Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data

被引:2
|
作者
Saberikamarposhti, Morteza [1 ]
Ng, Kok-Why [1 ]
Chua, Fang-Fang [1 ]
Abdullah, Junaidi [1 ]
Yadollahi, Mehdi [2 ]
Moradi, Mona [3 ]
Ahmadpour, Sima [4 ]
机构
[1] Multimedia Univ MMU, Fac Comp & Informat FCI, Cyberjaya 63100, Selangor, Malaysia
[2] Islamic Azad Univ, Fac Comp Engn, Ayatollah Amoli Branch, Amol, Iran
[3] Islamic Azad Univ, Dept Comp Engn, Roudehen Branch, Roudehen, Iran
[4] Univ Sains Malaysia, Grad Sch Business, Gelugor 11800, Pulau Pinang, Malaysia
关键词
Post-quantum; Healthcare; Cybersecurity; Resilience; Medical data; Threats; Roadmap; CRYPTOGRAPHY;
D O I
10.1016/j.heliyon.2024.e31406
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
As healthcare systems transition into an era dominated by quantum technologies, the need to fortify cybersecurity measures to protect sensitive medical data becomes increasingly imperative. This paper navigates the intricate landscape of post-quantum cryptographic approaches and emerging threats specific to the healthcare sector. Delving into encryption protocols such as lattice-based, code-based, hash-based, and multivariate polynomial cryptography, the paper addresses challenges in adoption and compatibility within healthcare systems. The exploration of potential threats posed by quantum attacks and vulnerabilities in existing encryption standards underscores the urgency of a change in basic assumptions in healthcare data security. The paper provides a detailed roadmap for implementing post-quantum cybersecurity solutions, considering the unique challenges faced by healthcare organizations, including integration issues, budget constraints, and the need for specialized training. Finally, the abstract concludes with an emphasis on the importance of timely adoption of post-quantum strategies to ensure the resilience of healthcare data in the face of evolving threats. This roadmap not only offers practical insights into securing medical data but also serves as a guide for future directions in the dynamic landscape of post-quantum healthcare cybersecurity.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Post-quantum cryptography and the quantum future of cybersecurity
    Liu, Yi-Kai
    Moody, Dustin
    PHYSICAL REVIEW APPLIED, 2024, 21 (04):
  • [2] Post-quantum attack resilience blockchain-assisted data authentication protocol for smart healthcare system
    Soni, Lacchita
    Chandra, Harish
    Gupta, Daya Sagar
    SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (11): : 2170 - 2190
  • [3] Cybersecurity in Critical Infrastructures: A Post-Quantum Cryptography Perspective
    Oliva del Moral, Javier
    deMarti iOlius, Antonio
    Vidal, Gerard
    Crespo, Pedro M.
    Etxezarreta Martinez, Josu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (18): : 30217 - 30244
  • [4] Cybersecurity Challenges Associated With the Internet of Things in a Post-Quantum World
    Althobaiti, Ohood Saud
    Dohler, Mischa
    IEEE ACCESS, 2020, 8 : 157356 - 157381
  • [5] Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms
    Farooq, Sana
    Altaf, Ayesha
    Iqbal, Faiza
    Thompson, Ernesto Bautista
    Vargas, Debora Libertad Ramirez
    Diez, Isabel de la Torre
    Ashraf, Imran
    SENSORS, 2023, 23 (12)
  • [6] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +
  • [7] Roadmap of post-quantum cryptography standardization: Side-channel attacks and countermeasures
    Shaller, Ari
    Zamir, Linir
    Nojoumian, Mehrdad
    INFORMATION AND COMPUTATION, 2023, 295
  • [8] A Post-Quantum Compliant Authentication Scheme for IoT Healthcare Systems
    Adeli, Morteza
    Bagheri, Nasour
    Maimani, Hamid Reza
    Kumari, Saru
    Rodrigues, Joel J. P. C.
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 6111 - 6118
  • [9] A post-quantum provable data possession protocol in cloud
    Chen, Liang
    Han, Lansheng
    Jing, Jiandu
    Hu, Dongping
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (05) : 658 - 667
  • [10] Post-Quantum Cryptography
    Monroe, Don
    COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17