Font Size: a A A

Research On MedSecurity Electronic Health Record Privacy Protection Model And Key Technologies In Medical Cloud

Posted on:2021-05-23Degree:MasterType:Thesis
Country:ChinaCandidate:H R LiuFull Text:PDF
GTID:2504306032965559Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The commercialization of 5G has greatly promoted the development of the medical Internet of Things,and more medical equipment connected to the Internet will further increase the communication power consumption.At the same time,the privacy protection technology in cloud computing cannot be matched with the rapid development of medical applications,which provides an opportunity for attackers to steal user data.At this stage,there are mainly the following problems in the medical cloud:(1)Access to multiple devices in the medical cloud will increase the burden on the key infrastructure,greatly increase the user’s waiting time,and cause an imbalance in communication resources.At the same time,the imperfect verification scheme at this stage still faces the risk of man in the middle attacks.(2)Existing encryption algorithms have not been optimized for the characteristics of medical data,which can easily cause a larger amount of ciphertext data and increase the cost of data transmission.At the same time,it is also easy to cause problems of low data encryption security and poor hardware compatibility.(3)The existing decoy protection methods still have the problems of poor decoy protection of the original data and high decoy construction failure rate.Therefore,it is extremely challenging to explore a balanced communication scheme with high security and low energy consumption,low cipher text output,safe and fast encryption technology,and decoy data with strong confusion and high authenticity between medical devices and cloud servers.This paper focuses on medical cloud communication scheme,encryption algorithm and decoy method,specifically as follows:(1)A new medical electronic health record security protection model which named MedSecurity electronic health record privacy protection model is proposed.The model includes the MedGreen communication scheme with balanced overhead and energy saving,the MedSecrecy encryption algorithm with high security and low ciphertext output,and the MedDecoy decoy algorithm with high pseudo-authenticity to the traditional medical cloud model.Compared with the traditional medical model,the model improves the security of communication,data transmission and storage in the cloud,balances resource overhead,and also has data sharing functions.(2)In view of the problems of large resource overhead and insufficient security in medical communication,a security balanced energy-saving communication authentication scheme based on elliptic curve cryptography and bilinear pairing which named MedGreen is proposed.MedGreen algorithm is the core of the scheme,and it combines key establishment with the identity authentication process,reduces communication for key establishment and identity authentication processes,balances the resource overhead between the key center and the user.Theoretical verification and resource cost analysis show that the MedGreen algorithm has better energy saving and balance than other algorithms,improves the security of identity verification,and can resist man in the middle attacks.(3)In view of the characteristics of large repetition of medical data and high data sensitivity,a medical security compression encryption technology based on Huffman compression and RC4 algorithm which named MedSecrecy is proposed.MedSecrecy algorithm is the core of the technology.While maintaining the RC4 encryption efficiency,the algorithm enhances the confidentiality of the algorithm and the randomness of the key stream,and reduces the amount of ciphertext data.Theoretical verification and simulation results show that MedSecrecy algorithm has certain advantages over other algorithms in terms of encryption overhead,ciphertext data volume and security,and it is more suitable for encryption of medical data.(4)Aiming at the problem of leakage of user privacy due to inaccurate decoy construction in medical decoy,a decoy mechanism based on decoy technology which named MedDecoy is proposed.MedDecoy algorithm is the core of the mechanism.The algorithm combines computer engineering and medical theory,clarifies the data association in electronic health records and the construction principle of decoys,and solves the problem of excessive similarity between decoys and original data.Theoretical analysis and simulation results show that the MedDecoy algorithm maintains the decoy efficiency of the traditional decoy technology while improving the pseudo-authenticity and difference of the decoy,and further enhances the decoy’s ability to protect medical data.
Keywords/Search Tags:Medical big data, Secure communication, Data encryption, Decoy technology, Privacy protection
PDF Full Text Request
Related items