A Security Awareness and Protection System for 5G Smart Healthcare Based on Zero-Trust Architecture

被引:84
|
作者
Chen, Baozhan [1 ,2 ]
Qiao, Siyuan [3 ]
Zhao, Jie [1 ,2 ]
Liu, Dongqing [1 ,2 ]
Shi, Xiaobing [1 ,2 ]
Lyu, Minzhao [5 ,6 ]
Chen, Haotian [1 ,2 ]
Lu, Huimin [7 ]
Zhai, Yunkai [1 ,2 ,4 ]
机构
[1] Zhengzhou Univ, Affiliated Hosp 1, Natl Engn Lab Internet Med Syst & Applicat, Zhengzhou 450052, Peoples R China
[2] Zhengzhou Univ, Affiliated Hosp 1, Natl Telemed Ctr China, Zhengzhou 450052, Peoples R China
[3] Qi Xin Technol Grp Inc, Strateg Investment & Ecol Cooperat Dept, Beijing 100032, Peoples R China
[4] Zhengzhou Univ, Management Engn Sch, Zhengzhou 450000, Peoples R China
[5] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
[6] CSIRO, Data61, Sydney, NSW 2015, Australia
[7] Kyushu Inst Technol, Dept Mech & Control Engn, Kitakyushu, Fukuoka 8048550, Japan
基金
中国国家自然科学基金;
关键词
5G mobile communication; Security; Medical services; Medical diagnostic imaging; Biomedical equipment; Industries; Hospitals; 5G; security and privacy; smart healthcare; zero-trust architecture (ZTA); MANAGEMENT; NETWORKS;
D O I
10.1109/JIOT.2020.3041042
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The key features of 5G network (i.e., high bandwidth, low latency, and high concurrency) along with the capability of supporting big data platforms with high mobility make it valuable in coping with emerging medical needs, such as COVID-19 and future healthcare challenges. However, enforcing the security aspect of a 5G-based smart healthcare system that hosts critical data and services is becoming more urgent and critical. Passive security mechanisms (e.g., data encryption and isolation) used in legacy medical platforms cannot provide sufficient protection for a healthcare system that is deployed in a distributed manner and fail to meet the need for data/service sharing across "cloud-edge-terminal" in the 5G era. In this article, we propose a security awareness and protection system that leverages zero-trust architecture for a 5G-based smart medical platform. Driven by the four key dimensions of 5G smart healthcare including "subject" (i.e., users, terminals, and applications), "object" (i.e., data, platforms, and services), "behavior," and "environment," our system constructs trustable dynamic access control models and achieves real-time network security situational awareness, continuous identity authentication, analysis of access behavior, and fine-grained access control. The proposed security system is implemented and tested thoroughly at industrial-grade, which proves that it satisfies the needs of active defense and end-to-end security enforcement of data, users, and services involved in a 5G-based smart medical system.
引用
收藏
页码:10248 / 10263
页数:16
相关论文
共 50 条
  • [31] Uplifting Healthcare Cyber Resilience with a Multi-access Edge Computing Zero-Trust Security Model
    Ali, Belal
    Gregory, Mark A.
    Li, Shuo
    2021 31ST INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2021, : 192 - 197
  • [32] GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT Networks
    Ge, Yunfei
    Zhu, Quanyan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 540 - 554
  • [33] A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation
    ElSayed, Zag
    Elsayed, Nelly
    Bay, Sajjad
    SOUTHEASTCON 2024, 2024, : 686 - 692
  • [34] Towards Zero-Trust Hardware Architectures in Safety and Security Critical System-on-Chips
    Restuccia, Francesco
    Kastner, Ryan
    2024 IEEE 3RD REAL-TIME AND INTELLIGENT EDGE COMPUTING WORKSHOP, RAGE 2024, 2024, : 33 - 36
  • [35] Securing fog computing in healthcare with a zero-trust approach and blockchain (vol 2025, 5, 2025)
    Kaur, Navjeet
    Mittal, Ayush
    Lilhore, Umesh Kumar
    Simaiya, Sarita
    Dalal, Surjeet
    Saleem, Kashif
    Ghith, Ehab Seif
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2025, 2025 (01)
  • [36] AI-driven Zero-touch Operations, Security and Trust in Multi-operator 5G Networks: a Conceptual Architecture
    Carrozzo, Gino
    Shuaib Siddiqui, M.
    Betzler, August
    Bonnet, Jose
    Martinez Perez, Gregorio
    Ramos, Aurora
    Subramanya, Tejas
    2020 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC 2020), 2020, : 254 - 258
  • [37] Blockchain Based Methodology for Zero Trust Modeling and Quantification for 5G Networks
    Elmadani, Safwan
    Hariri, Salim
    Shao, Sicong
    2022 IEEE/ACS 19TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2022,
  • [38] Reference Network and Localization Architecture for Smart Manufacturing Based on 5G
    Ludwig, Stephan
    Aschenbrenner, Doris
    Scharle, Marvin
    Klessig, Henrik
    Karrenbauer, Michael
    Wu, Huanzhuo
    Taghouti, Maroua
    Lozano, Pedro
    Schotten, Hans D.
    Fitzek, Frank H. P.
    ADVANCES IN SYSTEM-INTEGRATED INTELLIGENCE, SYSINT 2022, 2023, 546 : 470 - 479
  • [39] A Trust architecture for the SLA management in 5G networks
    Ben Saad, Sabra
    Ksentini, Adlen
    Brik, Bouziane
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [40] Advancing Healthcare Security: A Cutting-Edge Zero-Trust Blockchain Solution for Protecting Electronic Health Records
    Benaich R.
    El Mendili S.
    Gahi Y.
    HighTech and Innovation Journal, 2023, 4 (03): : 630 - 652