Methods Inf Med 2005; 44(02): 202-206
DOI: 10.1055/s-0038-1633947
Original Article
Schattauer GmbH

Security Architecture for Health Grid Using Ambient Intelligence

S. Naqvi
1   Computer Sciences and Networks Department, Graduate School of Telecommunications, Paris, France
,
M. Riguidel
1   Computer Sciences and Networks Department, Graduate School of Telecommunications, Paris, France
,
I. Demeure
1   Computer Sciences and Networks Department, Graduate School of Telecommunications, Paris, France
› Author Affiliations
Further Information

Publication History

Publication Date:
05 February 2018 (online)

Summary

Objectives: To propose a novel approach of incorporating ambient intelligence in the health grid security architecture.

Methods: Security concerns are severely impeding the grid community effort in spreading its wings in health applications. In this paper, we have proposed a high level approach to incorporate ambient intelligence for health grid security architecture and have argued that this will significantly improve the current state of the grid security paradigm with an enhanced user-friendly environment. We believe that the time is right to shift the onus of traditional security mechanisms onto the new technologies. The incorporation of ambient intelligence in the security architecture of a grid will not only render a security paradigm robust but also provide an attractive vision for the future of computing by bringing the two worlds together.

Results: In this article we propose an evolutionary approach of utilizing smart devices for grid security architecture. We argue that such an infrastructure will impart unique features to the existing grid security paradigms by offering fortified and relentless monitoring. This new security architecture will be comprehensive in nature but will not be cumbersome for the users due to its typical characteristics of not prying into their lives and adapting to their needs.

Conclusions: We have identified a new paradigm of the security architecture for a health grid that will not only render a security mechanism robust but will also provide the high levels of user-friendliness. As our approach is a first contribution to this problem, a number of other issues for future research remain open. However, the prospects are fascinating.

 
  • References

  • 1 Ducatel K, Bogdanowicz M, Scapolo F, Leijten J, Burgelman J-C. Scenarios for Ambient Intelligence in 2010, Research Report – European Commission (EC) Information Society Technologies (IST), February. 2001
  • 2 Burdea G, Coiffet P. Virtual Reality Technology, Wiley-Interscience, ISBN: 0–471–08632–5, June. 1994
  • 3 Phan T, Huang L, Dulan C. Challenge: Integrating Mobile Wireless Devices into the Computational Grid, Proceedings of MOBICOM’02, Atlanta, Georgia, USA, ISBN 1–58113–486-X, September 23-26. 2002: 271-8.
  • 4 Miller B, Bisdikian C. Book: Bluetooth Revealed, Prentice Hall publisher, ISBN 0–13–090294–2, September. 2000
  • 5 Gast M. Book: 802.11 Wireless Networks!, O’Reilly publisher, ISBN: 0–596–00183–5, April. 2002
  • 6 Tierney B, Crowley B, Gunter D, Holding M, Lee J, Thompson M. A Monitoring Sensor Management System for Grid Environments, Lawrence Berkeley National Laboratory. Berkeley, USA: University of California; 2002
  • 7 Lee D, Dongarra J, Ramakrishna R. visPerf: Monitoring Tool for Grid Computing, Workshop on Grid Computing, Baltimore, MD, USA, November 18. 2002
  • 8 Wood AD, Stankovic JA. Denial of Services in Sensor Networks, IEEE Computer, Volume 35, Issue 10, October. 2002: 54-62.
  • 9 http://www.healthgrid.org.
  • 10 Naqvi S, Riguidel M. Security Risk Analysis for Grid Computing, Cracow Grid Workshop 2003 (CGW’03), Krakow – Poland, October. 2003: 27-29.
  • 11 Millenson M. Demanding Medical Excellence: Doctors and Accountability in the Information Age, University of Chicago Press, ISBN: 0–226–52587–2, November. 1997
  • 12 Miller B. Vital Signs of Identity, IEEE Spectrum, Volume 31, Issue 2, February. 1994: 22-30.
  • 13 Neuman B, Theodore T. Kerberos: An Authentication Service for Computer Networks, IEEE Communications, Volume 32, Issue 9, September. 1994: 33-8.
  • 14 Lock R, Sommerville I. Grid Security and its Use of X.509 Certificates, PA9 Project Paper, Department of Computer Science, Lancaster University.
  • 15 Harrison C, Chess D, Kershenbaum A. Are mobile agents a good idea? Technical report, IBM Research Report, IBM Research Division. Yorktown Heights, NY, March: T.J. Watson Research Center; 1995