140 likes | 227 Views
Security Protection on Trust Delegated Medical Data in Public Mobile Networks. Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks Research Group School of Engineering and Mathematical Sciences City University London. Outline of the Presentation. Motivation
E N D
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan andVeselin Rakocevic Mobile Networks Research Group School of Engineering and Mathematical Sciences City University London.
Outline of the Presentation • Motivation • Proposed solution • Trust Negotiation Protocol • Security tokens • Security Capsule Implementation
Motivation Relying Service Provider Private Medical Center A & E Requesting Service Provider Medical Healthcare Personal
Problem statement • Medical Healthcare Personal authenticates to the Dynamic Trust Negotiation network • Trust negotiation between the Relying service provider and the Requesting service provider • Securely transmit sensitive data from the relying service provider to the Medical Healthcare Personal mobile device • Data security at the mobile device
Proposed protocol phases • Medical Healthcare Personal registers and authenticates in the Dynamic Trust Negotiation Network • Trust Negotiation between Relying Service Provider and Requesting Service Provider • Sensitive attributes are shared to Medical Healthcare Personal in a secure channel.
Proposed protocol phases (Contd.) • Medical Healthcare Personal– MHP • Requesting Service Provider– RequestingSP • Relying Service Provider– RelyingSP • Authentication and Trust Negotiation Server- ATNS
MHP registers and authenticates with ATNS Trust Mapping Database 3. Check Past records 1. Login Token 2. Login Token RequestingSP MHP ATNS Engine 5. Authentication Token 4. Evaluate the Trust Trust Evaluation Engine
Trust Negotiation between MHP and RelyingSP Trust Mapping Database MHP 1. RecordAccess (PatientID, Authentication Token) 2. Check Past records 5. TrustChallenge Token ATNS Engine 6. TrustChallenge Response 7. Trust Token 2. Evaluate the Trust 4. TrustChallenge Token 3. Trust Recommended Token RelyingSP Trust Evaluation Engine
Sensitive attributes are shared to MHP • Trust Token is stored inside the MHP’s mobile device MHP Relying SP Encrypted Data
Data protection at the mobile device • Data transmission in Encrypted format • The decryption key for the data decryption will be generated in the mobile device • Decryption key generation using the identity and key parameters in the mobile device • Real-time authorization for the data access • Permanent data deletion after the data utilization
Conclusion • Negotiate trust between different entities in a healthcare domain • Trust negotiation architecture • Trust negotiation protocol for message communication • Data protection in the mobile device • Security capsule architecture