AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments

作者: C. Chaudhry , J. , Saleem , K. , Islam

DOI: 10.1109/LCN.WORKSHOPS.2017.73

关键词:

摘要: The panic among medical control, information, and device administrators is due to surmounting number of high-profile attacks on healthcare facilities. This hostile situation going lead the health informatics industry cloud-hoarding data, control flows, site governance. While different enterprises opt for cloud-based solutions, it a matter time when fog computing environment are formed. Because major gaps in reported techniques security administration data i.e. absence an overarching certification authority (CA), provisioning one issue that we address this paper. We propose model (AZSPM) devices environments. AZSPM can be build by using atomic components dynamically composed. verification authenticity components, trust sake, performed calculating processor clock cycles from service execution at resident hardware platform. fully sand boxed environment. results matched with specifications manufacturer before forwarding mobile services cloud-lets. proposed completely novel aim building prototype based information system

参考文章(80)
Mohammad Ali Maddah-Ali, A. Salman Avestimehr, Songze Li, Coding for Distributed Fog Computing arXiv: Information Theory. ,(2017)
Seok-Hwan Park, Osvaldo Simeone, Shlomo Shamai, Joint optimization of cloud and edge processing for fog radio access networks 2016 IEEE International Symposium on Information Theory (ISIT). pp. 315- 319 ,(2016) , 10.1109/ISIT.2016.7541312
Shi Yan, Mugen Peng, Munzali Ahmed Abana, Wenbo Wang, An Evolutionary Game for User Access Mode Selection in Fog Radio Access Networks IEEE Access. ,vol. 5, pp. 2200- 2210 ,(2017) , 10.1109/ACCESS.2017.2654266
Mohammad Obaidat, Noureddine Boudriga, Security of e-Systems and Computer Networks ,(2007)
R. Canetti, Universally composable security: a new paradigm for cryptographic protocols international conference on cluster computing. pp. 136- 145 ,(2001) , 10.1109/SFCS.2001.959888
Francis Fukuyama, Robert Axelrod, Robert Jervis, The Complexity of Cooperation: Agent-Based Models of Competition and Collaboration Foreign Affairs. ,vol. 77, pp. 142- ,(1998) , 10.2307/20048800
Aggelos Kiayias, Moti Yung, Self-tallying Elections and Perfect Ballot Secrecy public key cryptography. pp. 141- 158 ,(2002) , 10.1007/3-540-45664-3_10
Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky, Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority international cryptology conference. ,vol. 2011, pp. 663- 680 ,(2012) , 10.1007/978-3-642-32009-5_39
Yuhua Lin, Haiying Shen, Leveraging Fog to Extend Cloud Gaming for Thin-Client MMOG with High Quality of Experience international conference on distributed computing systems. pp. 734- 735 ,(2015) , 10.1109/ICDCS.2015.83