Disseminação Robusta de Dados Pessoais Sensíveis Baseada em Comunidade de Interesse e Confiança Social para Suportar Situações Emergenciais de Saúde
Resumo
Os serviços de saúde em redes (e-health) lidam com dados pessoais sensíveis, que devem ser preservados na entrega e do acesso não autorizado. Os mecanismos de controle de disseminação atualmente se voltam principalmente aos ambientes de saúde estruturados, como hospitais, mas ainda não atendem adequadamente nos momentos entre o surgimento de uma emergência e o seu atendimento em ambientes urbanos dinâmicos, como ruas e avenidas. Aspectos sociais das pessoas e de suas relações contribuem para a entrega confiável desses dados. Este trabalho apresenta STEALTH, um sistema que emprega confiança social e comunidades de interesse (CoI) para controlar a disseminação dos dados sensíveis das pessoas em situações emergenciais em ambientes dinâmicos. Simulações no NS-3 demonstram sua capacidade de assegurar a disseminação de dados sensíveis às pessoas que possam contribuir para um atendimento eficiente. STEALTH obteve uma confiabilidade de até 80% no acesso aos dados disseminados, uma latência máxima de 95ms e uma disponibilidade de até 98,8% para atender situações emergenciais.Referências
Al-Hamadi, H. and Chen, R. (2017). Trust-Based Decision Making for Health IoT Systems. IEEE Internet of Things Journal, 4(5):1408–1419.
Association, I. S. et al. (2012). 802.15. 6-2012 IEEE Standards for Local and Metropolitan Area Networks–Part 15.6: Wireless Body Area Networks.
Bao, F. and Chen, R. (2012). Trust Management for the Internet of Things and Its Application to Service Composition. In WoWMoM 2012, pages 1–6.
Bao, F., Chen, R., and Guo, J. (2013). Scalable, Adaptive and Survivable Trust Management for Community of Interest Based Internet of Things Systems. In ISADS 2013, pages 1–7.
Carminati, B., Ferrari, E., and Guglielmi, M. (2016). Detection of Unspecified Emergencies for Controlled Information Sharing. IEEE TDSC, 13(6):630–643.
Cho, J.-H., Chan, K., and Adali, S. (2015). A Survey on Trust Modeling. ACM Computing Surveys (CSUR), 48(2):28.
Coscia, M., Giannotti, F., and Pedreschi, D. (2011). A classification for community discovery methods in complex networks. Statistical Analysis and Data Mining, 4(5):512–546.
Feige, U., Fiat, A., and Shamir, A. (1988). Zero-knowledge proofs of identity. Journal of cryptology, 1(2):77–94.
Garyfalos, A. and Almeroth, K. C. (2008). Coupons: A Multilevel Incentive Scheme for Information Dissemination in Mobile Networks. IEEE Transactions on Mobile Computing, 7(6):792–804.
Helgason, Ó., Kouyoumdjieva, S. T., and Karlsson, G. (2014). Opportunistic Communication and Human Mobility. IEEE Transactions on Mobile Computing, 13(7):1597–1610.
Latré, B., Braem, B., Moerman, I., Blondia, C., and Demeester, P. (2011). A survey on wireless body area networks. Wireless Networks, 17(1):1–18.
Lima, M. N., dos Santos, A. L., and Pujolle, G. (2009). A Survey of Survivability in Mobile Ad Hoc Networks. IEEE Communications Surveys and Tutorials, 11(1):66–77.
Mohammad, S. and Hirst, G. (2012). Distributional Measures of Semantic Distance: A Survey. CoRR, abs/1203.1858.
Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., and Jamalipour, A. (2014). Wireless Body Area Networks: A Survey. IEEE Communications surveys & tutorials, 16(3):1658–1686.
Nogueira, M., Mannes, E., and Santos, A. (2012). Serviços Confiáveis em MANETs Baseado em Sistema de Quórum Tolerante à Má-conduta. In Anais do XXX SBRC, pages 305–318. SBC.
Resnik, P. (1999). Semantic Similarity in a Taxonomy: An Information-Based Measure and its Application to Problems of Ambiguity in Natural Language. JAIR, 11:95–130.
Rossetti, G. and Cazabet, R. (2018). Community Discovery in Dynamic Networks: a Survey. ACM Computing Surveys (CSUR), 51(2):35.
Silverstein, J. (2019). Hundreds of millions of Facebook user records were exposed on Amazon cloud server. https://www.cbsnews.com/news/millions-facebook-user-records-exposedamazon-cloud-server/. [Online]. Acessado em Abr. 2019.
Truong, N. B., Lee, H., Askwith, B., and Lee, G. M. (2017). Toward a Trust Evaluation Mechanism in the Social Internet of Things. Sensors, 17(6):1346.
Vasilomanolakis, E., Wolf, J. H., Böck, L., Karuppayah, S., and Mühlhäuser, M. (2017). I Trust my Zombies: A Trust-enabled Botnet. CoRR, abs/1712.03713.
