Abstract
This digital era is facing an exponential proliferation of the number of advanced hardware- and sophisticated software-based solutions which are capable of interacting with the users, collecting, accessing, and analyzing the range of data about us, in nearly every sensitive area of our lives,. These types of the data and the traced information interpreted out of it are frequently too private and confidential to be accessed by unauthorized and unwanted hands, thus making users worry about the privacy of their data that are continuously being collected through these digital platforms. In recent years, the availability and use of the advanced Electronic Healthcare Record (EHR) systems have increased rapidly. During the treatment process, more health datasets have been developed in healthcare sectors such as hospitals and other laboratories. For the sake of improving the quality of healthcare services, these documents depending on their specifications when exchanged can be used by many people. As the outcome, serious security and privacy issues are experienced, which indeed is a matter of high concern and must be monitored and reduced in order to make the effective use of EHR. Numerous studies and research have been performed earlier to improve the security and privacy requirements in the e-healthcare sectors. In this paper, a systematic analysis is carried out by observing and analyzing prior existing models and approaches that have been suggested for e-healthcare systems’ protection and privacy. To protect and promote the privacy of e-healthcare sectors, an intelligence-based security and privacy model is also proposed. This approach focuses on different issues of protection and privacy faced by the e-healthcare community and also frames certain mechanisms to protect it. In order to maintain and enhance security and privacy in the pervasive healthcare systems, our approach along with a collection of access control mechanisms and various encryption techniques may also be considered in the future research direction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Barua, M., Alam, S., Liang, X., & Shen, X. (2011). Secure and quality of service assurance scheduling scheme for WBAN with application to e-health. In Wireless communications and networking conference (WCNC) (pp. 1–5). IEEE.
Fernandez-Aleman, J. L., et al. (2013). Security & privacy in EHR: A systematic literature review. Journal of Biomedical Informatics, 46(3), 541–562.
Zhang, K., et al. (2015). Security and privacy for mobile healthcare networks: From a quality of protection perspective. IEEE Wireless Communications, 22(4), 104–112.
Shinde, S. S., & Patil, D. (2015). Review on the security and privacy for mobile healthcare networks: From a quality of protection perspective. International Journal of Engineering Research, 3(6), 352–361.
Habib, K., et al. (2015). Security analysis of a patient monitoring system for the Internet of Things in eHealth. In Proceedings of the international conference on ehealth, telemedicine, and social medicine (eTELEMED’15) (pp.73–78). ARIA.
Tang, J., Liu, A., Zhao, M., & Wang, T. (2018). An aggregate signature based trust routing for data gathering in sensor networks. Security and Communication Networks, Hindawi, 2018, 1–31.
Kumar, P., & Lee, H.-J. (2011). Security issues in healthcare applications using wireless medical sensor networks: A survey. Sensors, MDPI, 12(1), 55–91.
Saleem, S., Ullah, S., & Kwak, K. S. (2011). A study of IEEE802.15. 4 security framework for wireless body area networks. Sensors, 11(2), 1383–1395.
Han, S., Zhao, S., Li, Q., Ju, C.-H., & Zhou, W. (2016). PPM-HDA: Privacy-preserving and multifunctional health data aggregation with fault tolerance. IEEE Transactions on Information Forensics and Security, 11(9), 1940–1955.
Bonab, T. H., & Masdari, M. (2015). Security attacks in wireless body area networks: Challenges and issues. Academie Royale Des Sciences D Outre-Mer Bulletin Des Seances, 4(4), 100–107.
Partala, J., Keräneny, N., Särestöniemi, M., Hämäläinen, M., Iinatti, J., Jämsä, T., Reponen, J., & Seppänen, T. (2014). Security threats against the transmission chain of a medical health monitoring system. In 2013 IEEE 15th international conference on e-health networking, applications and services (Healthcom). IEEE.
Chandrasekhar, S., Ibrahim, A., & Singhal, M. (2017). A novel access control protocol using proxy signatures for cloud- based health information exchange. Computers & Security, 67, 73–88.
