A logger in the cloud capable of keeping a secure, time-synchronized and tamper-evident log of medical device and patient information allows efficient forensic analysis in cases of adverse events or attacks on interoperable medical devices. A secure logger as such must meet requirements of confidentiality and integrity of message logs and provide tamper-detection and tamper-evidence. In this paper, we propose a design for such a cloud-based secure logger using the Intel Software Guard Extensions (SGX) and the Trusted Platform Module (TPM). The proposed logger receives medical device information from a dongle attached to a medical device. The logger relies on SGX, TPM and standard encryption to maintain a secure communication channel even on...
Medical device security is a growing concern for medical device manufacturers, healthcare delivery o...
Cloud computing is rapidly evolving due to its efficient characteristics such as cost-effectiveness,...
Modern information technology has been utilized progressively to store and distribute a large amount...
A logger in the cloud capable of keeping a secure, time-synchronized and tamper-evident log of medic...
As devices in the Internet of Things (IoT) increase in number and integrate with everyday lives, lar...
Processing sensitive data, specially medical data produced by body sensors, on third-party untrusted...
After two recent security attacks against implantable medical devices (IMDs) have been reported, the...
Medical information systems facilitate ambulatory patient care, and increase safer and more intellig...
Medical devices have been changing in revolutionary ways in recent years. One is in their form-facto...
Many hospitals and medical clinics have been using a wearable sensor in its health care system becau...
Secure storage for medical data when using cloud systems is a problem of high importance to healthca...
The Internet of Medical Things (IoMT) is widely known as the worldwide network of interconnected hea...
Data is considered as a valuable currency that our modern world thrives upon today. Individuals, gro...
Auditing system logs is an important means of ensuring systems' security in situations where run-tim...
Part 3: Trusted ExecutionInternational audienceRemote mobile and embedded devices are used to delive...
Medical device security is a growing concern for medical device manufacturers, healthcare delivery o...
Cloud computing is rapidly evolving due to its efficient characteristics such as cost-effectiveness,...
Modern information technology has been utilized progressively to store and distribute a large amount...
A logger in the cloud capable of keeping a secure, time-synchronized and tamper-evident log of medic...
As devices in the Internet of Things (IoT) increase in number and integrate with everyday lives, lar...
Processing sensitive data, specially medical data produced by body sensors, on third-party untrusted...
After two recent security attacks against implantable medical devices (IMDs) have been reported, the...
Medical information systems facilitate ambulatory patient care, and increase safer and more intellig...
Medical devices have been changing in revolutionary ways in recent years. One is in their form-facto...
Many hospitals and medical clinics have been using a wearable sensor in its health care system becau...
Secure storage for medical data when using cloud systems is a problem of high importance to healthca...
The Internet of Medical Things (IoMT) is widely known as the worldwide network of interconnected hea...
Data is considered as a valuable currency that our modern world thrives upon today. Individuals, gro...
Auditing system logs is an important means of ensuring systems' security in situations where run-tim...
Part 3: Trusted ExecutionInternational audienceRemote mobile and embedded devices are used to delive...
Medical device security is a growing concern for medical device manufacturers, healthcare delivery o...
Cloud computing is rapidly evolving due to its efficient characteristics such as cost-effectiveness,...
Modern information technology has been utilized progressively to store and distribute a large amount...