Vivekavardhana, R. B. and Sudhindra, K. R. (2014). Survey of Trust Models in Wireless Sensor Networks. IJAIST, 31(31).
Williams, M., Nurse, J. R., and Creese, S. (2016). The Perfect Storm: The Privacy Paradox and the Internet-of-Things. In ARES 2016, pages 644–652. IEEE.
Wu, Z. and Palmer, M. (1994). Verbs semantics and lexical selection. In ACM Proceedings of the 32nd annual meeting on Association for Computational Linguistics, pages 133–138.
Association, I. S. et al. (2012). 802.15. 6-2012 IEEE Standards for Local and Metropolitan Area Networks–Part 15.6: Wireless Body Area Networks.
Bao, F. and Chen, R. (2012). Trust Management for the Internet of Things and Its Application to Service Composition. In WoWMoM 2012, pages 1–6.
Bao, F., Chen, R., and Guo, J. (2013). Scalable, Adaptive and Survivable Trust Management for Community of Interest Based Internet of Things Systems. In ISADS 2013, pages 1–7.
Carminati, B., Ferrari, E., and Guglielmi, M. (2016). Detection of Unspecified Emergencies for Controlled Information Sharing. IEEE TDSC, 13(6):630–643.
Cho, J.-H., Chan, K., and Adali, S. (2015). A Survey on Trust Modeling. ACM Computing Surveys (CSUR), 48(2):28.
Coscia, M., Giannotti, F., and Pedreschi, D. (2011). A classification for community discovery methods in complex networks. Statistical Analysis and Data Mining, 4(5):512–546.
Feige, U., Fiat, A., and Shamir, A. (1988). Zero-knowledge proofs of identity. Journal of cryptology, 1(2):77–94.
Garyfalos, A. and Almeroth, K. C. (2008). Coupons: A Multilevel Incentive Scheme for Information Dissemination in Mobile Networks. IEEE Transactions on Mobile Computing, 7(6):792–804.
Helgason, Ó., Kouyoumdjieva, S. T., and Karlsson, G. (2014). Opportunistic Communication and Human Mobility. IEEE Transactions on Mobile Computing, 13(7):1597–1610.
Latré, B., Braem, B., Moerman, I., Blondia, C., and Demeester, P. (2011). A survey on wireless body area networks. Wireless Networks, 17(1):1–18.
Lima, M. N., dos Santos, A. L., and Pujolle, G. (2009). A Survey of Survivability in Mobile Ad Hoc Networks. IEEE Communications Surveys and Tutorials, 11(1):66–77.
Mohammad, S. and Hirst, G. (2012). Distributional Measures of Semantic Distance: A Survey. CoRR, abs/1203.1858.
Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., and Jamalipour, A. (2014). Wireless Body Area Networks: A Survey. IEEE Communications surveys & tutorials, 16(3):1658–1686.
Nogueira, M., Mannes, E., and Santos, A. (2012). Serviços Confiáveis em MANETs Baseado em Sistema de Quórum Tolerante à Má-conduta. In Anais do XXX SBRC, pages 305–318. SBC.
Resnik, P. (1999). Semantic Similarity in a Taxonomy: An Information-Based Measure and its Application to Problems of Ambiguity in Natural Language. JAIR, 11:95–130.
Rossetti, G. and Cazabet, R. (2018). Community Discovery in Dynamic Networks: a Survey. ACM Computing Surveys (CSUR), 51(2):35.
Silverstein, J. (2019). Hundreds of millions of Facebook user records were exposed on Amazon cloud server. https://www.cbsnews.com/news/millions-facebook-user-records-exposedamazon-cloud-server/. [Online]. Acessado em Abr. 2019.
Truong, N. B., Lee, H., Askwith, B., and Lee, G. M. (2017). Toward a Trust Evaluation Mechanism in the Social Internet of Things. Sensors, 17(6):1346.
Vasilomanolakis, E., Wolf, J. H., Böck, L., Karuppayah, S., and Mühlhäuser, M. (2017). I Trust my Zombies: A Trust-enabled Botnet. CoRR, abs/1712.03713.
Vivekavardhana, R. B. and Sudhindra, K. R. (2014). Survey of Trust Models in Wireless Sensor Networks. IJAIST, 31(31).
Williams, M., Nurse, J. R., and Creese, S. (2016). The Perfect Storm: The Privacy Paradox and the Internet-of-Things. In ARES 2016, pages 644–652. IEEE.
Wu, Z. and Palmer, M. (1994). Verbs semantics and lexical selection. In ACM Proceedings of the 32nd annual meeting on Association for Computational Linguistics, pages 133–138.
Publicado
02/09/2019
Como Citar
BATISTA, Agnaldo; NOGUEIRA, Michele; SANTOS, Aldri.
Disseminação Robusta de Dados Pessoais Sensíveis Baseada em Comunidade de Interesse e Confiança Social para Suportar Situações Emergenciais de Saúde. In: SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS (SBSEG), 19. , 2019, São Paulo.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2019
.
p. 197-210.
DOI: https://doi.org/10.5753/sbseg.2019.13972.