A Trusted Computing Architecture for Health Care

Document Type

Contribution to Book

Publication Date

1-10-2017

Publication Title

Proceedings of the International Conference on Information Networking

DOI

10.1109/ICOIN.2017.7899472

ISBN

978-1-5090-5124-3

Abstract

Software integrity and medical data secrecy in health care applications are at risk. The existing health care computing infrastructures lack the support of critical cybersecurity features, such as dynamic software integrity verifications and role-based authorization. Health-related operations are being administered and delivered to patients without proper knowledge or awareness about the integrity status of the underlying software component. To address these problems, we propose a trusted computing architecture that supports the integration of: (1) fine-grained active medical software components integrity verification techniques and (2) fine-grained active role-based authorization mechanisms. The new architecture makes use of code attestation-based technology for isolating sensitive and safety-critical code execution in health-related applications, using a minimal Trusted Computing Base (TCB). With this architecture, caregivers can perform dynamic software integrity monitoring and active role-based authorization during their medical practice.

Share

COinS