Sun, W., Cai, Z., Liu, F., Fang, S., & Wang, G. (2017). A survey of data mining technology on electronic medical records. In Proceedings of 2017 IEEE 19th international conference on e-health networking, applications and services (Healthcom) (pp. 1–6). IEEE.
Drosatos, G., Efraimidis, P. S., Williams, G. D., & Kaldoudi, E. (2016). Towards privacy by design in personal e-health systems. In 9th international conference on health informatics (pp. 472–477).
Fatema, N., & Brad, R. (2014). Security requirements, counterattacks and projects in healthcare applications using WSNs- a review. International Journal of Computer Networking and Communication (IJCNAC), 2(2), 1–9.
Santos-Pereira, C., Augusto, A. B., Cruz-Correia, R., & Correia, M. E. (2013). A secure RBAC mobile agent access control model for healthcare institutions. In Proceedings of the 26th IEEE international symposium on computer-based medical systems (pp. 349–354). IEEE.
Wellington, K. (2013). Cyberattacks on medical devices and hospital networks: Legal gaps and regulatory solutions. Santa Clara High Technology Law Journal., 30(2), 139–198.
Zhang, R., & Liu, L. (2010). Security models and requirements for healthcare application clouds. In 2010 IEEE 3rd international conference on cloud computing (pp. 1–9). IEEE.
Firouzi, F., Rahmani, M., Mankodiya, K., Badaroglu, M., Merrett, G. V., Wong, P., & Farahani, B. (2018). Internet of-things and big data for smarter healthcare: From device to architecture, applications and analytics. Future Generation Computer Systems, 78(pt 2), 583–586.
Mare, S., Sorber, J., Shin, M., & Cornelius, C., & Kotz, D. (2011). Adapt-lite: Privacy-aware, secure, and efficient mhealth sensing. In Proceedings of the 10th annual ACM workshop on privacy in the electronic society (pp. 137–142). CCS.
Saleh, S., Farah, A., Dimassi, H., et al. (2018). Using mobile health to enhance outcomes of non-communicable diseases care in rural settings and refugee camps: Randomized controlled trial. JMIR mHealth and uHealth, 6(7), e137.
Sharma, S., Chen, K., & Sheth, A. (2018). Towards practical privacy preserving analytics for IoT and cloud based healthcare systems. IEEE Internet Computing, 22(2), 42–51.
Zubaydi, F., Saleh, A., Aloul, F., & Sagahyroon, A. (2016). Security of mobile health (mHealth) systems. In 2015 IEEE 15th international conference on bioinformatics and bioengineering (BIBE) (pp. 1–6). IEEE.
Wang, J., et al. (2013). A research on security and privacy issues for patient related data in medical organization system. International Journal of Security and Its Applications, 7(4), 287–298.
Zhang, K., et al. (2014). Sybil attacks and their defenses in the internet of things. IEEE Internet of Things Journal, 1(5), 372–383.
Boonyarattaphan, A., Bai, Y., & Chung, S. (2009). A security framework for e-health service authentication and e-health data transmission. In Communications and information technology, 2009. ISCIT 2009. 9th International Symposium on. 2009. IEEE.
Garcia-Morchon, O., & Wehrle, K. (2010). Efficient and context- aware access control for pervasive medical sensor networks. In 8th IEEE international conference on pervasive computing and communications workshops (PERCOM workshops) (pp. 322–327). IEEE.
Amini, S., Verhoeven, R., Lukkien, J. J., & Chen, S. (2011). Toward a security model for a body sensor platform. In 2011 IEEE international conference in consumer electronics (ICCE) (pp. 143–144). Institute of Electrical and Electronics Engineers.
Maw, H. A., & Xiao, H., & Christianson, B. (2013). An adaptive access control model for medical data in wireless sensor networks. In 15th international conference on e-health networking, applications & services (Healthcom) (pp. 1–8). IEEE.
