移动医疗监护网络中保护隐私的认证协议研究
发布时间:2018-08-05 13:40
【摘要】:报告显示,我国逐渐进入人口老龄化社会,并且由于医疗资源紧张的缘故,使得整个国家呈现出看病难的现象。因此,关注中老年人的身体健康状况并利用网络资源缓解医疗资源的紧张现象,具有重要的现实意义。无线体域网是将功能传感器布置在身体上并实时持续地收集生理数据。而将无线体域网用于远程医疗,不仅可以让病患可以在家接受专业的监护,还可以让出部分医疗资源,从而缓解看病难的状况。在基于无线体域网的移动医疗监护网络中,病患传输的数据中包含着病患的敏感隐私,如病种,病的程度等。由于无线网络的开放性,网络中存在的主动与被动攻击者,会对病患的隐私安全造成威胁。因此,移动医疗监护网络中的认证机制,与其功能、性能同等重要。病患通过无线网络接入医疗服务,医疗服务提供方需要对病患的身份进行认证,现在随着网络监管力度的增大,对注册身份的核实也越来越严。同样地,这也会伴随着个人隐私信息泄露的风险。另外,在医疗服务中,只需要对生理数据进行分析进而可以给出诊疗意见,无需身份信息。因此,在移动医疗监护网络的认证机制中,有着身份认证与身份信息隐匿的安全需求。本文围绕移动医疗监护网络中保护隐私的认证协议进行研究,主要的工作体现在以下两个方面:(1)对移动医疗监护网络身份认证过程中病患的身份隐匿性进行研究,分析总结现有的匿名方法,得出基于假名池的和基于验证表的匿名认证协议中病患手持移动设备处和医疗服务器端的存储代价与假名池的长度和系统中用户数量成正比,存储代价较高。另外,假名池的定期更新需要额外的维护代价,验证表中信息的不及时更新,会使得系统的风险系数增高。因此,为了降低病患手持移动设备处和医疗服务器端的存储代价,针对移动医疗监护网络的特点,在医疗服务器网关处布置一个只能执行固化程序的安全中间件,只负责将来自病患的签名消息转换为自己的签名消息,从而使得远程医疗服务器端接收到的签名消息都由安全中间件签名。结合代理重签名技术,提出一个基于安全中间件的匿名认证协议。病患端和医疗服务器端由于不需要存储额外的密钥信息,从而在较大程度上降低存储代价。经过安全性分析,证明所提协议不仅可以满足基本的安全需求,还可以抵抗各种网络攻击。通过性能评估,证实所提协议不仅提高了系统的安全性,存储代价和计算代价较低,较适用于移动医疗监护网络。(2)对移动医疗监护网络中保护隐私的认证协议的用户密钥可撤销性进行研究,发现现有的密钥可撤销研究工作中用户的密钥存储量过大,并由于增加用户撤销功能而使得认证效率较大程度地降低。本文分析总结现有的密钥管理方法,结合无证书公钥密码学与轻量级的带密钥哈希链技术,提出一个无配对的可撤销无证书公钥加密方案。将用户密钥分为独立的两部分:与身份有关的密钥和与时间有关的密钥。用户只有拥有完整的两部分密钥才能完成认证。用户被撤销时,只更新未撤销用户的时间密钥。通过在随机预言模型下,证明我们的方案在适应性选择消息攻击下是密文不可区分的。基于该方案,结合移动医疗监护系统模型,提出一个用户可撤销的保护隐私的认证协议。经过安全性分析,证明所提协议不仅能满足基本的安全需求,也能够抵抗各种网络攻击。由于我们的协议是无配对的,通过性能评估,证实所提协议在安全和效率上达到了较好的折中性。
[Abstract]:The report shows that China has gradually entered the aging society of the population, and because of the shortage of medical resources, it has made the whole country difficult to see the disease. Therefore, it is of great practical significance to pay attention to the physical health of the middle-aged and the elderly and to use the network resources to alleviate the tension of medical resources. The sensor is arranged on the body and collects physical data in real time. The use of wireless body domain network in telemedicine can not only allow patients to receive professional care at home, but also give out part of the medical resources to alleviate the difficult condition of seeing the disease. Data transmitted by patients in mobile medical monitoring network based on wireless body domain network It contains the sensitive privacy of the patient, such as the disease and the degree of the disease. Because of the openness of the wireless network, the presence of active and passive attackers in the network threatens the privacy and security of the patient. Therefore, the authentication mechanism in the mobile medical monitoring network is equally important to its function and nature. The provider of medical services needs to authenticate the identity of the patient. With the increase of network supervision, the verification of the registered identity is becoming more and more strict. Similarly, this will also accompany the risk of disclosure of personal privacy information. In addition, in medical services, it is necessary to analyze the physiological data and give the advice of diagnosis and treatment, no need. Identity information. Therefore, in the authentication mechanism of mobile medical monitoring network, there is a security requirement of identity authentication and identity information concealment. This paper studies the authentication protocol of privacy protection in mobile medical monitoring network. The main work is embodied in the following two aspects: (1) disease in the process of identity authentication in mobile medical monitoring network The identity concealment is studied, and the existing anonymous methods are analyzed and summarized. The storage costs of the patient's handheld mobile devices and the medical server end are proportional to the length of the pseudonym pool and the number of users in the system, and the storage cost is higher. In order to reduce the storage cost of the patient's handheld mobile device and the medical server side, a cure can only be performed at the medical service gateway in order to reduce the storage cost of the patient's handheld mobile device and the medical server side. All middleware is responsible for the conversion of signature messages from patients to their own signature messages in the future, so that the signature messages received by the telemedicine server end are signed by the security middleware. An anonymous authentication protocol based on the security middleware is proposed. Through security analysis, it is proved that the proposed protocol can not only meet the basic security requirements, but also resist various network attacks. Through performance evaluation, it is proved that the proposed protocol not only improves the security of the system, the storage cost and the computational cost are lower, and is more applicable. In mobile medical monitoring network (2) research on user key revocation of authentication protocol for privacy protection in mobile medical monitoring network. It is found that the user's key storage capacity is too large in the existing key revocable research work, and the efficiency of authentication is greatly reduced due to the increase of user revocation function. The existing key management method, combining the certificate public key cryptology and the lightweight key hash chain technology, presents an unpaired certificate free public key encryption scheme. The user key is divided into two independent parts: identity related key and time related key. Only the user has a complete two part key. When the user is revoked, only the time key of the unrevoked user is updated. Through the random prophecy model, it is proved that our scheme is ciphertext undistinguishable under the adaptive choice message attack. Based on this scheme, a user revocable authentication protocol for privacy protection is proposed in combination with the mobile medical monitoring system model. Security analysis shows that the proposed protocol can not only meet the basic security requirements, but also resist various network attacks. Because our protocol is unmatched, the performance evaluation proves that the proposed protocol has achieved good neutrality in security and efficiency.
