Browse > Article

Designing Mutual Cooperation Security Model for IP Spoofing Attacks about Medical Cluster Basis Big Data Environment  

An, Chang Ho ((사)전국지방의료원연합회 기획운영부)
Baek, Hyun Chul (경남도립남해대학 스마트융합정보과)
Seo, Yeong Geon (경상대학교 컴퓨터과학과)
Jeong, Won Chang (진주보건대학 복지행정계열)
Park, Jae Heung (경상대학교 컴퓨터과학과)
Publication Information
Abstract
Our society is currently exposed to environment of various information that is exchanged real time through networks. Especially regarding medical policy, the government rushes to practice remote medical treatment to improve the quality of medical services for citizens. The remote medical practice requires establishment of medical information based on big data for customized treatment regardless of where patients are. This study suggests establishment of regional medical cluster along with defense and protection cooperation models that in case service availability is harmed, and attacks occur, the attacks can be detected, and proper measures can be taken. For this, the study suggested forming networks with nationwide local government hospitals as regional virtual medical cluster bases by the same medical information system. The study also designed a mutual cooperation security model that can real time cope with IP Spoofing attack that can occur in the medical cluster and DDoS attacks accordingly, so that the limit that sole system and sole security policy have can be overcome.
Keywords
Big Data; Security; Cloud Computing; Encryption; Traceback; Telemedicine; IPSpoofing; DDoS;
Citations & Related Records
연도 인용수 순위
  • Reference
1 의료기관간 진료정보교류표준 고시(안)소개, 보건복지부, 2016. 10.
2 C-C. Park, G-H. Park, S-H. Kim, and S-H. Koh, The proposal of evaluation measure from hospital information system : The case study of C national university hospital in Korea, Journal of The Korea Knowledge Information Technology Systems, Vol. 2, No. 2, pp. 69-77, 2007.
3 J-H. Choi, Analysis of changes in the muscle activity and fatigue of the erector spinae using IT convergent type medical equipment, Journal of Knowledge Information Technology and Systems, Vol. 10, No. 6, pp. 665-673, 2015.
4 S-K. Park, A study on the regional differences of telemedicine and digital divide, Journal of the Kor ean Geographical Society, Vol. 50, No. 3, pp. 325-338, 2015.
5 전정훈, "클라우드 컴퓨팅 서비스의 취약성과 대응 기술 동향에 관한 연구" 한국융합보안학회, Vol 13, No. 6, pp. 1239-1246, 2013. 4.
6 J-K. Park, A study on measures to active cultural contents service in big data age, Vol. 20, No. 1, pp. 324-334, Mar. 2014.
7 Q. Miao, When intelligence meeting wity big data : Review and perceptions of big Data' S hotspot intelligence tracking, Institute of Scientific & Technical Information of Shanghai, Shanghai 200031, No. 5, Serial No. 187, 2013.
8 S-Y. Kim, J-I. Lim, and K-h. Lee, A study on the security policy improvement using the big data, Korea University, Graduate School of Information Security, Vol. 23, No. 5, pp. 969-976, 2013, http://dx.doi.org/10.13089/JKIISC.2013.23.5.96, 2013.   DOI
9 김명희, 백현철, 홍석원, 박재흥 "빅데이터 환경에서 정부민원서비스센터 어플리케이션 불법 이용에 대한 서비스 자료 암호화 모델", 한국융합보안학회, Vol 15, No. 7, pp. 31-38, 2015. 12.
10 S. Bellovin, M. Leech, and T. Taylor, ICMP Traceback message, IETF, draft-ietfitrace-04, Feb. 2003.
11 http://www.hankookilbo.com/v/e6104b4b86d4446ba63127649079e13f
12 http://news.mk.co.kr/newsRead.php?no=845839&year=2016
13 Y-Y. Mu, H-C. Baek, J-Y. Choi, W-C. Jeong, and S-B. Kim, A proposal of a defense model for the abnormal data collection using traceback information in big data environments, Journal of Knowledge Information Technology a nd Systems, Vol. 10, No. 2. pp. 753-162, 2015.
14 허승표, 이대성, 김귀남, "모바일 환경에서 OTP기술과 얼굴인식 기술을 이용한 사용자 인증 개선에 관한 연구", 한국융합보안학회, Vol 11, No. 3, pp. 75-84, 2011. 6.