Digital Twin in Healthcare: Security Threat Meta-Model

被引:2
|
作者
Karakra, Abdallah [1 ]
Fontanili, Franck [2 ,3 ]
Taweel, Adel [1 ]
Lamine, Elyes [2 ,3 ]
Lamothe, Jacques [2 ,3 ]
Barghouthi, Hafez [1 ]
机构
[1] Birzeit Univ, Dept Comp Sci, Birzeit, Palestine
[2] Univ Toulouse, Ind Engn Dept, Toulouse, France
[3] IMT Mines Albi, Albi, France
关键词
Digital Twin; Real World; Virtual World; Healthcare; Security;
D O I
10.1109/AICCSA56895.2022.10017729
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A virtual mirrored replica of the real-world, has become a new trend in recent years with the advent of Industry 4.0, shows how intelligent digital twins (DT) can unlock business value. The implementation of DT requires various types of technologies, including the Internet of Things (IoT), cloud computing, artificial intelligence, and others. Today, DTs can be used in various fields, including manufacturing, smart cities and healthcare. It can be used to monitor the real environment, predict its future, control its behavior, and improve its overall performance. Despite the aforementioned advantages of DTs, if not protected, they can also be considered as an open environment for attackers. If attackers take over a DT, they may end up owning the real environment controlled by the DT. This can result in damaging consequences. This paper explores the potential security and privacy threats that may be brought in through DTs. It proposes and presents a threat meta-model of DTs that identifies key security aspects of concern.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A Scalable Meta-Model for Big Data Security Analyses
    Yang, Baijan
    Zhang, Tonglin
    [J]. 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 55 - 60
  • [2] A meta-model of access control in a fibred security language
    Barker S.
    Boella G.
    Gabbay D.M.
    Genovese V.
    [J]. Studia Logica, 2009, 92 (3) : 437 - 477
  • [3] A Security Meta-Model for Service-oriented Architectures
    Menzel, Michael
    Meinel, Christoph
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, 2009, : 251 - 259
  • [4] An Integrated Meta-Model for Cloud Application Security Modelling
    Kritikos, Kyriakos
    Massonet, Philippe
    [J]. 2ND INTERNATIONAL CONFERENCE ON CLOUD FORWARD: FROM DISTRIBUTED TO COMPLETE COMPUTING, 2016, 97 : 84 - 93
  • [5] Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence
    Dietz, Marietheres
    Schlette, Daniel
    Pernul, Gunther
    [J]. 2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 789 - 797
  • [6] MetaSEnD: A Security Enabled Development Life Cycle Meta-Model
    Granata, Daniele
    Rak, Massimiliano
    Salzillo, Giovanni
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [7] IF-Net: A Meta-Model for Security-Oriented Process Specification
    Stocker, Thomas
    Boehr, Frank
    [J]. SECURITY AND TRUST MANAGEMENT, STM 2013, 2013, 8203 : 191 - 206
  • [8] THE META-MODEL OF OR/MS
    MEHREZ, A
    ENRICK, NL
    [J]. OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE, 1989, 17 (05): : 419 - 435
  • [9] Healthcare professionals' perception on emergence of security threat using digital health technologies in healthcare delivery
    Kissi, Jonathan
    Azakpah, Godwin
    Mensah, Nathan Kumasenu
    Dzamvivie, Kennedy
    Bosompem, Twisty Ampofowaa
    Wireko, Victor Adu
    Amoah-Anomah, Grace
    [J]. DIGITAL HEALTH, 2024, 10
  • [10] A Meta-model of Alignment
    Leonard, Jenny
    Seddon, Peter
    [J]. COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2012, 31 : 231 - 258