TOWARDS INTEGRITY PROTECTION OF SOFTWARE FOR E-HEALTH DATA

被引:0
|
作者
Rahman, Sk Md Mizanur [1 ]
机构
[1] King Saud Univ, Coll Comp Informat Sci, Riyadh, Saudi Arabia
关键词
Software Protection; Cryptographic Hash Functions; Signature; Tampering; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Integrity protection (IP) of software which deals with eHealth data, addresses the problem of static or dynamic code modification of the software. An attacker with the ability to modify the execution of software which deals with eHealth data can tamper with eHealth data. The target of IP is to protect the software assets; in this case it is to protect eHealth data. By modifying the binary source of an application, an attacker can produce a modified version of the application which can run in favor of the attacker objectives. Finally, if an attacker distributes the modified version of an application which deals with eHealth data, can harm eHealth environment (e.g., government agency) by disclosing the identity of the stake holders. The existing literatures (very few are disclosed and are available in academia) mainly focus on protection of tampering for static code of a software application. However, in practically, while an instance of software runs on unprotected memory environment, an attacker can launch dynamic modification of the running code and achieves the desired advantages. Therefore, the existing approaches do not tackle the tampering issues during the execution of a software application. The proposed research aims to explore this problem and proposes solutions based on a light-weight cryptographic methodology by generating secure cryptographic signature, which is a scrambled signature of a software application generated using cryptographic function and its security analysis has been investigated.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Data security in e-health monitoring system
    Abhishek, B.
    Panjanathan, Rukmani
    Sarobin, Vergin Raja
    Raja, Benson Edwin
    Narendra, Modigari
    MATERIALS TODAY-PROCEEDINGS, 2022, 62 : 4620 - 4628
  • [32] Summarisation and visualisation of e-health data repositories
    Hallett, Catalina
    Power, Richard
    Scott, Donia
    PROCEEDINGS OF THE UK E-SCIENCE ALL HANDS MEETING 2006, 2006, : 69 - +
  • [33] "Ok Google, am I sick?": artificial intelligence, e-health, and data protection regulation
    Guarda, Paolo
    BIOLAW JOURNAL-RIVISTA DI BIODIRITTO, 2019, (01): : 359 - 375
  • [34] e-Health
    Burchert, H
    BETRIEBSWIRTSCHAFTLICHE FORSCHUNG UND PRAXIS, 2004, 56 (06): : 615 - 615
  • [35] e-Health
    Meusel, Dirk
    JOURNAL OF PUBLIC HEALTH-HEIDELBERG, 2005, 13 (06): : 329 - 330
  • [36] Guidelines for research and design of software for children with ASD in e-health
    Bondioli, Mariasole
    Buzzi, Maria Claudia
    Buzzi, Marina
    Chessa, Stefano
    Jaccheri, Letizia
    Senette, Caterina
    Pelagatti, Susanna
    UNIVERSAL ACCESS IN THE INFORMATION SOCIETY, 2024, 23 (04) : 1909 - 1930
  • [37] Canada's e-health software mess: simple solution
    Tevaarwerk, Gerald J. M.
    CANADIAN MEDICAL ASSOCIATION JOURNAL, 2011, 183 (02) : 226 - 226
  • [38] E-health
    Anon
    ITU News, 2002, (04):
  • [39] E-health
    Kristel Meijers
    TvPO, 2024, 19 (2) : 12 - 14
  • [40] E-health
    Kirkland, JL
    TECHNOLOGY REVIEW, 2001, 104 (10) : 17 - 17