Security Architecture of The Healthcare Cyber Physical System
This document summarizes a proposed security architecture for healthcare cyber-physical systems. The architecture consists of three cores: 1) a communication and sensing core that handles wireless sensors and data transmission, 2) a computation and security core that provides layered security for cloud data processing, and 3) a resource management core that determines how, when, and where to compute data segments. The architecture is applied to a healthcare example where patient biometrics are monitored and transmitted to a cloud service accessed by healthcare providers to track patients and respond if needed. The architecture focuses on sensing, communication, and storage/actuation security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
55 views1 page
Security Architecture of The Healthcare Cyber Physical System
This document summarizes a proposed security architecture for healthcare cyber-physical systems. The architecture consists of three cores: 1) a communication and sensing core that handles wireless sensors and data transmission, 2) a computation and security core that provides layered security for cloud data processing, and 3) a resource management core that determines how, when, and where to compute data segments. The architecture is applied to a healthcare example where patient biometrics are monitored and transmitted to a cloud service accessed by healthcare providers to track patients and respond if needed. The architecture focuses on sensing, communication, and storage/actuation security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1
Security Architecture of the Healthcare Cyber Physical
System
The CPeSC3 (cyber physical enhanced secured WSN- integrated
cloud computing for health care) architecture by Wang et al consisted of three components, namely Communication and sensing core, Computation and security core and Real-time scheduling and resource management core Here they propose an architecture consisting of three cores; a communication and sensing core which handles wireless sensors and their transmission of information, a computation and security core which consists of layered security for information and data computation in the cloud, and finally a resource management and scheduling core which decides how, where and when to compute different segments of data. This architecture is then applied to a healthcare example where a cloud service is constructed that links together several remote locations to promote safety and assistance to patients of a healthcare clinic. The patient’s home and biometrics are monitored using cameras and biometric sensors on the body to indicate the current health of the patient. This information is then transmitted to a cloud service, which then can be used for a wide range of services. The healthcare clinic can regularly check the up-to- date medical record of the patient and based on this prescribe new medication if some values are out of the normal range. The cloud service can also monitor if an elderly patient has fallen and needs assistance and relay this information to both the health clinic and relatives to the patient, which then could act appropriately The CPesc3 model consists of two main parts sensing & communication securities as well as storage and actuation security. We will focus on Sensing and Communication Security, Gateway and base station security, problems with hashing at user node and Storage and Actuation Security. In conclusion and will first introduce some more changes to the studied model and we will use some machine learning algorithms to check that the data that is received by the user was not intercepted by the hackers in the cloud or at the fog nodes. To ensure the security at the cloud we will try some advanced data encryption method to ensure that the data is not intercepted by someone else.