Visible to the public AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments

TitleAZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments
Publication TypeConference Paper
Year of Publication2017
AuthorsChaudhry, J., Saleem, K., Islam, R., Selamat, A., Ahmad, M., Valli, C.
Conference Name2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops)
Keywordsatomic security components, autonomic zero-knowledge security provisioning model, AZSPM, cloud computing, cloud-based solutions, cloud-hoarding, Computational modeling, cyber security, different healthcare enterprises, edge computing, Fog Computing, FOG computing environment, fog environments, fog security administration, fully sand boxed environment, Health Care, health informatics industry, Health Information Systems, healthcare cloud-lets, healthcare facilities, healthcare information system environment, high-profile attacks, medical control systems, medical data, Medical Devices, medical information systems, Medical services, mobile computing, mobile services, Protocols, pubcrawl, Resiliency, Scalability, security, security of data, Service Provisioning

The panic among medical control, information, and device administrators is due to surmounting number of high-profile attacks on healthcare facilities. This hostile situation is going to lead the health informatics industry to cloud-hoarding of medical data, control flows, and site governance. While different healthcare enterprises opt for cloud-based solutions, it is a matter of time when fog computing environment are formed. Because of major gaps in reported techniques for fog security administration for health data i.e. absence of an overarching certification authority (CA), the security provisioning is one of the the issue that we address in this paper. We propose a security provisioning model (AZSPM) for medical devices in fog environments. We propose that the AZSPM can be build by using atomic security components that are dynamically composed. The verification of authenticity of the atomic components, for trust sake, is performed by calculating the processor clock cycles from service execution at the resident hardware platform. This verification is performed in the fully sand boxed environment. The results of the execution cycles are matched with the service specifications from the manufacturer before forwarding the mobile services to the healthcare cloud-lets. The proposed model is completely novel in the fog computing environments. We aim at building the prototype based on this model in a healthcare information system environment.

Citation Keychaudhry_azspm:_2017