1 / 14

Security Protection on Trust Delegated Medical Data in Public Mobile Networks

Security Protection on Trust Delegated Medical Data in Public Mobile Networks. Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks Research Group School of Engineering and Mathematical Sciences City University London. Outline of the Presentation. Motivation

vinson
Download Presentation

Security Protection on Trust Delegated Medical Data in Public Mobile Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan andVeselin Rakocevic Mobile Networks Research Group School of Engineering and Mathematical Sciences City University London.

  2. Outline of the Presentation • Motivation • Proposed solution • Trust Negotiation Protocol • Security tokens • Security Capsule Implementation

  3. Motivation Relying Service Provider Private Medical Center A & E Requesting Service Provider Medical Healthcare Personal

  4. Problem statement • Medical Healthcare Personal authenticates to the Dynamic Trust Negotiation network • Trust negotiation between the Relying service provider and the Requesting service provider • Securely transmit sensitive data from the relying service provider to the Medical Healthcare Personal mobile device • Data security at the mobile device

  5. Proposed Architecture

  6. Proposed protocol phases • Medical Healthcare Personal registers and authenticates in the Dynamic Trust Negotiation Network • Trust Negotiation between Relying Service Provider and Requesting Service Provider • Sensitive attributes are shared to Medical Healthcare Personal in a secure channel.

  7. Proposed protocol phases (Contd.) • Medical Healthcare Personal– MHP • Requesting Service Provider– RequestingSP • Relying Service Provider– RelyingSP • Authentication and Trust Negotiation Server- ATNS

  8. MHP registers and authenticates with ATNS Trust Mapping Database 3. Check Past records 1. Login Token 2. Login Token RequestingSP MHP ATNS Engine 5. Authentication Token 4. Evaluate the Trust Trust Evaluation Engine

  9. Trust Negotiation between MHP and RelyingSP Trust Mapping Database MHP 1. RecordAccess (PatientID, Authentication Token) 2. Check Past records 5. TrustChallenge Token ATNS Engine 6. TrustChallenge Response 7. Trust Token 2. Evaluate the Trust 4. TrustChallenge Token 3. Trust Recommended Token RelyingSP Trust Evaluation Engine

  10. Sensitive attributes are shared to MHP • Trust Token is stored inside the MHP’s mobile device MHP Relying SP Encrypted Data

  11. Data protection at the mobile device • Data transmission in Encrypted format • The decryption key for the data decryption will be generated in the mobile device • Decryption key generation using the identity and key parameters in the mobile device • Real-time authorization for the data access • Permanent data deletion after the data utilization

  12. Security Capsule Architecture

  13. Conclusion • Negotiate trust between different entities in a healthcare domain • Trust negotiation architecture • Trust negotiation protocol for message communication • Data protection in the mobile device • Security capsule architecture

  14. Q & A r.muttukrishnan@city.ac.uk

More Related