Skip to main content

Security and Privacy issue in Telemedicine: Issues, Solutions, and Standards

  • Chapter
  • First Online:
Telemedicine: The Computer Transformation of Healthcare

Part of the book series: TELe-Health ((TEHE))

Abstract

Telemedicine and E-hospital are growing in the global market and proved its requirement in mostly in pandemic; however, the technology has much importance in rural areas, where there is a lack of healthcare facilities. The rural area people are facing many challenges in healthcare facilities due to their dispersed population and poor infrastructure. In some of the rural areas, people are forced to travel a long distance to reach the hospital. Also, the rural area has a lack of qualified doctors and medical staff. Furthermore, it is also very difficult to recruit and train the doctors and staff to work in these areas. Due to some geographical barrier and availability of willing persons. The telemedical approach will provide a significant advantage for these rural areas to improve the healthcare facilities. Besides its availability as challenge, another major challenge is the security and privacy of Electronic Health Records (EHR) stored in telemedicine storage servers and the secured communication between patient, doctor, and telemedicine system. Authentication of various kind of users like doctors, patients, hospitals, paramedical staff, etc. is also a major security concern to provide accessibility to the central system. In this chapter, we have presented the issues, standards and solution for major security and privacy concern in using telemedicine systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Krishnan DSR, et al. An IoT based patient health monitoring system. In: 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE; 2018. p. 1–7.

    Google Scholar 

  2. Chauhan A, et al. Healthcare information management system using android OS. In: Proceedings—2017 International Conference on Computational Intelligence and Networks CINE 2017; 2018.

    Google Scholar 

  3. Sinha H, et al. Effective E-Healthcare system: cache invalidation mechanisms for wireless data access in mobile cloud computing. Int J Big Data Anal Healthcare (IJBDAH). 3(2) https://doi.org/10.4018/IJBDAH.2018070102.

  4. Pramanik PKD, Pal S, Mukhopadhyay M. Healthcare big data: a comprehensive overview. In: Bouchemal N, editor. Research anthology on big data analytics, architectures, and applications; 2022. p. 119–47.

    Google Scholar 

  5. Sharma HK, Patni JC. Pandemic diagnosis and analysis using clinical decision support systems. J Crit Rev. 2020;

    Google Scholar 

  6. Gupta S, Sharma HK. User anonymity based secure authentication protocol for telemedical server systems. Int J Inform Comput Security. 2021;

    Google Scholar 

  7. Shailender SHK. Digital cancer diagnosis with counts of adenoma and luminal cells in plemorphic adenoma immunastained healthcare system. IJRAR. 2018;5(12)

    Google Scholar 

  8. Patni JC, Ahlawat P, Biswas SS. Sensors based smart healthcare framework using internet of things (IoT). Int J Sci Technol Res. 2020;9(2):1228–34.

    Google Scholar 

  9. Taneja S, Ahmed E, Patni JC. I-Doctor: an IoT based self patient’s health monitoring system. In: 2019 International Conference on Innovative Sustainable Computational Technologies, CISCT 2019; 2019.

    Google Scholar 

  10. Hwang MS, Li LH. ‘A new remote user authentication scheme using smart cards’, IEEE Transactions on Consumer Electronics, 2000;46(1):28–30.

    Google Scholar 

  11. Sun HM. ‘An efficient remote use authentication scheme using smart cards’, IEEE Transactions on Consumer Electronics, 2000;46(4):958–61.

    Google Scholar 

  12. Liao IE, Lee CC, and Hwang MS. ‘A password authentication scheme over insecure networks’, J Comput Syst Sci. 2006;72(4):727–40.

    Google Scholar 

  13. Wu ZY, et al. ‘A secure authentication scheme for telecare medicine information systems’, J Med Syst. 2012;36(3):1529–35.

    Google Scholar 

  14. Debiao H, Jianhua C, and Rui Z. ‘A more secure authentication scheme for telecare medicine information systems’, J Med Syst. 2012;36(3);1989–95.

    Google Scholar 

  15. Aji A, et al. Hadoop-GIS: A high performance spatial data warehousing system over MapReduce. In Proceedings of the VLDB Endowment International Conference on Very Large Data Bases 2013;6(11). NIH Public Access.

    Google Scholar 

  16. Zhu, Z. ‘An efficient authentication scheme for telecare medicine information systems’, J Med Syst. 2012;36(6):3833–38.

    Google Scholar 

  17. Giri D, Maitra T, Amin R, and Srivastava PD, ‘An efficient and robust rsa-based remote user authentication for telecare medical information systems’, J Med Syst. 2015;39(1):1–9.

    Google Scholar 

  18. Amin R, Biswas GP. ‘An improved rsa based user authentication and session key agreement protocol usable in tmis’, J Med Syst. 2015;39(8):1–14.

    Google Scholar 

  19. Trupil Limbasiya, Sachit Shivam. “A two-factor key verification system focused on remote user for medical applications, Int J Critical infrastructures. 2017;13(2/3).

    Google Scholar 

  20. Arshad H, Nikooghadam M. ‘Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems’, J Med Syst. 2014;38(12):1–12.

    Google Scholar 

  21. Arshad H, Teymoori V, Nikooghadam M, Abbassi H. On the security of a two-factor authentication and key agreement scheme for telecare medicine information systems. J Med Syst. 2015;

    Google Scholar 

  22. Joshi A, et al. Data mining in healthcare and predicting obesity. In: Proceedings of the Third International Conference on Computational Intelligence and Informatics, Hyderabad, India; 2020. p. 877–88.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Tanupriya Choudhury or Avita Katal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sharma, H.K., Choudhury, T., Katal, A., Um, JS. (2022). Security and Privacy issue in Telemedicine: Issues, Solutions, and Standards. In: Choudhury, T., Katal, A., Um, JS., Rana, A., Al-Akaidi, M. (eds) Telemedicine: The Computer Transformation of Healthcare. TELe-Health. Springer, Cham. https://doi.org/10.1007/978-3-030-99457-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-99457-0_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-99456-3

  • Online ISBN: 978-3-030-99457-0

  • eBook Packages: MedicineMedicine (R0)

Publish with us

Policies and ethics