Skip to main content

An Approach Towards Privacy and Security in Pervasive Healthcare System

  • Chapter
  • First Online:
Pervasive Healthcare

Part of the book series: EAI/Springer Innovations in Communication and Computing ((EAISICC))

  • 346 Accesses

Abstract

This digital era is facing an exponential proliferation of the number of advanced hardware- and sophisticated software-based solutions which are capable of interacting with the users, collecting, accessing, and analyzing the range of data about us, in nearly every sensitive area of our lives,. These types of the data and the traced information interpreted out of it are frequently too private and confidential to be accessed by unauthorized and unwanted hands, thus making users worry about the privacy of their data that are continuously being collected through these digital platforms. In recent years, the availability and use of the advanced Electronic Healthcare Record (EHR) systems have increased rapidly. During the treatment process, more health datasets have been developed in healthcare sectors such as hospitals and other laboratories. For the sake of improving the quality of healthcare services, these documents depending on their specifications when exchanged can be used by many people. As the outcome, serious security and privacy issues are experienced, which indeed is a matter of high concern and must be monitored and reduced in order to make the effective use of EHR. Numerous studies and research have been performed earlier to improve the security and privacy requirements in the e-healthcare sectors. In this paper, a systematic analysis is carried out by observing and analyzing prior existing models and approaches that have been suggested for e-healthcare systems’ protection and privacy. To protect and promote the privacy of e-healthcare sectors, an intelligence-based security and privacy model is also proposed. This approach focuses on different issues of protection and privacy faced by the e-healthcare community and also frames certain mechanisms to protect it. In order to maintain and enhance security and privacy in the pervasive healthcare systems, our approach along with a collection of access control mechanisms and various encryption techniques may also be considered in the future research direction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Barua, M., Alam, S., Liang, X., & Shen, X. (2011). Secure and quality of service assurance scheduling scheme for WBAN with application to e-health. In Wireless communications and networking conference (WCNC) (pp. 1–5). IEEE.

    Google Scholar 

  2. Fernandez-Aleman, J. L., et al. (2013). Security & privacy in EHR: A systematic literature review. Journal of Biomedical Informatics, 46(3), 541–562.

    Article  Google Scholar 

  3. Zhang, K., et al. (2015). Security and privacy for mobile healthcare networks: From a quality of protection perspective. IEEE Wireless Communications, 22(4), 104–112.

    Article  Google Scholar 

  4. Shinde, S. S., & Patil, D. (2015). Review on the security and privacy for mobile healthcare networks: From a quality of protection perspective. International Journal of Engineering Research, 3(6), 352–361.

    Google Scholar 

  5. Habib, K., et al. (2015). Security analysis of a patient monitoring system for the Internet of Things in eHealth. In Proceedings of the international conference on ehealth, telemedicine, and social medicine (eTELEMED’15) (pp.73–78). ARIA.

    Google Scholar 

  6. Tang, J., Liu, A., Zhao, M., & Wang, T. (2018). An aggregate signature based trust routing for data gathering in sensor networks. Security and Communication Networks, Hindawi, 2018, 1–31.

    Article  Google Scholar 

  7. Kumar, P., & Lee, H.-J. (2011). Security issues in healthcare applications using wireless medical sensor networks: A survey. Sensors, MDPI, 12(1), 55–91.

    Article  Google Scholar 

  8. Saleem, S., Ullah, S., & Kwak, K. S. (2011). A study of IEEE802.15. 4 security framework for wireless body area networks. Sensors, 11(2), 1383–1395.

    Article  Google Scholar 

  9. Han, S., Zhao, S., Li, Q., Ju, C.-H., & Zhou, W. (2016). PPM-HDA: Privacy-preserving and multifunctional health data aggregation with fault tolerance. IEEE Transactions on Information Forensics and Security, 11(9), 1940–1955.

    Article  Google Scholar 

  10. Bonab, T. H., & Masdari, M. (2015). Security attacks in wireless body area networks: Challenges and issues. Academie Royale Des Sciences D Outre-Mer Bulletin Des Seances, 4(4), 100–107.

    Google Scholar 

  11. Partala, J., Keräneny, N., Särestöniemi, M., Hämäläinen, M., Iinatti, J., Jämsä, T., Reponen, J., & Seppänen, T. (2014). Security threats against the transmission chain of a medical health monitoring system. In 2013 IEEE 15th international conference on e-health networking, applications and services (Healthcom). IEEE.

    Google Scholar 

  12. Chandrasekhar, S., Ibrahim, A., & Singhal, M. (2017). A novel access control protocol using proxy signatures for cloud- based health information exchange. Computers & Security, 67, 73–88.

