TOWARDS INTEGRITY PROTECTION OF SOFTWARE FOR E-HEALTH DATA

被引:0
|
作者
Rahman, Sk Md Mizanur [1 ]
机构
[1] King Saud Univ, Coll Comp Informat Sci, Riyadh, Saudi Arabia
关键词
Software Protection; Cryptographic Hash Functions; Signature; Tampering; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Integrity protection (IP) of software which deals with eHealth data, addresses the problem of static or dynamic code modification of the software. An attacker with the ability to modify the execution of software which deals with eHealth data can tamper with eHealth data. The target of IP is to protect the software assets; in this case it is to protect eHealth data. By modifying the binary source of an application, an attacker can produce a modified version of the application which can run in favor of the attacker objectives. Finally, if an attacker distributes the modified version of an application which deals with eHealth data, can harm eHealth environment (e.g., government agency) by disclosing the identity of the stake holders. The existing literatures (very few are disclosed and are available in academia) mainly focus on protection of tampering for static code of a software application. However, in practically, while an instance of software runs on unprotected memory environment, an attacker can launch dynamic modification of the running code and achieves the desired advantages. Therefore, the existing approaches do not tackle the tampering issues during the execution of a software application. The proposed research aims to explore this problem and proposes solutions based on a light-weight cryptographic methodology by generating secure cryptographic signature, which is a scrambled signature of a software application generated using cryptographic function and its security analysis has been investigated.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] From sensors and data to data mining for e-Health
    Lenca, Philippe
    Soulas, Julie
    Berrouiguet, Sofian
    2016 8TH INTERNATIONAL CONFERENCE ON KNOWLEDGE AND SMART TECHNOLOGY (KST), 2016, : XIX - XIX
  • [22] An Authentic and Privacy-Preserving Scheme Towards E-Health Data Transmission Service
    Fan, Qing
    Xie, Yumeng
    Zhang, Chuan
    Liu, Ximeng
    Zhu, Liehuang
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (05) : 1969 - 1982
  • [23] NEW LENS ON HEALTH CONSUMERISM: E-HEALTH CONSUMERISM, E-HEALTH TRUST, AND E-HEALTH LITERACY
    Seckin, G.
    Hughes, S.
    GERONTOLOGIST, 2016, 56 : 46 - 46
  • [24] Towards an e-Health Strategy for Vietnam - Issues and Approaches
    Anna Shillabeer
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS MANAGEMENT AND EVALUATION (ICIME 2013), 2013, : 377 - 384
  • [25] Towards Document Flow Discovery in e-health Systems
    Repta, Dragos
    Sacala, Ioan Stefan
    Moisescu, Mihnea Alexandru
    Dumitrache, Ioan
    2018 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS (IS), 2018, : 267 - 271
  • [26] Dietitians in the electronic age: Progressing towards e-health
    Probst, Yasmine
    NUTRITION & DIETETICS, 2011, 68 (03) : 177 - 178
  • [27] Towards Blockchain-Based Authentication for E-Health
    Hssina, Badr
    Ezzikouri, Hanane
    Esaili, Chama
    Erritali, Mohamed
    ADVANCED INTELLIGENT SYSTEMS FOR SUSTAINABLE DEVELOPMENT (AI2SD'2020), VOL 2, 2022, 1418 : 14 - 28
  • [28] An E-Health system for data stream analysis
    Moreira, Diego A. B.
    Chaves, Levy G.
    Gomes, Rafael L.
    Celestino Jr, Joaquim
    2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, : 494 - 499
  • [29] Healthy E-Health? Think 'Environmental E-Health'!
    Scott, Richard E.
    Saunders, Chad
    Palacios, Mone
    Duyen Thi Kim Nguyen
    Ali, Sajid
    GLOBAL TELEHEALTH, 2010, 161 : 132 - 138
  • [30] Big Data Interoperability in e-Health Systems
    Gupta, Nidhi
    Gupta, Bharat
    2019 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2019), 2019, : 217 - 222