Privacy Protection and Interruption Avoidance for Cloud-Based Medical Data Sharing
Subscribe/Renew Journal
In this paper and analyse a behaviour-rule specification-based technique for intrusion detection of medical devices embedded in a Medical Cyber Physical System (MCPS) in which the patient's safety is of the utmost importance. A methodology to transform behaviour rules to a state machine, so that a device that is being monitored for its behaviour can easily be checked against the transformed state machine for deviation from its behaviour specification.
Using vital sign monitor medical devices as an example; In demonstrate that our intrusion detection technique can effectively trade false positives off for a high detection probability to cope with more sophisticated and hidden attackers to support ultra-safe and secure MCPS applications. Moreover, through a comparative analysis, A demonstrate that our behaviour-rule specification-based IDS technique outperforms two existing anomaly-based techniques for detecting abnormal patient behaviours in pervasive healthcare applications.
Keywords
- Min Chen, Senior Member, IEEE, Yongfeng Qian, Jing Chen,Kai Hwang, Fellow, IEEE, Shiwen Mao, Senior Member, Long Hu ”Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing”2015.
- Garima Dadheech”A privacy protection scheme to transmit medical data from wearable devices to clouds through cloudlets”2018.
- Praveen Kumar Rajendran, B. Muthukumar, G, Nagarajan ”Hybrid intrusion detection system for private cloud: A systematic approach”2015.
- Yue Shi, Sampatoor Abhilash, and Kai Hwang “Cloudlet Mesh for Securing Mobile Clouds from Intrusions and Network Attacks*”2015.
- K.Abirami and S.Yogalakshmi “Privacy preserved Medical data sharing models for cloud systems”2018.
- M. Quwaider and Y. Jararweh, “Cloudlet-based efficient data collection in wireless body area networks,” Simulation Modelling Practice and Theory, vol. 50, pp. 57–71, 2015.
- M. S. Hossain, “Cloud-supported cyber–physical localization framework for patients monitoring,” 2015.
- K. Hung, Y. Zhang, and B. Tai, “Wearable medical devices for telehome healthcare,” in Engineering in Medicine and Biology Society, 2004. IEMBS’04. 26th Annual International Conference of the IEEE, vol. 2. IEEE, 2004, pp. 5384–5387.
- J. Zhao, L. Wang, J. Tao, J. Chen, W. Sun, R. Ranjan, J. Kołodziej, A. Streit, and D. Georgakopoulos, “A security framework in g-hadoop for big data computing across distributed cloud data centres,” Journal of Computer and System Sciences, vol. 80, no. 5, pp. 994–1007, 2014.
- M. S. Hossain and G. Muhammad, “Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring,” Computer Networks, vol. 101, pp. 192–202, 2016.
- R. Zhang and L. Liu, “Security models and requirements for healthcare application clouds,” in Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on. IEEE, 2010, pp. 268–275.
- Huang, D., Zhou, Z., Xu, L., Xing, T., Zhong, Y.: Secure data processing framework for mobile cloud computing. : Proc. of the IEEE Conference on Computer Communications Workshop, Shanghai, pp. 614–618, 2011.
- Anderson, Andres, Yigaw, KassyeYitbarek & Karlsen, Randi, ”Privacy preserving health data processing”, IEEE 16th international conference on e-health networking, applications and services,2014.
- Y. Chen, K. Hwang, and W. S. Ku, “Collaborative Detection of DDoS Attacks over Multiple Network Domains”, IEEE Trans. on Parallel and Distributed Systems, Dec. 2007.
- D. Chen, and Hong Zhao, "Data Security and Privacy Protection Issues in Cloud Computing," IEEE International Conf. Computer Science and Electronics Engineering (ICCSEE), pp. 647-651, March. 2012.
Abstract Views: 464
PDF Views: 0