Checking and Enforcing Security through Opacity in Healthcare Applications

نویسندگان

  • Rym Zrelli
  • Mohamed Moez Yeddes
  • Nejib Ben Hadj-Alouane
چکیده

The Internet of Things (IoT) is a paradigm that can tremendously revolutionize health care thus benefiting both hospitals, doctors and patients. In this context, protecting the IoT in health care against interference, including service attacks and malwares, is challenging. Opacity is a confidentiality property capturing a system’s ability to keep a subset of its behavior hidden from passive observers. In this work, we seek to introduce an IoT-based heart attack detection system, that could be life-saving for patients without risking their need for privacy through the verification and enforcement of opacity. Our main contributions are the use of a tool to verify opacity in three of its forms, so as to detect privacy leaks in our system. Furthermore, we develop an efficient, Symbolic Observation Graph (SOG)-based algorithm for enforcing opacity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Synthesis of insertion functions for enforcement of opacity security properties

Opacity is a confidentiality property that characterizes whether a ‘‘secret’’ of a system can be inferred by an outside observer called an ‘‘intruder’’. In this paper, we consider the problem of enforcing opacity in systems modeled as partially-observed finite-state automata. We propose a novel enforcement mechanism based on the use of insertion functions. An insertion function is a monitoring ...

متن کامل

Opacity of discrete event systems and its applications

In this paper, we investigate opacity of discrete event systems. We define two types of opacities: strong opacity and weak opacity. Given a general observation mapping, a language is strongly opaque if all strings in the language are confused with some strings in another language and it is weakly opaque if some strings in the language are confused with some strings in another language. We show ...

متن کامل

Opacity Generalized to Transition Systems

Recently, opacity has proved to be a very promising technique for describing security properties. Much of the work has been couched in terms of Petri nets. Here, we extend the notion of opacity to the model of labelled transition systems and generalize opacity in order to be able to represent information flow security as well as protocol security. We give precise links between opacity and other...

متن کامل

A Narrative Review of Blockchain in Healthcare: Applications and challenges

Introduction: Healthcare as an industry has unique requirements such as patient security and privacy, interoperability, sharing, transmission, and access control of patient data. On the other hand, the advantages of blockchain technology and the compliance of these advantages with the requirements of the health industry have encouraged researchers to investigate the methods of applying blockcha...

متن کامل

A Narrative Review of Blockchain in Healthcare: Applications and challenges

Introduction: Healthcare as an industry has unique requirements such as patient security and privacy, interoperability, sharing, transmission, and access control of patient data. On the other hand, the advantages of blockchain technology and the compliance of these advantages with the requirements of the health industry have encouraged researchers to investigate the methods of applying blockcha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1710.00011  شماره 

صفحات  -

تاریخ انتشار 2017