Research on Medical Security System Based on Zero Trust

被引:6
作者
Wang, Zhiqiang [1 ]
Yu, Xinyue [1 ]
Xue, Peiyang [1 ]
Qu, Yunhan [1 ]
Ju, Lei [1 ]
机构
[1] Beijing Elect Sci & Technol Inst, Beijing 100070, Peoples R China
基金
中国博士后科学基金;
关键词
network security threats; zero-trust security system; trust assessment; dynamic access control;
D O I
10.3390/s23073774
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With the rapid development of Internet of Things technology, cloud computing, and big data, the combination of medical systems and information technology has become increasingly close. However, the emergence of intelligent medical systems has brought a series of network security threats and hidden dangers, including data leakage and remote attacks, which can directly threaten patients' lives. To ensure the security of medical information systems and expand the application of zero trust in the medical field, we combined the medical system with the zero-trust security system to propose a zero-trust medical security system. In addition, in its dynamic access control module, based on the RBAC model and the calculation of user behavior risk value and trust, an access control model based on subject behavior evaluation under zero-trust conditions (ABEAC) was designed to improve the security of medical equipment and data. Finally, the feasibility of the system is verified through a simulation experiment.
引用
收藏
页数:16
相关论文
共 20 条
[1]   Ex-ante real estate Value at Risk calculation method [J].
Amedee-Manesme, Charles-Olivier ;
Barthelemy, Fabrice .
ANNALS OF OPERATIONS RESEARCH, 2018, 262 (02) :257-285
[2]   Beyond Zero Trust: Trust Is a Vulnerability [J].
Campbell, Mark .
COMPUTER, 2020, 53 (10) :110-113
[3]   Research on the Security Protection Framework of Power Mobile Internet Services Based on Zero Trust [J].
Chen, Lu ;
Dai, Zaojian ;
Chen, Mu ;
Li, Nige .
2021 6TH INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA 2021), 2021, :65-68
[4]  
Fang W., 2022, P 2022 IEEE 6 INF TE, P238, DOI [10.1109/ITOEC53115.2022.9734455, DOI 10.1109/ITOEC53115.2022.9734455]
[5]  
Ferdous Khan M. Fahim, 2020, 2020 International Computer Symposium (ICS), P420, DOI 10.1109/ICS51289.2020.00089
[6]   A cloud-user behavior assessment based dynamic access control model [J].
Jing X. ;
Liu Z. ;
Li S. ;
Qiao B. ;
Tan G. .
International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 3) :1966-1975
[7]   A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things [J].
Liu, Yizhi ;
Hao, Xiaohan ;
Ren, Wei ;
Xiong, Ruoting ;
Zhu, Tianqing ;
Choo, Kim-Kwang Raymond ;
Min, Geyong .
IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (02) :501-512
[8]  
Miao Y., 2021, INT J NEUROSCI, V38, P14
[9]  
Oh H., 2022, 4 INT C ART INT INF, P241, DOI 10.1109/ICAIIC54071.2022.9722649
[10]  
Pengfeng Zhang, 2021, 2021 International Conference on Communications, Information System and Computer Engineering (CISCE), P712, DOI 10.1109/CISCE52179.2021.9445896