AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments
Title | AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Chaudhry, J., Saleem, K., Islam, R., Selamat, A., Ahmad, M., Valli, C. |
Conference Name | 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops) |
Keywords | atomic security components, autonomic zero-knowledge security provisioning model, AZSPM, cloud computing, cloud-based solutions, cloud-hoarding, Computational modeling, cyber security, different healthcare enterprises, edge computing, Fog Computing, FOG computing environment, fog environments, fog security administration, fully sand boxed environment, Health Care, health informatics industry, Health Information Systems, healthcare cloud-lets, healthcare facilities, healthcare information system environment, high-profile attacks, medical control systems, medical data, Medical Devices, medical information systems, Medical services, mobile computing, mobile services, Protocols, pubcrawl, Resiliency, Scalability, security, security of data, Service Provisioning |
Abstract | The panic among medical control, information, and device administrators is due to surmounting number of high-profile attacks on healthcare facilities. This hostile situation is going to lead the health informatics industry to cloud-hoarding of medical data, control flows, and site governance. While different healthcare enterprises opt for cloud-based solutions, it is a matter of time when fog computing environment are formed. Because of major gaps in reported techniques for fog security administration for health data i.e. absence of an overarching certification authority (CA), the security provisioning is one of the the issue that we address in this paper. We propose a security provisioning model (AZSPM) for medical devices in fog environments. We propose that the AZSPM can be build by using atomic security components that are dynamically composed. The verification of authenticity of the atomic components, for trust sake, is performed by calculating the processor clock cycles from service execution at the resident hardware platform. This verification is performed in the fully sand boxed environment. The results of the execution cycles are matched with the service specifications from the manufacturer before forwarding the mobile services to the healthcare cloud-lets. The proposed model is completely novel in the fog computing environments. We aim at building the prototype based on this model in a healthcare information system environment. |
URL | https://ieeexplore.ieee.org/document/8110213 |
DOI | 10.1109/LCN.Workshops.2017.73 |
Citation Key | chaudhry_azspm:_2017 |
- mobile computing
- healthcare facilities
- healthcare information system environment
- high-profile attacks
- medical control systems
- medical data
- medical devices
- medical information systems
- Medical services
- healthcare cloud-lets
- mobile services
- Protocols
- pubcrawl
- Resiliency
- Scalability
- security
- security of data
- Service Provisioning
- edge computing
- autonomic zero-knowledge security provisioning model
- AZSPM
- Cloud Computing
- cloud-based solutions
- cloud-hoarding
- Computational modeling
- cyber security
- different healthcare enterprises
- atomic security components
- Fog computing
- FOG computing environment
- fog environments
- fog security administration
- fully sand boxed environment
- health care
- health informatics industry
- Health Information Systems