Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare

被引:0
|
作者
Jin, Wenzhong [1 ,2 ]
Wu, Shanjun [1 ,2 ]
Feng, Yu [1 ,2 ]
Wang, Huijing [2 ,3 ]
Fu, Chunyu [2 ,4 ]
机构
[1] Shanghai Ninth Peoples Hosp, Dept Informat Ctr, Shanghai, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Med, Shanghai, Peoples R China
[3] Shanghai Ninth Peoples Hosp, Dept Informat Ctr, Shanghai, Peoples R China
[4] Shanghai Gen Hosp, Dept Informat Ctr, Shanghai, Peoples R China
关键词
Artificial intelligence; intelligent healthcare system; sustainable development; big data; healthcare; 5G communication; information safety; security;
D O I
10.34028/iajit/22/2/5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The fundamental attributes of the 5G network, namely its high bandwidth and concurrency, reduced latency, and ability to handle high-mobility big data platforms, render it valuable in tackling forthcoming healthcare challenges and emerging health demands like as the COVID-19 pandemic. The enforcement of the security component within a 5G-based Intelligent Healthcare System (IHS), which encompasses critical information and facilities, is more imperative and significant. In the context of deploying a healthcare system in a distributed manner, the effectiveness of passive security measures, such as information encryption and isolation, employed on traditional health platforms is insufficient to address the requirements for information and facility interchange across "cloud-edge-terminals" in the era of 5G. This study proposes a security solution for an intelligent health platform based on the Zero-Trust Model (ZTM) in the context of 5G technology. This study presents fundamental principles like the real-time monitoring of network asset security, risk evaluation of individual access requests, and access permission and decision-making through the use of a dynamic trust algorithm. The 5G IHS encompasses four primary dimensions, namely "theme" which includes people, terminals, and applications, "item" which encompasses information, platforms, and facilities, "behavior," and "environment". With the highest accuracy (98.9), precision (95.9), recall (98), and F1-score (95.5) among the several approaches, the suggested ZTM method better the others consistently. These overall numerical results for accuracy, precision, recall, and F1-score across methodologies are shown. A lower but more variable Optimized Gated Recurrent Unit (DEO-GRU) across all measures. The proposed security system has been subjected to thorough testing and implementation at an industrial level, showcasing its ability to fulfill the criteria for dynamic shield and end-to-end safety execution of information, users, and facilities present in an Intelligent Healthcare (IH) scheme based on 5G technology.
引用
收藏
页码:263 / 277
页数:15
相关论文
共 50 条
  • [1] A Security Awareness and Protection System for 5G Smart Healthcare Based on Zero-Trust Architecture
    Chen, Baozhan
    Qiao, Siyuan
    Zhao, Jie
    Liu, Dongqing
    Shi, Xiaobing
    Lyu, Minzhao
    Chen, Haotian
    Lu, Huimin
    Zhai, Yunkai
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10248 - 10263
  • [2] Securing 5G Cloud Native NFV architecture with Zero Trust Security
    Sajid, Taha
    2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [3] Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES
    Kholidy, Hisham A.
    Karam, Andrew
    Sidoran, James
    Rahman, Mohammad A.
    Mahmoud, Mohammed
    Badr, Mahmoud
    Mahmud, Maqsood
    Sayed, Ahmed F.
    2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2022,
  • [4] Zero Trust Architecture for 6G Security
    Chen, Xu
    Feng, Wei
    Ge, Ning
    Zhang, Yan
    IEEE NETWORK, 2024, 38 (04): : 224 - 232
  • [5] Extending 5G services with Zero Trust security pillars: a modular approach
    Manan, Abdul
    Min, Ziran
    Mahmoudi, Charif
    Formicola, Valerio
    2022 IEEE/ACS 19TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2022,
  • [6] 5GC-SDP: Security Enhancement of 5G Core Networks With Zero Trust
    Yan, Zeqing
    Yu, Guangxi
    Zhan, Mengqi
    Zhang, Yan
    Hu, Jiaxi
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 1597 - 1602
  • [7] A Security Architecture for 5G Networks
    Arfaoul, Ghada
    Bisson, Pascal
    Blom, Rolf
    Borgaonkar, Ravishankar
    Englund, Hakan
    Felix, Edith
    Klaedtke, Felix
    Nakarmi, Prajwol Kumar
    Naslund, Mats
    O'Hanlon, Piers
    Papay, Juri
    Suomalainen, Jani
    Surridge, Mike
    Wary, Jean-Philippe
    Zahariev, Alexander
    IEEE ACCESS, 2018, 6 : 22466 - 22479
  • [8] Unified Security Architecture Research for 5G Wireless System
    Qi Fang
    Zhang WeiJie
    Wang Guojun
    Fang Hui
    2014 11th Web Information System and Application Conference (WISA), 2014, : 91 - 94
  • [9] On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond
    Bello, Yahuza
    Hussein, Ahmed Refaey
    Ulema, Mehmet
    Koilpillai, Juanita
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02): : 1876 - 1889
  • [10] Security Trust Zone in 5G Networks
    Han, Bin
    Wong, Stan
    Mannweiler, Christian
    Dohler, Mischa
    Schotten, Hans D.
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT 2017), 2017,