Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.

Slides:



Advertisements
Similar presentations
AUTHENTICATION AND KEY DISTRIBUTION
Advertisements

Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CSE300-1 Profs. Steven A. Demurjian Q. Jin, J. Nam, Z. Qian and C. Phillips Computer Science & Engineering Department 191 Auditorium Road, Box U-155 The.
SSL Protocol By Oana Dini. Overview Introduction to SSL SSL Architecture SSL Limitations.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
A Versatile Storage System for Future Networking Architecture Prof. Xiaohua Jia City University of Hong Kong 1.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
An In-Depth Examination of PKI Strengths, Weaknesses and Recommendations.
Federated Authentication mechanism for mobile services Dasun Weerasinghe, Saritha Arunkumar, M Rajarajan, Veselin Rakocevic Mobile Networks Research Group.
Patient’s privacy protection with anonymous access to medical services Dasun Weerasinghe, Kalid Elmufti, M Rajarajan, Veselin Rakocevic Mobile Networks.
A Secure Remote User Authentication Scheme with Smart Cards Manoj Kumar 報告者 : 許睿中 日期 :
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Identity Federation in Healthcare Networks Xiaohui Chen Department of Computer Science University of Virginia.
MITP 458 Application Layer Security By Techjocks.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Authentication Scheme for Mobil Satellite Communication Systems Advisor: Prof. Jen-Chang Liu Graduate Student: Yi-Ching Chen( 陳怡靜 ) Date: 2004/05/26.
Securing and Sharing Files Over The Internet (Content Server Security) By Amihay Schwarz Instructor: Viktor Kulikov Software System Laboratory Department.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Chapter 17 TACACS+.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
SSH Secure Login Connections over the Internet
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Wireless and Security CSCI 5857: Encoding and Encryption.
Quality of Protection (QoP) An approach that separates the development of security services from the application development partitions security services.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
Providing secure mobile access to information servers with temporary certificates Diego R. López
SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)
1 Token–based Dynamic Trust Establishment for Web Services Zhengping Wu and Alfred C. Weaver Department of Computer Science University of Virginia March.
University of Murcia Gabriel López.  Network authentication in eduroam and SSO token distribution ◦ RADIUS hierarchy ◦ Token based on SAML  Network.
S/MIME IBE Submissions Terence Spies Voltage Security.
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
1 Example security systems n Kerberos n Secure shell.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Lightweight Mutual Authentication for IoT and Its Applications
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Systems Design Chapter 6.
Autonomous Aggregate Data Analytics in Untrusted Cloud
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
Privacy Protection for E-Health Systems by
Presentation transcript:

Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks Research Group School of Engineering and Mathematical Sciences City University London.

Outline of the Presentation Motivation Proposed solution Trust Negotiation Protocol Security tokens Security Capsule Implementation

Motivation Private Medical Center A & E Relying Service Provider Medical Healthcare Personal Requesting Service Provider

Problem statement Medical Healthcare Personal authenticates to the Dynamic Trust Negotiation network Trust negotiation between the Relying service provider and the Requesting service provider Securely transmit sensitive data from the relying service provider to the Medical Healthcare Personal mobile device Data security at the mobile device

Proposed Architecture

Proposed protocol phases Medical Healthcare Personal registers and authenticates in the Dynamic Trust Negotiation Network Trust Negotiation between Relying Service Provider and Requesting Service Provider Sensitive attributes are shared to Medical Healthcare Personal in a secure channel.

Proposed protocol phases (Contd.) Medical Healthcare Personal– MHP Requesting Service Provider– RequestingSP Relying Service Provider– RelyingSP Authentication and Trust Negotiation Server- ATNS

MHP registers and authenticates with ATNS ATNS Engine MHP 1. Login Token2. Login Token 3. Check Past records 4. Evaluate the Trust Trust Evaluation Engine Trust Mapping Database RequestingSP 5. Authentication Token

Trust Negotiation between MHP and RelyingSP ATNS Engine MHP 1. RecordAccess (PatientID, Authentication Token) 4. TrustChallenge Token 2. Check Past records 2. Evaluate the Trust Trust Evaluation Engine Trust Mapping Database RelyingSP 3. Trust Recommended Token 6. TrustChallenge Response 5. TrustChallenge Token 7. Trust Token

Sensitive attributes are shared to MHP MHP Relying SP Encrypted Data Trust Token is stored inside the MHP’s mobile device

Data protection at the mobile device Data transmission in Encrypted format The decryption key for the data decryption will be generated in the mobile device Decryption key generation using the identity and key parameters in the mobile device Real-time authorization for the data access Permanent data deletion after the data utilization

Security Capsule Architecture

Conclusion Negotiate trust between different entities in a healthcare domain Trust negotiation architecture Trust negotiation protocol for message communication Data protection in the mobile device Security capsule architecture

Q & A