Abstract
The digitisation of healthcare records continues to expand, and the security and privacy of sensitive patient information become increasingly critical. By leveraging AI technologies, such as machine learning and natural language processing, healthcare organisations can implement advanced security measures that enhance healthcare records’ security and reduce the risk of data breaches and unauthorised access. AI-based algorithms can analyse vast amounts of patient data to identify patterns and anomalies, enabling the early detection of potential security threats. These proactive approaches allow healthcare providers to respond promptly and mitigate risks before they escalate. AI can aid in the development of robust authentication systems, such as biometric recognition and behavioural analysis, strengthening access controls and reducing the reliance on easily compromised passwords. AI can be employed to enhance data encryption methods, making it harder for malicious actors to decipher and exploit sensitive information. It is important to outline the significance of ethical considerations associated with AI implementation in healthcare. AI technology must safeguard patient privacy and ensure the necessary level of transparency in the AI algorithms’ decision-making processes that increase trust in these technologies. Regulatory frameworks and standards must be established to govern the responsible use of AI in healthcare settings.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bajwa J, Munir U, Nori A, Williams B (2021) Artificial intelligence in healthcare: transforming the practice of medicine. Fut Healthc J 8:95. https://doi.org/10.7861/fhj.2021-0095
Nelson KM, Chang ET, Zulman DM et al (2019) Using predictive analytics to guide patient care and research in a national health system. J Gen Intern Med 34:1379–1380
Alowais SA, Alghamdi SS, Alsuhebany N et al (2023) Revolutionizing healthcare: the role of artificial intelligence in clinical practice. BMC Med Educ 23:689
Javaid M, Haleem A, Pratap Singh R et al (2022) Significance of machine learning in healthcare: features, pillars and applications. Int J Intell Netw 3:58–73. https://doi.org/10.1016/j.ijin.2022.05.002
European Parliamentary Research Service, Unit (STOA) - Scientific Foresight (2022) Artificial intelligence in healthcare. https://www.europarl.europa.eu/RegData/etudes/STUD/2022/729512/EPRS_STU(2022)729512_EN.pdf?ref=marco.health
Steve Alder (2023) Healthcare data breach report. https://www.hipaajournal.com/may-2023-healthcare-data-breach-report/
Alder S (2023) IBM: average cost of a healthcare data breach increases to almost $11. Hipaa J
Batko K, Ślęzak A (2022) The use of big data analytics in healthcare. J Big Data 9:3. https://doi.org/10.1186/s40537-021-00553-4
Mahajan HB, Rashid AS, Junnarkar AA et al (2023) Integration of healthcare 4.0 and blockchain into secure cloud-based electronic health records systems. Appl Nanosci 13:2329–2342. https://doi.org/10.1007/s13204-021-02164-0
Sharma N, Sharma R, Jindal N (2021) Machine learning and deep learning applications: a vision. Glob Trans Proc 2:24–28. https://doi.org/10.1016/j.gltp.2021.01.004
Mason J, Dave R, Chatterjee P et al (2020) An investigation of biometric authentication in the healthcare environment. Array 8:10002. https://doi.org/10.1016/j.array.2020.100042
Vyas S, Shabaz M, Pandit P et al (2022) Integration of artificial intelligence and blockchain technology in healthcare and agriculture. J Food Qual 2022:448. https://doi.org/10.1155/2022/4228448
Karimian G, Petelos E, Evers SMAA (2022) The ethical issues of the application of artificial intelligence in healthcare: a systematic scoping review. AI Ethics 2:531–559. https://doi.org/10.1007/s43681-021-00131-7
Clarke M, Braithwaite J (1984) Corporate crime in the pharmaceutical industry. J Law Soc 11:45. https://doi.org/10.2307/1410045
Anna Wilde Mathews (2015) Anthem: hacked database included 78.8 million people. Wall Str J
Jones A (2022) Security posture: a systematic review of cyber threats and proactive security. Sr Honor Theses
Neprash HT, McGlave CC, Cross DA et al (2022) Trends in ransomware attacks on US hospitals, clinics, and other health care delivery organizations, 2016–2021. JAMA Heal Forum 3:4873. https://doi.org/10.1001/jamahealthforum.2022.4873
Guide to the General Data Protection Regulation (GDPR) (2018) InforHarvardmation commissioners office
Ayala L (2016) Cybersecurity for hospitals and healthcare facilities
Security.radware.com (2015) DDoS case study: DDoS attack mitigation Boston children’s hospital. https://www.radware.com/security/ddos-experts-insider/ert-case-studies/boston-childrens-hospital-ddos-mitigation-case-study/
Hempel S, Ganz D, Saluja S et al (2023) Care coordination across healthcare systems: development of a research agenda, implications for practice, and recommendations for policy based on a modified Delphi panel. BMJ Open 13:232. https://doi.org/10.1136/bmjopen-2021-060232