Linciya, T., & Anandkumar, K. (2013). Enhanced three tier security architecture for WSN against mobile sink replication attacks using mutual authentication scheme. International Journal of Wireless & Mobile Networks, 5(2), 81–93.
Rasheed, A., & Mahapatra, R. N. (2012). The three-tier security scheme in wireless sensor networks with mobile sinks. IEEE Transactions on Parallel and Distributed Systems, 23(5), 958–965.
Kahani, N., Elgazzar, K., & Cordy, J. R. (2016). Authentication and access control in e-health systems in the cloud. In 2016 IEEE 2nd international conference on big data security on cloud (BigDataSecurity), IEEE international conference on high performance and smart computing (HPSC), and IEEE international conference on intelligent data and security (IDS) (pp. 13–23).
Guan, Z., Yang, T., & Du, X. (2015). Achieving secure and efficient data access control for cloud-integrated body sensor networks. International Journal of Distributed Sensor Networks, 2015, 1–11.
Simplicio, M. A., Jr., Iwaya, L. H., Barros, B. M., Carvalho, T. C. M. B., & Näslund, M. (2015). Secure Health: A delay-tolerant security framework for mobile health data collection. IEEE Journal of Biomedical and Health Informatics, 19(2), 761–772.
Sun, L., & Wang, H. (2011). A purpose based usage access control model for e-healthcare services. In 2011 international conference on data and knowledge engineering (ICDKE). IEEE.
Shahina, S., Minni, G., & Yasin, S. (2016). Sharing personal health records in cloud with scalable and secure using ABE. International Journal of Emerging Technology in Computer Science & Electronics, 23(8).
Wang, C.-J., Xu, X.-L., Shi, D.-Y., & Lin, W.-L. (2014). An efficient cloud-based personal health records system using attribute-based encryption and anonymous multi receiver identity-based encryption. In Ninth international conference on P2P, parallel, grid, cloud and internet computing-IEEE (pp. 74–81).
Siddiqui, N., Husain, M. S., & Akbar, M. (2016). Analysis of security challenges in vehicular adhoc network. In Proceedings of international conference on advancement in computer engineering & information technology (pp. s87–s90). IJCSIT.
Masood, I., Wang, Y., Daud, A., Aljohani, N. R., & Dawood, H. (2018). Towards smart healthcare: Patient data privacy and security in sensor-cloud infrastructure. Wireless Communications and Mobile Computing, Hindawi, 2018, 1–23.
Verma, A., Arif, M., & Husain, M. S. (2018). Analysis of DDOS attack detection and prevention in cloud environment: A review. International Journal of Advanced Research in Computer Science, 9, 107–113.
Mu, K., & Li, L. (2014). An efficient pair wise key predistribution scheme for wireless sensor networks. Journal of Networks, 9(2), 277–282.
Ramli, S. N., et al. (2013). A biometric-based security for data authentication in wireless body area network (wban). In 15th international conference on advanced communication technology (ICACT). IEEE.
Siddiqui, N., & Husain, M. S. (2016). CTS: A credit based threshold system to minimize the dissemination of faulty data in vehicular adhoc networks. International Journal of Control Theory and Applications, 9, 8499–8508.
Husain, M. S. (2020). Nature inspired approach for intrusion detection systems. In Design and analysis of security protocol for communication (pp. 171–182).
Siddiqui, N., & Husain, M. S. (2016). An approach to minimize faulty data propagation in vehicular adhoc network. HCTL Open International Journal of Technology Innovations and Research (IJTIR), 21, 26–38.
Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., & Wang, G. (2018). Security and privacy in the medical internet of things: A review, security and communication networks. Hindawi.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Siddiqui, N., Abbas, S.H. (2022). An Approach Towards Privacy and Security in Pervasive Healthcare System. In: Husain, M.S., Adnan, M.H.B.M., Khan, M.Z., Shukla, S., Khan, F.U. (eds) Pervasive Healthcare. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-77746-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-77746-3_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-77745-6
Online ISBN: 978-3-030-77746-3
eBook Packages: EngineeringEngineering (R0)