    Article  Google Scholar 

  13. Sun, W., Cai, Z., Liu, F., Fang, S., & Wang, G. (2017). A survey of data mining technology on electronic medical records. In Proceedings of 2017 IEEE 19th international conference on e-health networking, applications and services (Healthcom) (pp. 1–6). IEEE.

    Google Scholar 

  14. Drosatos, G., Efraimidis, P. S., Williams, G. D., & Kaldoudi, E. (2016). Towards privacy by design in personal e-health systems. In 9th international conference on health informatics (pp. 472–477).

    Google Scholar 

  15. Fatema, N., & Brad, R. (2014). Security requirements, counterattacks and projects in healthcare applications using WSNs- a review. International Journal of Computer Networking and Communication (IJCNAC), 2(2), 1–9.

    Google Scholar 

  16. Santos-Pereira, C., Augusto, A. B., Cruz-Correia, R., & Correia, M. E. (2013). A secure RBAC mobile agent access control model for healthcare institutions. In Proceedings of the 26th IEEE international symposium on computer-based medical systems (pp. 349–354). IEEE.

    Google Scholar 

  17. Wellington, K. (2013). Cyberattacks on medical devices and hospital networks: Legal gaps and regulatory solutions. Santa Clara High Technology Law Journal., 30(2), 139–198.

    Google Scholar 

  18. Zhang, R., & Liu, L. (2010). Security models and requirements for healthcare application clouds. In 2010 IEEE 3rd international conference on cloud computing (pp. 1–9). IEEE.

    Google Scholar 

  19. Firouzi, F., Rahmani, M., Mankodiya, K., Badaroglu, M., Merrett, G. V., Wong, P., & Farahani, B. (2018). Internet of-things and big data for smarter healthcare: From device to architecture, applications and analytics. Future Generation Computer Systems, 78(pt 2), 583–586.

    Article  Google Scholar 

  20. Mare, S., Sorber, J., Shin, M., & Cornelius, C., & Kotz, D. (2011). Adapt-lite: Privacy-aware, secure, and efficient mhealth sensing. In Proceedings of the 10th annual ACM workshop on privacy in the electronic society (pp. 137–142). CCS.

    Google Scholar 

  21. Saleh, S., Farah, A., Dimassi, H., et al. (2018). Using mobile health to enhance outcomes of non-communicable diseases care in rural settings and refugee camps: Randomized controlled trial. JMIR mHealth and uHealth, 6(7), e137.

    Article  Google Scholar 

  22. Sharma, S., Chen, K., & Sheth, A. (2018). Towards practical privacy preserving analytics for IoT and cloud based healthcare systems. IEEE Internet Computing, 22(2), 42–51.

    Article  Google Scholar 

  23. Zubaydi, F., Saleh, A., Aloul, F., & Sagahyroon, A. (2016). Security of mobile health (mHealth) systems. In 2015 IEEE 15th international conference on bioinformatics and bioengineering (BIBE) (pp. 1–6). IEEE.

    Google Scholar 

  24. Wang, J., et al. (2013). A research on security and privacy issues for patient related data in medical organization system. International Journal of Security and Its Applications, 7(4), 287–298.

    Google Scholar 

  25. Zhang, K., et al. (2014). Sybil attacks and their defenses in the internet of things. IEEE Internet of Things Journal, 1(5), 372–383.

    Article  Google Scholar 

  26. Boonyarattaphan, A., Bai, Y., & Chung, S. (2009). A security framework for e-health service authentication and e-health data transmission. In Communications and information technology, 2009. ISCIT 2009. 9th International Symposium on. 2009. IEEE.

    Google Scholar 

  27. Garcia-Morchon, O., & Wehrle, K. (2010). Efficient and context- aware access control for pervasive medical sensor networks. In 8th IEEE international conference on pervasive computing and communications workshops (PERCOM workshops) (pp. 322–327). IEEE.

    Google Scholar 

  28. Amini, S., Verhoeven, R., Lukkien, J. J., & Chen, S. (2011). Toward a security model for a body sensor platform. In 2011 IEEE international conference in consumer electronics (ICCE) (pp. 143–144). Institute of Electrical and Electronics Engineers.

    Google Scholar 

  29. Maw, H. A., & Xiao, H., & Christianson, B. (2013). An adaptive access control model for medical data in wireless sensor networks. In 15th international conference on e-health networking, applications & services (Healthcom) (pp. 1–8). IEEE.

