Author
Abstract
Medical information system is a comprehensive system which integrates the application of medicine, information, management, computer and other disciplines. It has been widely used in the social medical security system. But with the rapid development of Internet plus medical technology, the risk of malicious invasion has increased dramatically, which gradually exposes the problem of inadequate medical information security. Therefore, effective detection of medical information system network intrusion and timely prevention of network threats have become the focus of attention and research in this field. Intrusion detection is a common detection method in network security, it plays a very important role in network security. Traditional intrusion detection is mostly based on rule matching, statistics and other methods. With the advent of the era of big data, traditional intrusion detection can not play a good performance, especially in the face of massive, complex and unbalanced intrusion data. The privacy data access monitoring system based on virtual computing environment can monitor the access of privacy data in two levels, namely, tracking the flow of privacy data within the host and tracking the propagation of privacy data between hosts. In the host, we can customize the taint propagation rules to achieve fine-grained capture of privacy data violations in the virtual computing environment. Hence, this paper studies the medical data intrusion detection technology based on virtual data pipeline from the assurance perspectives. The model is designed and implemented with the discussions of the performance. The experimental results have proven that the proposed model is efficient.
Suggested Citation
Yijun Cai & Dian Li & Yuyue Wang, 2021.
"Medical big data intrusion detection system based on virtual data analysis from assurance perspective,"
International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 12(6), pages 1106-1116, December.
Handle:
RePEc:spr:ijsaem:v:12:y:2021:i:6:d:10.1007_s13198-021-01279-5
DOI: 10.1007/s13198-021-01279-5
Download full text from publisher
As the access to this document is restricted, you may want to
for a different version of it.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:ijsaem:v:12:y:2021:i:6:d:10.1007_s13198-021-01279-5. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.