A Security Awareness and Protection System for 5G Smart Healthcare Based on Zero-Trust Architecture

被引:69
|
作者
Chen, Baozhan [1 ,2 ]
Qiao, Siyuan [3 ]
Zhao, Jie [1 ,2 ]
Liu, Dongqing [1 ,2 ]
Shi, Xiaobing [1 ,2 ]
Lyu, Minzhao [5 ,6 ]
Chen, Haotian [1 ,2 ]
Lu, Huimin [7 ]
Zhai, Yunkai [1 ,2 ,4 ]
机构
[1] Zhengzhou Univ, Affiliated Hosp 1, Natl Engn Lab Internet Med Syst & Applicat, Zhengzhou 450052, Peoples R China
[2] Zhengzhou Univ, Affiliated Hosp 1, Natl Telemed Ctr China, Zhengzhou 450052, Peoples R China
[3] Qi Xin Technol Grp Inc, Strateg Investment & Ecol Cooperat Dept, Beijing 100032, Peoples R China
[4] Zhengzhou Univ, Management Engn Sch, Zhengzhou 450000, Peoples R China
[5] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
[6] CSIRO, Data61, Sydney, NSW 2015, Australia
[7] Kyushu Inst Technol, Dept Mech & Control Engn, Kitakyushu, Fukuoka 8048550, Japan
基金
中国国家自然科学基金;
关键词
5G mobile communication; Security; Medical services; Medical diagnostic imaging; Biomedical equipment; Industries; Hospitals; 5G; security and privacy; smart healthcare; zero-trust architecture (ZTA); MANAGEMENT; NETWORKS;
D O I
10.1109/JIOT.2020.3041042
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The key features of 5G network (i.e., high bandwidth, low latency, and high concurrency) along with the capability of supporting big data platforms with high mobility make it valuable in coping with emerging medical needs, such as COVID-19 and future healthcare challenges. However, enforcing the security aspect of a 5G-based smart healthcare system that hosts critical data and services is becoming more urgent and critical. Passive security mechanisms (e.g., data encryption and isolation) used in legacy medical platforms cannot provide sufficient protection for a healthcare system that is deployed in a distributed manner and fail to meet the need for data/service sharing across "cloud-edge-terminal" in the 5G era. In this article, we propose a security awareness and protection system that leverages zero-trust architecture for a 5G-based smart medical platform. Driven by the four key dimensions of 5G smart healthcare including "subject" (i.e., users, terminals, and applications), "object" (i.e., data, platforms, and services), "behavior," and "environment," our system constructs trustable dynamic access control models and achieves real-time network security situational awareness, continuous identity authentication, analysis of access behavior, and fine-grained access control. The proposed security system is implemented and tested thoroughly at industrial-grade, which proves that it satisfies the needs of active defense and end-to-end security enforcement of data, users, and services involved in a 5G-based smart medical system.
引用
收藏
页码:10248 / 10263
页数:16
相关论文
共 50 条
  • [21] Design of Cloud-Edge-Gateway Collaborative Zero-Trust Architecture and Workflow for Smart Factories
    Xu, Zhuocheng
    Di, Boya
    Song, Lingyang
    2024 IEEE INTERNATIONAL WORKSHOP ON RADIO FREQUENCY AND ANTENNA TECHNOLOGIES, IWRF&AT 2024, 2024, : 335 - 339
  • [22] Federated Machine Learning In 5G Smart Healthcare: A Security Perspective Review
    Butt, Hira Akhtar
    Ahad, Abdul
    Wasim, Muhammad
    Shayea, Ibraheem
    Coelho, Paulo Jorge
    Pires, Ivan Miguel
    Garcia, Nuno M.
    18TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS, FNC 2023/20TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING, MOBISPC 2023/13TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, SEIT 2023, 2023, 224 : 580 - 586
  • [23] A Security Architecture for 5G Networks
    Arfaoul, Ghada
    Bisson, Pascal
    Blom, Rolf
    Borgaonkar, Ravishankar
    Englund, Hakan
    Felix, Edith
    Klaedtke, Felix
    Nakarmi, Prajwol Kumar
    Naslund, Mats
    O'Hanlon, Piers
    Papay, Juri
    Suomalainen, Jani
    Surridge, Mike
    Wary, Jean-Philippe
    Zahariev, Alexander
    IEEE ACCESS, 2018, 6 : 22466 - 22479
  • [24] Unified Security Architecture Research for 5G Wireless System
    Qi Fang
    Zhang WeiJie
    Wang Guojun
    Fang Hui
    2014 11th Web Information System and Application Conference (WISA), 2014, : 91 - 94
  • [25] On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond
    Bello, Yahuza
    Hussein, Ahmed Refaey
    Ulema, Mehmet
    Koilpillai, Juanita
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02): : 1876 - 1889
  • [26] Security Trust Zone in 5G Networks
    Han, Bin
    Wong, Stan
    Mannweiler, Christian
    Dohler, Mischa
    Schotten, Hans D.
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT 2017), 2017,
  • [27] Uplifting Healthcare Cyber Resilience with a Multi-access Edge Computing Zero-Trust Security Model
    Ali, Belal
    Gregory, Mark A.
    Li, Shuo
    2021 31ST INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2021, : 192 - 197
  • [28] GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT Networks
    Ge, Yunfei
    Zhu, Quanyan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 540 - 554
  • [29] A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation
    ElSayed, Zag
    Elsayed, Nelly
    Bay, Sajjad
    SOUTHEASTCON 2024, 2024, : 686 - 692
  • [30] AI-driven Zero-touch Operations, Security and Trust in Multi-operator 5G Networks: a Conceptual Architecture
    Carrozzo, Gino
    Shuaib Siddiqui, M.
    Betzler, August
    Bonnet, Jose
    Martinez Perez, Gregorio
    Ramos, Aurora
    Subramanya, Tejas
    2020 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC 2020), 2020, : 254 - 258