    Google Scholar 

  30. Linciya, T., & Anandkumar, K. (2013). Enhanced three tier security architecture for WSN against mobile sink replication attacks using mutual authentication scheme. International Journal of Wireless & Mobile Networks, 5(2), 81–93.

    Article  Google Scholar 

  31. Rasheed, A., & Mahapatra, R. N. (2012). The three-tier security scheme in wireless sensor networks with mobile sinks. IEEE Transactions on Parallel and Distributed Systems, 23(5), 958–965.

    Article  Google Scholar 

  32. Kahani, N., Elgazzar, K., & Cordy, J. R. (2016). Authentication and access control in e-health systems in the cloud. In 2016 IEEE 2nd international conference on big data security on cloud (BigDataSecurity), IEEE international conference on high performance and smart computing (HPSC), and IEEE international conference on intelligent data and security (IDS) (pp. 13–23).

    Google Scholar 

  33. Guan, Z., Yang, T., & Du, X. (2015). Achieving secure and efficient data access control for cloud-integrated body sensor networks. International Journal of Distributed Sensor Networks, 2015, 1–11.

    Google Scholar 

  34. Simplicio, M. A., Jr., Iwaya, L. H., Barros, B. M., Carvalho, T. C. M. B., & Näslund, M. (2015). Secure Health: A delay-tolerant security framework for mobile health data collection. IEEE Journal of Biomedical and Health Informatics, 19(2), 761–772.

    Article  Google Scholar 

  35. Sun, L., & Wang, H. (2011). A purpose based usage access control model for e-healthcare services. In 2011 international conference on data and knowledge engineering (ICDKE). IEEE.

    Google Scholar 

  36. Shahina, S., Minni, G., & Yasin, S. (2016). Sharing personal health records in cloud with scalable and secure using ABE. International Journal of Emerging Technology in Computer Science & Electronics, 23(8).

    Google Scholar 

  37. Wang, C.-J., Xu, X.-L., Shi, D.-Y., & Lin, W.-L. (2014). An efficient cloud-based personal health records system using attribute-based encryption and anonymous multi receiver identity-based encryption. In Ninth international conference on P2P, parallel, grid, cloud and internet computing-IEEE (pp. 74–81).

    Google Scholar 

  38. Siddiqui, N., Husain, M. S., & Akbar, M. (2016). Analysis of security challenges in vehicular adhoc network. In Proceedings of international conference on advancement in computer engineering & information technology (pp. s87–s90). IJCSIT.

    Google Scholar 

  39. Masood, I., Wang, Y., Daud, A., Aljohani, N. R., & Dawood, H. (2018). Towards smart healthcare: Patient data privacy and security in sensor-cloud infrastructure. Wireless Communications and Mobile Computing, Hindawi, 2018, 1–23.

    Article  Google Scholar 

  40. Verma, A., Arif, M., & Husain, M. S. (2018). Analysis of DDOS attack detection and prevention in cloud environment: A review. International Journal of Advanced Research in Computer Science, 9, 107–113.

    Article  Google Scholar 

  41. Mu, K., & Li, L. (2014). An efficient pair wise key predistribution scheme for wireless sensor networks. Journal of Networks, 9(2), 277–282.

    Article  Google Scholar 

  42. Ramli, S. N., et al. (2013). A biometric-based security for data authentication in wireless body area network (wban). In 15th international conference on advanced communication technology (ICACT). IEEE.

    Google Scholar 

  43. Siddiqui, N., & Husain, M. S. (2016). CTS: A credit based threshold system to minimize the dissemination of faulty data in vehicular adhoc networks. International Journal of Control Theory and Applications, 9, 8499–8508.

    Google Scholar 

  44. Husain, M. S. (2020). Nature inspired approach for intrusion detection systems. In Design and analysis of security protocol for communication (pp. 171–182).

    Google Scholar 

  45. Siddiqui, N., & Husain, M. S. (2016). An approach to minimize faulty data propagation in vehicular adhoc network. HCTL Open International Journal of Technology Innovations and Research (IJTIR), 21, 26–38.

    Google Scholar 

  46. Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., & Wang, G. (2018). Security and privacy in the medical internet of things: A review, security and communication networks. Hindawi.

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Siddiqui, N., Abbas, S.H. (2022). An Approach Towards Privacy and Security in Pervasive Healthcare System. In: Husain, M.S., Adnan, M.H.B.M., Khan, M.Z., Shukla, S., Khan, F.U. (eds) Pervasive Healthcare. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-77746-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-77746-3_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-77745-6

  • Online ISBN: 978-3-030-77746-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics