TOWARDS INTEGRITY PROTECTION OF SOFTWARE FOR E-HEALTH DATA

被引:0
|
作者
Rahman, Sk Md Mizanur [1 ]
机构
[1] King Saud Univ, Coll Comp Informat Sci, Riyadh, Saudi Arabia
关键词
Software Protection; Cryptographic Hash Functions; Signature; Tampering; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Integrity protection (IP) of software which deals with eHealth data, addresses the problem of static or dynamic code modification of the software. An attacker with the ability to modify the execution of software which deals with eHealth data can tamper with eHealth data. The target of IP is to protect the software assets; in this case it is to protect eHealth data. By modifying the binary source of an application, an attacker can produce a modified version of the application which can run in favor of the attacker objectives. Finally, if an attacker distributes the modified version of an application which deals with eHealth data, can harm eHealth environment (e.g., government agency) by disclosing the identity of the stake holders. The existing literatures (very few are disclosed and are available in academia) mainly focus on protection of tampering for static code of a software application. However, in practically, while an instance of software runs on unprotected memory environment, an attacker can launch dynamic modification of the running code and achieves the desired advantages. Therefore, the existing approaches do not tackle the tampering issues during the execution of a software application. The proposed research aims to explore this problem and proposes solutions based on a light-weight cryptographic methodology by generating secure cryptographic signature, which is a scrambled signature of a software application generated using cryptographic function and its security analysis has been investigated.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] E-health?
    Prosch, Susanne Monica
    TIDSSKRIFT FOR DEN NORSKE LAEGEFORENING, 2020, 140 (18) : 1851 - 1852
  • [42] Secure e-Health: Managing risks to patient health data
    Kluge, Eike-Henner W.
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2007, 76 (5-6) : 402 - 406
  • [43] Zero watermarking scheme for privacy protection in e-Health care
    Shaik, Ayesha
    Masilamani, V.
    AUTOMATIKA, 2023, 64 (03) : 453 - 466
  • [44] Is E-health progressing faster than E-health researchers?
    Potts, Henry W. W.
    JOURNAL OF MEDICAL INTERNET RESEARCH, 2006, 8 (03) : 3P
  • [45] e-Health: Data Integration, Data Mining, and Knowledge Management in Health Informatics
    Zhang, Yanchun
    SOFTWARE SERVICES FOR E-WORLD, 2010, 341 : 1 - 1
  • [46] Towards controlled-privacy in e-health: A comparative study
    Sadki, Souad
    El Bakkali, Hanan
    2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, : 680 - 685
  • [47] Connecting technology and human behaviours towards e-health adoption
    Razmak J.
    Bélanger C.H.
    International Journal of Information Systems and Change Management, 2017, 9 (03) : 169 - 192
  • [48] Elderly's Attitude towards the Selected Types of e-Health
    Klimova, Blanka
    Maresova, Petra
    Lee, Sunwoo
    HEALTHCARE, 2020, 8 (01)
  • [49] Integrated Multimedia Medical Data Agent in E-Health
    Di Giacomo, P.
    Ricci, Fabrizio L.
    Bocchi, Leonardo
    MEDICAL AND CARE COMPUNETICS 3, 2006, 121 : 70 - +
  • [50] WHEN ARTIFICIAL INTELLIGENCE SPEAKS: VOCAL ASSISTANTS AND E-HEALTH IN THE LIGHT OF THE GENERAL DATA PROTECTION REGULATION
    Guarda, Paolo
    Petrucci, Livia
    BIOLAW JOURNAL-RIVISTA DI BIODIRITTO, 2020, (02): : 425 - 446