Risk and Compliance in IoT- Health Data Propagation: A Security-Aware Provenance based Approach

Fariha Tasmin Jaigirdar, C. Rudolph, Chris Bain
{"title":"Risk and Compliance in IoT- Health Data Propagation: A Security-Aware Provenance based Approach","authors":"Fariha Tasmin Jaigirdar, C. Rudolph, Chris Bain","doi":"10.1109/ICDH52753.2021.00015","DOIUrl":null,"url":null,"abstract":"Data generated from various dynamic applications of Internet of Things (IoT) based healthcare technology is effectively used for decision-making, providing reliable and smart healthcare services to the elderly and patients with chronic diseases. Since these precious data are susceptible to various security attacks, continuous monitoring of the system's compliance and identification of security risks in IoT data propagation is essential through potentially several layers of applications. This paper pinpoints how security-aware data provenance graphs can support compliance checking and risk estimation by including sufficient information on security controls and other security-relevant evidence. Real-time analysis of these security evidence to enable a step-wise validation and providing the evidence of this validation to end-users is currently not possible with the available data. This paper analyzes the security concerns in different phases of data propagation in a designed IoT-health scenario and promotes step-wise validation of security evidence. It proposes a system model with a novel protocol that documents and verifies evidence for security controls for data-object relations in data provenance graphs to assist compliance checking of security regulation of healthcare systems. With this regard, this paper discusses the proposed system model design with the requirements for technical safeguards of the Health Insurance Portability and Accountability Act (HIPAA). Based on the verification output at each phase, the proposed protocol reports this chain of verification by creating certain security tokens. Finally, the paper provides a formal security validation and security design analysis to show the applicability of this step-wise validation within the proposed system model.","PeriodicalId":93401,"journal":{"name":"2021 IEEE International Conference on Digital Health (ICDH)","volume":"34 1","pages":"27-37"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Digital Health (ICDH)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDH52753.2021.00015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Data generated from various dynamic applications of Internet of Things (IoT) based healthcare technology is effectively used for decision-making, providing reliable and smart healthcare services to the elderly and patients with chronic diseases. Since these precious data are susceptible to various security attacks, continuous monitoring of the system's compliance and identification of security risks in IoT data propagation is essential through potentially several layers of applications. This paper pinpoints how security-aware data provenance graphs can support compliance checking and risk estimation by including sufficient information on security controls and other security-relevant evidence. Real-time analysis of these security evidence to enable a step-wise validation and providing the evidence of this validation to end-users is currently not possible with the available data. This paper analyzes the security concerns in different phases of data propagation in a designed IoT-health scenario and promotes step-wise validation of security evidence. It proposes a system model with a novel protocol that documents and verifies evidence for security controls for data-object relations in data provenance graphs to assist compliance checking of security regulation of healthcare systems. With this regard, this paper discusses the proposed system model design with the requirements for technical safeguards of the Health Insurance Portability and Accountability Act (HIPAA). Based on the verification output at each phase, the proposed protocol reports this chain of verification by creating certain security tokens. Finally, the paper provides a formal security validation and security design analysis to show the applicability of this step-wise validation within the proposed system model.
物联网中的风险与合规性——健康数据传播:基于安全意识的来源方法
基于物联网(IoT)的医疗保健技术的各种动态应用产生的数据被有效地用于决策,为老年人和慢性病患者提供可靠和智能的医疗保健服务。由于这些宝贵的数据容易受到各种安全攻击,因此通过潜在的几层应用程序,持续监控系统的合规性和识别物联网数据传播中的安全风险至关重要。本文指出了安全感知数据来源图如何通过包含有关安全控制和其他安全相关证据的足够信息来支持遵从性检查和风险评估。对这些安全证据进行实时分析以支持逐步验证并向最终用户提供此验证的证据,目前无法使用可用数据。本文分析了设计的物联网健康场景中数据传播不同阶段的安全问题,并促进了安全证据的逐步验证。提出了一种具有新颖协议的系统模型,用于记录和验证数据来源图中数据对象关系的安全控制证据,以协助医疗保健系统安全法规的符合性检查。在此基础上,本文结合《健康保险流通与责任法案》(HIPAA)的技术保障要求,对提出的系统模型设计进行了探讨。根据每个阶段的验证输出,提议的协议通过创建某些安全令牌来报告此验证链。最后,本文提供了一个正式的安全验证和安全设计分析,以证明该逐步验证在所提出的系统模型中的适用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信