Skip to main content

Secure and Privacy Issues in Telemedicine: Issues, Solutions, and Standards

  • Chapter
  • First Online:
Telemedicine: The Computer Transformation of Healthcare

Part of the book series: TELe-Health ((TEHE))

Abstract

IT sector plays a vital role in the field of telemedicine over the last years. Many countries have passed the laws to standardize the technology and administration in order to protect patient privacy and safety which is most important. Various privacy and security concerns in healthcare information systems are discussed in this chapter. Improving data security requires more rules and regulations, consolidation reporting, and a growing need for communication among patients, providers, and payers. This chapter deals with healthcare data security and privacy concerns both in information systems and non-information systems fields like public health, health information, law, and medicine.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sinha VD, et al. Telemedicine in neurosurgical emergency: Indian perspective. Asian J Neurosurg. 2012;7(2):75–7. https://doi.org/10.4103/1793-5482.98648.

    Article  Google Scholar 

  2. Mishra SK. Telemedicine in India: current scenario and the future. Telemed e-Health. 2009;15(6):568–75. https://doi.org/10.1089/tmj.2009.0059.

    Article  Google Scholar 

  3. Mohan D, et al. An improved three pattern Huffman compression algorithm for medical images in telemedicine. In: Information processing and management, communications in computer and information science, vol. 70. Berlin, Heidelberg: Springer; 2010. p. 263–8. https://doi.org/10.1007/978-3-642-12214-9_43.

    Chapter  Google Scholar 

  4. Xiao Y, et al. Wireless telemedicine and m-health: technologies, applications and research issues. Int J Sensor Netw. 2011;10(4):202–36. https://doi.org/10.1504/ijsnet.2011.042770.

    Article  Google Scholar 

  5. Pal A, et al. Telemedicine diffusion in a developing country: the case of India. IEEE Trans Inform Technol Biomed. 2004:59–65. https://doi.org/10.1109/TITB.2004.842410.

  6. Mandl KD, et al. Public standards and patients control: how to keep electronic medical records accessible but private. Brit Med J. 2001;322(7281):283–7.

    Article  Google Scholar 

  7. T. Ermakova et al. Security and privacy system requirements for adopting cloud computing in healthcare data sharing scenarios security and privacy system requirements for adopting cloud computing in healthcare data sharing scenarios, August, 2013.

    Google Scholar 

  8. Knut H, et al. Proposal for a security management in cloud computing for health care. Scientific World J. 2014;146970., 7 pages https://doi.org/10.1155/2014/146970.

  9. Rao BT, et al. A study on data storage security issues in cloud computing. Procedia Comput Sci. 2016;92:128–35.

    Article  Google Scholar 

  10. Alowolodu OD, et al. Elliptic curve cryptography for securing cloud computing applications. Int J Comput Appl. 2013;66(23)

    Google Scholar 

  11. Mell P, et al. The NIST definition of cloud computing recommendations of the National Institute of Standards and Technology. Nist Spec Publ. 2011;145:7.

    Google Scholar 

  12. Wang C, et al. Toward secure and dependable storage services in cloud computing. IEEE Trans Serv Comput. 2012:220–32.

    Google Scholar 

  13. Al-Nayadi, et al. An authorization policy management framework for dynamic medical data sharing. Int Conf Intell Pervas Comput. 2007:313–8.

    Google Scholar 

  14. Angst et al. An empirical examination of the importance of defining the PHR for research and for practice, Robert H. Smith School Research Paper No. RHS-06-011 Available at SSRN: http://ssrn.com/abstract=904611, 2006.

  15. Applebaum, et al. Privacy in psychiatric treatment: threats and response. Am J Psychiatry. 2002;159:1809–18.

    Article  Google Scholar 

  16. Ball, et al. Patient privacy in electronic prescription transfer. IEEE Security Privacy. 2003:77–80.

    Google Scholar 

  17. Baumer, et al. Privacy of medical records: IT implications of HIPAA. ACM Comput Soc. 2000;30(4):40–7.

    Article  Google Scholar 

  18. Becker, et al. Detecting medicine abuse. J Health Econ. 2005;2005(24):189–201.

    Article  Google Scholar 

  19. Aleem Ali, Neeta Singh, M/M/1/n+Flush/n model to enhance the QoS for Cluster Heads in MANETs. Published in International Journal of Advanced Computer Science and Applications (IJACSA) , U.K. 2018. ESCI, Scopus.

    Google Scholar 

  20. Parveen N, Ali A, Ali A. IOT Based automatic vehicle accident alert system. In: 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA), Oct. 2020, Greater Noida. p. 330–3. https://doi.org/10.1109/ICCCA49541.2020.9250904. (Scopus Indexed).

  21. Sachdeva S, Ali A. A hybrid approach using digital Forensics for attack detection in a cloud network environment. Int J Future Gener Commun Netw. 2021;14(1):1536–46.

    Google Scholar 

  22. Kaur R, Ali A. A novel blockchain model for securing IoT based data transmission. Int J Grid Distrib Comput. 2021;14(1):1045–55.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sachdeva, S., Ali, A., Khan, S. (2022). Secure and Privacy Issues in Telemedicine: Issues, Solutions, and Standards. In: Choudhury, T., Katal, A., Um, JS., Rana, A., Al-Akaidi, M. (eds) Telemedicine: The Computer Transformation of Healthcare. TELe-Health. Springer, Cham. https://doi.org/10.1007/978-3-030-99457-0_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-99457-0_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-99456-3

  • Online ISBN: 978-3-030-99457-0

  • eBook Packages: MedicineMedicine (R0)

Publish with us

Policies and ethics