【学位授予单位】:安徽大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP309
本文编号:2165964
[Abstract]:The report shows that China has gradually entered the aging society of the population, and because of the shortage of medical resources, it has made the whole country difficult to see the disease. Therefore, it is of great practical significance to pay attention to the physical health of the middle-aged and the elderly and to use the network resources to alleviate the tension of medical resources. The sensor is arranged on the body and collects physical data in real time. The use of wireless body domain network in telemedicine can not only allow patients to receive professional care at home, but also give out part of the medical resources to alleviate the difficult condition of seeing the disease. Data transmitted by patients in mobile medical monitoring network based on wireless body domain network It contains the sensitive privacy of the patient, such as the disease and the degree of the disease. Because of the openness of the wireless network, the presence of active and passive attackers in the network threatens the privacy and security of the patient. Therefore, the authentication mechanism in the mobile medical monitoring network is equally important to its function and nature. The provider of medical services needs to authenticate the identity of the patient. With the increase of network supervision, the verification of the registered identity is becoming more and more strict. Similarly, this will also accompany the risk of disclosure of personal privacy information. In addition, in medical services, it is necessary to analyze the physiological data and give the advice of diagnosis and treatment, no need. Identity information. Therefore, in the authentication mechanism of mobile medical monitoring network, there is a security requirement of identity authentication and identity information concealment. This paper studies the authentication protocol of privacy protection in mobile medical monitoring network. The main work is embodied in the following two aspects: (1) disease in the process of identity authentication in mobile medical monitoring network The identity concealment is studied, and the existing anonymous methods are analyzed and summarized. The storage costs of the patient's handheld mobile devices and the medical server end are proportional to the length of the pseudonym pool and the number of users in the system, and the storage cost is higher. In order to reduce the storage cost of the patient's handheld mobile device and the medical server side, a cure can only be performed at the medical service gateway in order to reduce the storage cost of the patient's handheld mobile device and the medical server side. All middleware is responsible for the conversion of signature messages from patients to their own signature messages in the future, so that the signature messages received by the telemedicine server end are signed by the security middleware. An anonymous authentication protocol based on the security middleware is proposed. Through security analysis, it is proved that the proposed protocol can not only meet the basic security requirements, but also resist various network attacks. Through performance evaluation, it is proved that the proposed protocol not only improves the security of the system, the storage cost and the computational cost are lower, and is more applicable. In mobile medical monitoring network (2) research on user key revocation of authentication protocol for privacy protection in mobile medical monitoring network. It is found that the user's key storage capacity is too large in the existing key revocable research work, and the efficiency of authentication is greatly reduced due to the increase of user revocation function. The existing key management method, combining the certificate public key cryptology and the lightweight key hash chain technology, presents an unpaired certificate free public key encryption scheme. The user key is divided into two independent parts: identity related key and time related key. Only the user has a complete two part key. When the user is revoked, only the time key of the unrevoked user is updated. Through the random prophecy model, it is proved that our scheme is ciphertext undistinguishable under the adaptive choice message attack. Based on this scheme, a user revocable authentication protocol for privacy protection is proposed in combination with the mobile medical monitoring system model. Security analysis shows that the proposed protocol can not only meet the basic security requirements, but also resist various network attacks. Because our protocol is unmatched, the performance evaluation proves that the proposed protocol has achieved good neutrality in security and efficiency.
【学位授予单位】:安徽大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP309
【参考文献】
相关期刊论文 前2条
1 刘毅;宋余庆;;无线体域网技术研究[J];小型微型计算机系统;2013年08期
2 洪璇;陈克非;万中美;;简单的通用可组合代理重签名方案[J];软件学报;2010年08期
,本文编号:2165964
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/2165964.html