Uplifting Healthcare Cyber Resilience with a Multi-access Edge Computing Zero-Trust Security Model

被引:11
作者
Ali, Belal [1 ]
Gregory, Mark A. [1 ]
Li, Shuo [1 ]
机构
[1] RMIT Univ, Sch Engn, Melbourne, Vic, Australia
来源
2021 31ST INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC) | 2021年
关键词
Multi-access Edge Computing; Security; Trust Management; Authentication; MECHANISM;
D O I
10.1109/ITNAC53136.2021.9652141
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Telemedicine over the Internet of Things has the potential to generate a massive amount of data. To process the data an increase in transmission, computing, storage and analysis capability is required. Utilising cloud computing to handle the increase in data could introduce high latency and increasing storage costs. Multi-access Edge Computing (MEC) has become an essential component of the next generation 5G networks that provide improved reliability and low latency. This paper proposes a model that will enable MEC operators to collect information from the environment that can be analysed before making trust decisions. Trust is achieved by continuously applying authentication and authorisation while maintaining robust management practices to drive the trust decision process. The proposed model trusts the User Equipment (UE) only after verifying user credentials, which are converted into ciphertexts. The integration of different technologies such as computers, medical devices, and telecommunications will significantly improve the efficiency of patient treatment, reduce the cost of health care and improve privacy and security. Trust decisions are based on the trust posture criteria, existing and potential trust relationships, and the MEC environment trust state. The research outcomes show that this approach provides a positive improvement whilst establishing trust.
引用
收藏
页码:192 / 197
页数:6
相关论文
共 20 条
  • [1] Ali B., 2021, IEEE ACCESS, V9, p18 706
  • [2] Almajali S, 2018, 2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P58, DOI 10.1109/FMEC.2018.8364045
  • [3] A hybrid trust model using reinforcement learning and fuzzy logic
    Aref, Abdullah
    Tran, Thomas
    [J]. COMPUTATIONAL INTELLIGENCE, 2018, 34 (02) : 515 - 541
  • [4] Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
  • [5] Chen B., 2020, IEEE INTERNET THINGS
  • [6] Seamless secure anonymous authentication for cloud-based mobile edge computing
    Deebak, B. D.
    Al-Turjman, Fadi
    Mostarda, Leonardo
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2020, 87
  • [7] Eidle D, 2017, 2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), P288, DOI 10.1109/UEMCON.2017.8249053
  • [8] ETSI Multi-access edge computing (MEC)
  • [9] framework and reference architecture, 2020, 003 ETSI GS MEC
  • [10] Hou Y., 2020, IEEE ACCESS, V8