Abstract
IT sector plays a vital role in the field of telemedicine over the last years. Many countries have passed the laws to standardize the technology and administration in order to protect patient privacy and safety which is most important. Various privacy and security concerns in healthcare information systems are discussed in this chapter. Improving data security requires more rules and regulations, consolidation reporting, and a growing need for communication among patients, providers, and payers. This chapter deals with healthcare data security and privacy concerns both in information systems and non-information systems fields like public health, health information, law, and medicine.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Sinha VD, et al. Telemedicine in neurosurgical emergency: Indian perspective. Asian J Neurosurg. 2012;7(2):75–7. https://doi.org/10.4103/1793-5482.98648.
Mishra SK. Telemedicine in India: current scenario and the future. Telemed e-Health. 2009;15(6):568–75. https://doi.org/10.1089/tmj.2009.0059.
Mohan D, et al. An improved three pattern Huffman compression algorithm for medical images in telemedicine. In: Information processing and management, communications in computer and information science, vol. 70. Berlin, Heidelberg: Springer; 2010. p. 263–8. https://doi.org/10.1007/978-3-642-12214-9_43.
Xiao Y, et al. Wireless telemedicine and m-health: technologies, applications and research issues. Int J Sensor Netw. 2011;10(4):202–36. https://doi.org/10.1504/ijsnet.2011.042770.
Pal A, et al. Telemedicine diffusion in a developing country: the case of India. IEEE Trans Inform Technol Biomed. 2004:59–65. https://doi.org/10.1109/TITB.2004.842410.
Mandl KD, et al. Public standards and patients control: how to keep electronic medical records accessible but private. Brit Med J. 2001;322(7281):283–7.
T. Ermakova et al. Security and privacy system requirements for adopting cloud computing in healthcare data sharing scenarios security and privacy system requirements for adopting cloud computing in healthcare data sharing scenarios, August, 2013.
Knut H, et al. Proposal for a security management in cloud computing for health care. Scientific World J. 2014;146970., 7 pages https://doi.org/10.1155/2014/146970.
Rao BT, et al. A study on data storage security issues in cloud computing. Procedia Comput Sci. 2016;92:128–35.
Alowolodu OD, et al. Elliptic curve cryptography for securing cloud computing applications. Int J Comput Appl. 2013;66(23)
Mell P, et al. The NIST definition of cloud computing recommendations of the National Institute of Standards and Technology. Nist Spec Publ. 2011;145:7.
Wang C, et al. Toward secure and dependable storage services in cloud computing. IEEE Trans Serv Comput. 2012:220–32.
Al-Nayadi, et al. An authorization policy management framework for dynamic medical data sharing. Int Conf Intell Pervas Comput. 2007:313–8.
Angst et al. An empirical examination of the importance of defining the PHR for research and for practice, Robert H. Smith School Research Paper No. RHS-06-011 Available at SSRN: http://ssrn.com/abstract=904611, 2006.
Applebaum, et al. Privacy in psychiatric treatment: threats and response. Am J Psychiatry. 2002;159:1809–18.
Ball, et al. Patient privacy in electronic prescription transfer. IEEE Security Privacy. 2003:77–80.
Baumer, et al. Privacy of medical records: IT implications of HIPAA. ACM Comput Soc. 2000;30(4):40–7.
Becker, et al. Detecting medicine abuse. J Health Econ. 2005;2005(24):189–201.
Aleem Ali, Neeta Singh, M/M/1/n+Flush/n model to enhance the QoS for Cluster Heads in MANETs. Published in International Journal of Advanced Computer Science and Applications (IJACSA) , U.K. 2018. ESCI, Scopus.
Parveen N, Ali A, Ali A. IOT Based automatic vehicle accident alert system. In: 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA), Oct. 2020, Greater Noida. p. 330–3. https://doi.org/10.1109/ICCCA49541.2020.9250904. (Scopus Indexed).
Sachdeva S, Ali A. A hybrid approach using digital Forensics for attack detection in a cloud network environment. Int J Future Gener Commun Netw. 2021;14(1):1536–46.
Kaur R, Ali A. A novel blockchain model for securing IoT based data transmission. Int J Grid Distrib Comput. 2021;14(1):1045–55.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Sachdeva, S., Ali, A., Khan, S. (2022). Secure and Privacy Issues in Telemedicine: Issues, Solutions, and Standards. In: Choudhury, T., Katal, A., Um, JS., Rana, A., Al-Akaidi, M. (eds) Telemedicine: The Computer Transformation of Healthcare. TELe-Health. Springer, Cham. https://doi.org/10.1007/978-3-030-99457-0_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-99457-0_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-99456-3
Online ISBN: 978-3-030-99457-0
eBook Packages: MedicineMedicine (R0)