A Security Awareness and Protection System for 5G Smart Healthcare Based on Zero-Trust Architecture

被引:84
|
作者
Chen, Baozhan [1 ,2 ]
Qiao, Siyuan [3 ]
Zhao, Jie [1 ,2 ]
Liu, Dongqing [1 ,2 ]
Shi, Xiaobing [1 ,2 ]
Lyu, Minzhao [5 ,6 ]
Chen, Haotian [1 ,2 ]
Lu, Huimin [7 ]
Zhai, Yunkai [1 ,2 ,4 ]
机构
[1] Zhengzhou Univ, Affiliated Hosp 1, Natl Engn Lab Internet Med Syst & Applicat, Zhengzhou 450052, Peoples R China
[2] Zhengzhou Univ, Affiliated Hosp 1, Natl Telemed Ctr China, Zhengzhou 450052, Peoples R China
[3] Qi Xin Technol Grp Inc, Strateg Investment & Ecol Cooperat Dept, Beijing 100032, Peoples R China
[4] Zhengzhou Univ, Management Engn Sch, Zhengzhou 450000, Peoples R China
[5] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
[6] CSIRO, Data61, Sydney, NSW 2015, Australia
[7] Kyushu Inst Technol, Dept Mech & Control Engn, Kitakyushu, Fukuoka 8048550, Japan
基金
中国国家自然科学基金;
关键词
5G mobile communication; Security; Medical services; Medical diagnostic imaging; Biomedical equipment; Industries; Hospitals; 5G; security and privacy; smart healthcare; zero-trust architecture (ZTA); MANAGEMENT; NETWORKS;
D O I
10.1109/JIOT.2020.3041042
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The key features of 5G network (i.e., high bandwidth, low latency, and high concurrency) along with the capability of supporting big data platforms with high mobility make it valuable in coping with emerging medical needs, such as COVID-19 and future healthcare challenges. However, enforcing the security aspect of a 5G-based smart healthcare system that hosts critical data and services is becoming more urgent and critical. Passive security mechanisms (e.g., data encryption and isolation) used in legacy medical platforms cannot provide sufficient protection for a healthcare system that is deployed in a distributed manner and fail to meet the need for data/service sharing across "cloud-edge-terminal" in the 5G era. In this article, we propose a security awareness and protection system that leverages zero-trust architecture for a 5G-based smart medical platform. Driven by the four key dimensions of 5G smart healthcare including "subject" (i.e., users, terminals, and applications), "object" (i.e., data, platforms, and services), "behavior," and "environment," our system constructs trustable dynamic access control models and achieves real-time network security situational awareness, continuous identity authentication, analysis of access behavior, and fine-grained access control. The proposed security system is implemented and tested thoroughly at industrial-grade, which proves that it satisfies the needs of active defense and end-to-end security enforcement of data, users, and services involved in a 5G-based smart medical system.
引用
收藏
页码:10248 / 10263
页数:16
相关论文
共 50 条
  • [21] Preventing Cross Network Slice Disruptions in a Zero-Trust and Multi-Tenant Future 5G Networks
    Vittal, Shwetha
    Dixit, Unnati
    Sovitkar, Siddhesh Pratim
    Sowjanya, K.
    Franklin, Antony A.
    2023 IEEE 9TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT, 2023, : 227 - 231
  • [22] Design of Cloud-Edge-Gateway Collaborative Zero-Trust Architecture and Workflow for Smart Factories
    Xu, Zhuocheng
    Di, Boya
    Song, Lingyang
    2024 IEEE INTERNATIONAL WORKSHOP ON RADIO FREQUENCY AND ANTENNA TECHNOLOGIES, IWRF&AT 2024, 2024, : 335 - 339
  • [23] 5GC-SDP: Security Enhancement of 5G Core Networks With Zero Trust
    Yan, Zeqing
    Yu, Guangxi
    Zhan, Mengqi
    Zhang, Yan
    Hu, Jiaxi
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 1597 - 1602
  • [24] A Security Architecture for 5G Networks
    Arfaoul, Ghada
    Bisson, Pascal
    Blom, Rolf
    Borgaonkar, Ravishankar
    Englund, Hakan
    Felix, Edith
    Klaedtke, Felix
    Nakarmi, Prajwol Kumar
    Naslund, Mats
    O'Hanlon, Piers
    Papay, Juri
    Suomalainen, Jani
    Surridge, Mike
    Wary, Jean-Philippe
    Zahariev, Alexander
    IEEE ACCESS, 2018, 6 : 22466 - 22479
  • [25] Federated Machine Learning In 5G Smart Healthcare: A Security Perspective Review
    Butt, Hira Akhtar
    Ahad, Abdul
    Wasim, Muhammad
    Shayea, Ibraheem
    Coelho, Paulo Jorge
    Pires, Ivan Miguel
    Garcia, Nuno M.
    18TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS, FNC 2023/20TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING, MOBISPC 2023/13TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, SEIT 2023, 2023, 224 : 580 - 586
  • [26] Unified Security Architecture Research for 5G Wireless System
    Qi Fang
    Zhang WeiJie
    Wang Guojun
    Fang Hui
    2014 11th Web Information System and Application Conference (WISA), 2014, : 91 - 94
  • [27] On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond
    Bello, Yahuza
    Hussein, Ahmed Refaey
    Ulema, Mehmet
    Koilpillai, Juanita
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02): : 1876 - 1889
  • [28] Security Trust Zone in 5G Networks
    Han, Bin
    Wong, Stan
    Mannweiler, Christian
    Dohler, Mischa
    Schotten, Hans D.
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT 2017), 2017,
  • [29] Security System Design and Verification for Zero Trust Architecture
    Lee, Sangdo
    Huh, Jun-Ho
    Woo, Hanchul
    ELECTRONICS, 2025, 14 (04):
  • [30] SCC5G: A PQC-based Architecture for Highly Secure Critical Communication Over Cellular Network in Zero-Trust Environment
    Gharib, Mohammed
    Afghah, Fatemeh
    FIFTY-SEVENTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, IEEECONF, 2023, : 11 - 18