The Internet of Medical Things (IoMT). Группа авторов
Чтение книги онлайн.
Читать онлайн книгу The Internet of Medical Things (IoMT) - Группа авторов страница 17
2.2.1.2 Windows-Based User Authentication
Typically, the list is stored in the Windows Active Directory for the organization. The access control framework must be enabled to provide authentication for the user’s primary domain controller (PDC).
2.2.1.3 Directory-Based Authentication
To continue our expansion in business volume, often millions of users trying to use resources simultaneously. In such a scenario, the authentication body should be able to provide faster authentication. A directory-based authentication technique that is used to respond goes to the store LDAP user directory to verify user credentials.
2.2.1.4 Certificate-Based Authentication
It is also the user where you can connect digital ID, strong authentication technology. It released the authority for digital ID verification, also known as a digital ID trustworthy digital certificate. To ensure identification, a user has checked a variety of other parameters.
2.2.1.5 Smart Card–Based Authentication
This certificate is used as a second factor [13]. Smart card is the smallest co-processor data operation cryptographic tool.
2.2.1.6 Biometrics
This is a strong certification [9]. The third aspect of authentication to be done is based on the user. He said that those that they know (username) and (either network or token) or after work that they have (retinal scan, fingerprint or thermal scanning). In cases necessary for data, such as military/defense, are confidential.
2.2.1.7 Grid-Based Authentication
It is used as a second authentication factor. The user knew that (authenticated by the authentication username password), and then they asked her (grid card information). Entrust Identity Protector provides this certificate.
2.2.1.8 Knowledge-Based Authentication
In order to gain additional confidence in the identity of those users, keep in mind that the challenge attacker [2] is unlikely to be able to provide. On the basis of “shared secret”, the organization questions the user, when appropriate, to allow user information that has been through the registration process, or how to go on related to the confirmation of the previous transaction wants to do.
2.2.1.9 Machine Authentication
Authentication of a machine is the authorization of automated communication from person-to-machine (M2M) by verification of digital certificates or digital credentials.
Digital certificates used in machine permits are like a digital passport that provides a trustworthy identification for secure information exchange on the Web. Digital credentials are similar to types of ID and password issued by the machine.
Machine authentication is used to allow machine interactions on cable and wireless networks in order to allow autonomous interaction and information sharing between computers and other machines. Machine authentication operations can be carried out with simple devices such as sensors and infrastructure meters.
2.2.1.10 One-Time Password (OTP)
A password is generated dynamically and is valid only once. The advantage of a one-time password is that if an intruder does not hack it, then he cannot use it anymore. There are two types of OTP generator traces: synchronous and asynchronous. One-time password (OTP) systems provide a mechanism for logging on to a network or service using a unique password that can only be used once, as the name suggests. The static password is the most common authentication method and the least secure.
2.2.1.11 Authority
The integrity of cloud computing needs an important information security to maintain relevant authority. It follows the following controls and privileges in the process stream in cloud computing. The rights management system should ensure that each role (including metadata) can see the need to obtain the data function. Access control should be based and the established role goes on and officers should be reviewed regularly. In general, the model of least privilege should be used, and the user and administrator only have the necessary rights for the CSP to enable them to achieve their functions [14].
2.2.1.12 Global Authorization
Subscribing to global organizations (as many as access control decisions) and rules and regulations (such as a limited user) must be lost locally. The decision should be two pieces of information provided. Subscribed virtual organizations are using the grid. In the early version of Globus software, subscription information will be found on the local network. The network [12] is mapped to the DN Mapfail account in that they require an account on all of the resources they wish to use. The authorization process performed on the Grid DAS side exploiting Community Authorization extensions (VO-based) present into the user's credentials (e.g., proxy).
2.3 System Model
In this section, we propose a model system HERDescribes blurred system architecture keyword search.
2.3.1 Role and Purpose of Design
Our host is considering a cloud computing environmentEHR services. In particular, as shown in Figure 2.1, there are four entities involved in the system.
2.3.1.1 Patients
They are institutions that you and your HERPlace it on the cloud server.
2.3.1.2 Cloud Server
A cloud server is a virtual server (rather than a physical server) running in a cloud computing environment.
2.3.1.3 Doctor
Accessing a patient‘s chart, a doctor gets summarized data including patient demographics, immunization dates, allergies, medical history, lab and test results, radiology images, vital signs, prescribed medications, and current health problems along with the health insurance plan and billing details.
Figure 2.1 Architecture for PHR system.
2.4 Data Classification
Data classification is the process of data to identify data elements in relation to value in the business of the classification