Skip to main content

Secure Data Sharing in Medical Cyber-Physical system—a Review

  • Conference paper
  • First Online:
Futuristic Trends in Networks and Computing Technologies

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 936))

Abstract

With the increase in advanced technologies, the health industry has developed a lot recently. Medical cyber-physical system (MCPS) plays a vital role in this. It consists of various medical devices which are networked together for smooth and efficient working. The patient’s EHR is collected and stored on the cloud which is then easily accessible by doctors. The health industry has always been on top of cyber-attacks. With the onset of the Covid-19 pandemic, there was a sudden surge in telemedicine adoption, remote working and makeshift sites for virus testing and treatment, and under-preparedness, all contributing to new vulnerabilities and giving cybercriminals a new opportunity. In the medical world, we need our medical systems to be secure, reliable, efficient, and should ensure economic data storage and sharing for both patients and medical institutes. Motivated by these facts, we did a review on various MCPS techniques and algorithms that already existed. In this paper, we tried to summarize those techniques and provide a comparative study for the same.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Alkhushayni S, Al-Zaleq D, Kengne N (2019) Blockchain technology applied to electronic health records. In: Proceedings of 32nd international conference

    Google Scholar 

  2. Almohri H, Cheng L, Yao D, Alemzadeh H (2017) On threat modelling and mitigation of medical cyber-physical systems. In: 2017 IEEE/ACM international conference on connected health: application, system & engineering technology, pp 114–119. IEEE

    Google Scholar 

  3. Ara A (2019) Privacy preservation in cloud based cyber physical systems. J Comput Theor Nanosci 16(10):4320–4327

    Article  Google Scholar 

  4. Bhole D, Mote A, Patil R (2016) A new security protocol using hybrid cryptography algorithms. Int J Comput Sci Eng 4(2):18–22

    Google Scholar 

  5. Chen F, Tang Y, Cheng X, Xie D, Wang T, Zhao C (2021) Blockchain-based efficient device authentication protocol for medical cyber-physical systems

    Google Scholar 

  6. Cheng X, Chen F, Xie D, Sun H, Huang C (2020) Design of a secure medical data sharing scheme based on blockchain. J Med Syst 44(2):1–11

    Article  Google Scholar 

  7. Deore S, Bachche R, Bichave A, Patil R (2021) Review on applications of blockchain for electronic health records systems. In: International conference on image processing and capsule networks, pp 609–616. Springer, Cham

    Google Scholar 

  8. Devi PV, Kalaichelvi V (2017) Security issues in medical cyber physical systems (MCPS)—a survey. Int J Pure Math 117(20):319–324

    Google Scholar 

  9. Dey N, Ashour AS, Shi F, Fong SJ, Tavares JMR (2018) Medical cyber-physical systems: a survey. J Med Syst 42(4):1–13

    Article  Google Scholar 

  10. Gaikwad SR, Patil RY, Borse DG (2019) Advanced security in 2LQR code generation and document authentication. In: 2019 international conference on nascent technologies in engineering (ICNTE), pp 1–4. IEEE

    Google Scholar 

  11. Gupta R, Tanwar S, Kumar N, Tyagi S (2020) Blockchain-based security attack resilience schemes for autonomous vehicles in industry 4.0: a systematic review. Comput Electr Eng 86:106717

    Google Scholar 

  12. Hathaliya J, Sharma P, Tanwar S, Gupta R (2019) Blockchain-based remote patient monitoring in healthcare 4.0. In: 2019 IEEE 9th international conference on advanced computing (IACC), pp 87–91. IEEE

    Google Scholar 

  13. Hathaliya JJ, Tanwar S, Tyagi S, Kumar N (2019) Securing electronics healthcare records in healthcare 4.0: a biometric-based approach. Comput Electr Eng 76:398–410

    Article  Google Scholar 

  14. Inbarani WS, Shenbagamoorthy G, Paul CKC (2013) Proxy re-encryption schemes for data storage security in cloud—a survey. Int J Eng Res Technol 2(1)

    Google Scholar 

  15. Kocabas O, Soyata T, Aktas MK (2016) Emerging security mechanisms for medical cyber physical systems, pp 401–416

    Google Scholar 

  16. Lee I, Sokolsky O, Chen S, Hatcliff J, Jee E, Kim B, King A, Mullen-Fortino M, Park S, Roederer A, Venkatasubramanian KK (2011) Challenges and research directions in medical cyber–physical systems. Proc IEEE 100(1):75–90

    Google Scholar 

  17. Mubarakali A (2020) Healthcare services monitoring in cloud using secure and robust healthcare-based BLOCKCHAIN (SRHB) approach. 25(4):1330–1337

