, the emergence of intelligent medical systems has brought a series of network security threats and hidden dangers, including data leakage and remote attacks, which can directly threaten patients' lives. To ensure the security of medical information systems and expand the application of zero trust in the medical field, we combined the medical system with the zero-trust security system to propose a zero-trust medical security system. In addition, in its dynamic access control module, based on the RBAC model and the calculation of user behavior risk value and trust, an access control model based on subject behavior evaluation under zero-trust conditions (ABEAC) was designed to improve the security of medical equipment and data. Finally, the feasibility of the system is verified through a simulation experiment.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Correlation Research of Medical Security Management System Network Platform in Medical Practice
    Wang Jie
    Zhang Fan
    Hao Jian
    Yu Li-nong
    Fei Jun
    Hao Ping
    Shen Ya-wei
    Chang Yue-jin
    INTERNATIONAL CONFERENCE ON SOLID STATE DEVICES AND MATERIALS SCIENCE, 2012, 25 : 978 - 981
  • [42] Services for Zero Trust Architectures - A Research Roadmap
    Bertino, Elisa
    Brancik, Kenneth
    2021 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2021, 2021, : 14 - 20
  • [43] TRUST BASED GRID SECURITY AND SECURITY MODELS
    Kavecky, Slavomir
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2012, 4 (03): : 81 - 92
  • [44] Improving Security in Portable Medical Devices and Mobile Health Care System Using Trust
    Devi, B. Padmini
    Chitra, S.
    Madhusudhanan, B.
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2016, 6 (08) : 1955 - 1960
  • [45] Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust
    Zhu, Xiaoyan
    Jia, Ruchun
    Zhang, Tingrui
    Yao, Song
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (03): : 4363 - 4377
  • [46] Secure Service Function Chaining in the Context of Zero Trust Security
    Bradatsch, Leonard
    Haeberle, Marco
    Steinert, Benjamin
    Kargl, Frank
    Menth, Michael
    PROCEEDINGS OF THE 2022 47TH IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2022), 2022, : 123 - 131
  • [47] Why zero trust security is better than biometrics and passwords
    Iggbom J.
    Biometric Technology Today, 2022, 2022 (05)
  • [48] A Zero Trust Hybrid Security and Safety Risk Analysis Method
    Papakonstantinou, Nikolaos
    Van Bossuyt, Douglas L.
    Linnosmaa, Joonas
    Hale, Britta
    O'Halloran, Bryan
    JOURNAL OF COMPUTING AND INFORMATION SCIENCE IN ENGINEERING, 2021, 21 (05)
  • [49] Security of Zero Trust Networks in Cloud Computing: A Comparative Review
    Sarkar, Sirshak
    Choudhary, Gaurav
    Shandilya, Shishir Kumar
    Hussain, Azath
    Kim, Hwankuk
    SUSTAINABILITY, 2022, 14 (18)
  • [50] ZeroDNS: Towards Better Zero Trust Security using DNS
    Csikor, Levente
    Ramachandran, Sriram
    Lakshminarayanan, Anantharaman
    PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, 2022, : 699 - 713