Font Size: a A A

Privacy Data Protection Scheme In Medical Internet Of Things

Posted on:2017-01-14Degree:MasterType:Thesis
Country:ChinaCandidate:H P YeFull Text:PDF
GTID:2348330491453721Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the improvement of people's living standards and the rapid development of the Internet era,people's demand for medical services is no longer limited to the traditional medical treatment approach,and they put forward more convenient and more secure requirements.At present,the treatment entrance is becoming more and more open to Internet,and medical services are becoming more intelligent.Subsequently,massive multi-type of medical data which contain all kinds of user identity data,various types of medical data and other sensitive information are generated.Such a large scale of data in the transmission and storage process is facing the risk of data leakage and patient's privacy information being stolen.To effectively protect the patient's privacy information,we elaborate from three aspects: the community medical data acquisition and transmission,data storage and access control.Then we propose a secure privacy data protection scheme for Medical Internet of Things.The main research work and innovation are as follows:1)In regard to the transmission,bidirectional identity authentication is used to ensure the identity legitimacy of both sides in data transmission,the additional certification is used to improve the security of the key agreement compared to DiffieHellman key agreement algorithm,and the data slice in multiplex ways is used to increase the attacking difficulty to obtain complete data.2)In regard to the storage,after the server buffer receives data uploaded to the medical,the uploaded medical data are decrypted by the control area,and stored securely by way of key encryption and transparent encryption.3)In regard to the access control,the login authentication and access authorization are combined to provide the secure server access so as to isolate non-authorized persons from accessing to patient's data,and the authorized statute of limitations is used to limit the effective access time so as to ensure the privacy and security of medical data of patients.Through theoretical analysis and simulation experiments,it is proved that the community medical data can be effectively protected in the transmission,storage and access control process.
Keywords/Search Tags:Medical Internet of Things, primary care, privacy security, encryption, access authorization
PDF Full Text Request
Related items