    Google Scholar 

  18. Nair MM, Tyagi AK, Goyal R (2019) Medical cyber physical systems and its issues. Procedia Comput Sci 165:647–655

    Article  Google Scholar 

  19. Patil RY, Devane SR (2017) Unmasking of source identity, a step beyond in cyber forensic. In Proceedings of the 10th international conference on security of information and networks, pp 157–164

    Google Scholar 

  20. Patil RY, Devane SR (2020) Hash tree-based device fingerprinting technique for network forensic investigation. In: AECT, pp 201–209. Springer, Singapore

    Google Scholar 

  21. Patil N, Patil R (2018) Achieving flatness: with video captcha, location tracking, selecting the honeywords. In: 2018 ICSCET, pp 1–6. IEEE

    Google Scholar 

  22. Patil RY, Ragha L (2011) A rate limiting mechanism for defending against flooding based distributed denial of service attack. In: 2011 world congress on information and communication technologies, pp 182–186. IEEE

    Google Scholar 

  23. Patil RY, Ranjanikar M (2021) Biometric authentication based smart bank locker security system. In: International conference on image processing, pp 298–308

    Google Scholar 

  24. Perdpunya T, Sukpradit A, Limpaporn O, Maliyaem M (2021) CPS based automation model prediction for inspection. In: 2021 13th international conference on knowledge and smart technology (KST), pp 108–112. IEEE

    Google Scholar 

  25. Qiu H, Qiu M, Liu M (2020) Secure health data sharing for medical cyber-physical systems for healthcare 4.0. IEEE Journal biomed Health Inf 24(9):2499–2505

    Google Scholar 

  26. Qiu H, Qiu M, Liu M (2020) Secure health data sharing for medical cyber-physical systems for healthcare 4.0. IEEE J Biomed Health Info 24(9):2499–2505

    Google Scholar 

  27. Rao A, Carreón N, Lysecky R, Rozenblit J (2017) Probabilistic threat detection for risk management in cyber-physical medical systems. IEEE Softw 35(1):38–43

    Article  Google Scholar 

  28. Venkatasubramanian KK, Banerjee A, Gupta SK, Walls RJ (2017) A cyber-physical approach to trustworthy operation of health monitoring systems, pp 16

    Google Scholar 

  29. Verma H, Paul D, Bathula SR, Sinha S, Kumar S (2018) Human activity recognition with wearable biomedical sensors in cyber physical systems. In: 2018 15th IEEE India council international conference (INDICON), pp 1–6. IEEE

    Google Scholar 

  30. Wang Z, Ma P, Zou X, Zhang J, Yang T (2020) Security of medical cyber physical systems: An empirical study on imaging devices. In: IEEE INFOCOM 2020 IEEE conference on computer communications workshops, pp 997–1002. IEEE

    Google Scholar 

  31. Xu Z, He D, Wang H, Vijayakumar P, Choo KKR (2020) A novel proxyoriented public auditing scheme for cloud-based medical cyber physical systems 51:102453

    Google Scholar 

  32. Xu Z, He D, Wang H, Vijayakumar P, Choo KKR (2020) A novel proxyoriented public auditing scheme for cloud-based medical cyber physical systems. J Inf Secur Appl 51:102453

    Google Scholar 

  33. Yogesh PR (2020) Formal verification of secure evidence collection protocol using BAN logic and AVISPA. Procedia Comput Sci 167:1334–1344

    Article  Google Scholar 

  34. Zhang Y, Qiu M, Tsai CW, Hassan MM, Alamri A (2015) Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Syst J 11(1):8895

    Google Scholar 

  35. Zhang X, Zhao J, Mu L, Tang Y, Xu C (2019) Identity-based proxy-oriented outsourcing with public auditing in cloud-based MCPS 56:18-28

    Google Scholar 

  36. Zhang X, Zhao J, Mu L, Tang Y, Xu C (2019) Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber–physical systems, pp 18–28

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Atharva Sarode .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sarode, A., Karkhile, K., Raskar, S., Patil, R.Y. (2022). Secure Data Sharing in Medical Cyber-Physical system—a Review. In: Singh, P.K., Wierzchoń, S.T., Chhabra, J.K., Tanwar, S. (eds) Futuristic Trends in Networks and Computing Technologies . Lecture Notes in Electrical Engineering, vol 936. Springer, Singapore. https://doi.org/10.1007/978-981-19-5037-7_71

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-5037-7_71

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-5036-0

  • Online ISBN: 978-981-19-5037-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics