The Internet of Medical Things (IoMT). Группа авторов

Чтение книги онлайн.

Читать онлайн книгу The Internet of Medical Things (IoMT) - Группа авторов страница 17

The Internet of Medical Things (IoMT) - Группа авторов

Скачать книгу

align="center">

       2.2.1.2 Windows-Based User Authentication

      Typically, the list is stored in the Windows Active Directory for the organization. The access control framework must be enabled to provide authentication for the user’s primary domain controller (PDC).

       2.2.1.3 Directory-Based Authentication

       2.2.1.4 Certificate-Based Authentication

      It is also the user where you can connect digital ID, strong authentication technology. It released the authority for digital ID verification, also known as a digital ID trustworthy digital certificate. To ensure identification, a user has checked a variety of other parameters.

       2.2.1.5 Smart Card–Based Authentication

      This certificate is used as a second factor [13]. Smart card is the smallest co-processor data operation cryptographic tool.

       2.2.1.6 Biometrics

      This is a strong certification [9]. The third aspect of authentication to be done is based on the user. He said that those that they know (username) and (either network or token) or after work that they have (retinal scan, fingerprint or thermal scanning). In cases necessary for data, such as military/defense, are confidential.

       2.2.1.7 Grid-Based Authentication

      It is used as a second authentication factor. The user knew that (authenticated by the authentication username password), and then they asked her (grid card information). Entrust Identity Protector provides this certificate.

       2.2.1.8 Knowledge-Based Authentication

      In order to gain additional confidence in the identity of those users, keep in mind that the challenge attacker [2] is unlikely to be able to provide. On the basis of “shared secret”, the organization questions the user, when appropriate, to allow user information that has been through the registration process, or how to go on related to the confirmation of the previous transaction wants to do.

       2.2.1.9 Machine Authentication

      Authentication of a machine is the authorization of automated communication from person-to-machine (M2M) by verification of digital certificates or digital credentials.

      Digital certificates used in machine permits are like a digital passport that provides a trustworthy identification for secure information exchange on the Web. Digital credentials are similar to types of ID and password issued by the machine.

       2.2.1.10 One-Time Password (OTP)

      A password is generated dynamically and is valid only once. The advantage of a one-time password is that if an intruder does not hack it, then he cannot use it anymore. There are two types of OTP generator traces: synchronous and asynchronous. One-time password (OTP) systems provide a mechanism for logging on to a network or service using a unique password that can only be used once, as the name suggests. The static password is the most common authentication method and the least secure.

       2.2.1.11 Authority

      The integrity of cloud computing needs an important information security to maintain relevant authority. It follows the following controls and privileges in the process stream in cloud computing. The rights management system should ensure that each role (including metadata) can see the need to obtain the data function. Access control should be based and the established role goes on and officers should be reviewed regularly. In general, the model of least privilege should be used, and the user and administrator only have the necessary rights for the CSP to enable them to achieve their functions [14].

       2.2.1.12 Global Authorization

      Subscribing to global organizations (as many as access control decisions) and rules and regulations (such as a limited user) must be lost locally. The decision should be two pieces of information provided. Subscribed virtual organizations are using the grid. In the early version of Globus software, subscription information will be found on the local network. The network [12] is mapped to the DN Mapfail account in that they require an account on all of the resources they wish to use. The authorization process performed on the Grid DAS side exploiting Community Authorization extensions (VO-based) present into the user's credentials (e.g., proxy).

      In this section, we propose a model system HERDescribes blurred system architecture keyword search.

      2.3.1 Role and Purpose of Design

       2.3.1.1 Patients

      They are institutions that you and your HERPlace it on the cloud server.

       2.3.1.2 Cloud Server

      A cloud server is a virtual server (rather than a physical server) running in a cloud computing environment.

       2.3.1.3 Doctor

      Accessing a patient‘s chart, a doctor gets summarized data including patient demographics, immunization dates, allergies, medical history, lab and test results, radiology images, vital signs, prescribed medications, and current health problems along with the health insurance plan and billing details.

Schematic illustration of the architecture for PHR system.

Скачать книгу