World Health Organization (2021) The protection of personal data in health information systems-principles and processes for public health
Yip C, Han NLR, Sng BL (2016) Legal and ethical issues in research. Indian J Anaesth 60:684
Hoofnagle CJ, van der Sloot B, Borgesius FZ (2019) The European Union general data protection regulation: what it is and what it means. Inf Commun Technol Law 28:65–98. https://doi.org/10.1080/13600834.2019.1573501
Team IGP (2020) EU general data protection regulation (gdpr)–an implementation and compliance guide. https://www.hipaajournal.com/2023-cost-healthcare-data-breach/
Vazirani AA, O’Donoghue O, Brindley D, Meinert E (2019) Implementing blockchains for efficient health care: systematic review. J Med Internet Res 21:e12439
Khan F, Khan S, Tahir S et al (2021) Granular data access control with a patient-centric policy update for healthcare. Sensors 21:3556. https://doi.org/10.3390/s21103556
Abouelmehdi K, Beni-Hessane A, Khaloufi H (2018) Big healthcare data: preserving security and privacy. J Big Data 5:1–18. https://doi.org/10.1186/s40537-017-0110-7
Kruse CS, Smith B, Vanderlinden H, Nealand A (2017) Security techniques for the electronic health records. J Med Syst 41:1–9. https://doi.org/10.1007/s10916-017-0778-4
Basil NN, Ambe S, Ekhator C, Fonkem E (2022) Health records database and inherent security concerns: a review of the literature. Cureus 14:10. https://doi.org/10.7759/cureus.30168
He Y, Aliyu A, Evans M, Luo C (2021) Health care cybersecurity challenges and solutions under the climate of COVID-19: scoping review. J Med Internet Res 23:e21747
Javaid M, Haleem A, Singh RP, Suman R (2023) Towards insighting cybersecurity for healthcare domains: a comprehensive review of recent practices and trends. Cyber Secur Appl 1:100016. https://doi.org/10.1016/j.csa.2023.100016
Ardila D, Kiraly AP, Bharadwaj S et al (2019) End-to-end lung cancer screening with three-dimensional deep learning on low-dose chest computed tomography. Nat Med 25:954–961. https://doi.org/10.1038/s41591-019-0447-x
Shaik T, Tao X, Higgins N et al (2023) Remote patient monitoring using artificial intelligence: current state, applications, and challenges. Wiley Interdiscip Rev Data Min Knowl Discov 13:e1485
Qureshi R, Irfan M, Gondal TM et al (2023) AI in drug discovery and its clinical relevance. Heliyon 9:357
El-Kassabi HT, Serhani MA, Masud MM et al (2023) Deep learning approach to security enforcement in cloud workflow orchestration. J Cloud Comput 12:10. https://doi.org/10.1186/s13677-022-00387-2
Breiman L (2001) Random forests. Mach Learn 45:4324. https://doi.org/10.1023/A:1010933404324
Firat Kilincer I, Ertam F, Sengur A et al (2023) Automated detection of cybersecurity attacks in healthcare systems with recursive feature elimination and multilayer perceptron optimization. Biocybern Biomed Eng 43:30–41. https://doi.org/10.1016/j.bbe.2022.11.005
Hady AA, Ghubaish A, Salman T et al (2020) Intrusion detection system for healthcare systems using medical and network data: a comparison study. IEEE Access 8:106576–106584. https://doi.org/10.1109/ACCESS.2020.3000421
Zachos G, Essop I, Mantas G et al (2021) An anomaly-based intrusion detection system for internet of medical things networks. Electron 10:2562. https://doi.org/10.3390/electronics10212562
Hussain F, Abbas SG, Shah GA et al (2021) A framework for malicious traffic detection in IoT healthcare environment. Sensors 21:3025. https://doi.org/10.3390/s21093025
Bengio Y, Lecun Y, Hinton G (2021) Deep learning for AI. Commun ACM 64:58–65. https://doi.org/10.1145/3448250
Akshay Kumaar M, Samiayya D, Vincent PMDR et al (2022) A hybrid framework for intrusion detection in healthcare systems using deep learning. Front Public Heal 9:824898. https://doi.org/10.3389/fpubh.2021.824898
Al-Hawawreh M, Hossain MS (2023) A privacy-aware framework for detecting cyber attacks on internet of medical things systems using data fusion and quantum deep learning. Inf Fusion 99:1889. https://doi.org/10.1016/j.inffus.2023.101889
Ghazanfar S, Hussain F, Rehman AU et al (2020) IoT-flock: an open-source framework for IoT traffic generation. In: Proceedings of the 2020 international conference on emerging trends in smart technologies, ICETST 2020
Shalev-Shwartz S, Ben-David S (2013) Understanding machine learning: From theory to algorithms
Yeng PK, Nweke LO, Yang B et al (2021) Artificial intelligence–based framework for analyzing health care staff security practice: mapping review and simulation study. JMIR Med. Informatics 9:e19250
Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20:273–297. https://doi.org/10.1023/A:1022627411411
Al-Sadi M, Di Pietro R, Lombardi F, Signorini M (2023) LENTO: unpredictable latency-based continuous authEntication for network inTensive IoT envirOnments. Futur Gener Comput Syst 139:151–166. https://doi.org/10.1016/j.future.2022.09.023
Torkzadehmahani R, Nasirigerdeh R, Blumenthal DB et al (2022) Privacy-preserving artificial intelligence techniques in biomedicine. Methods Inf Med 61:e12–e27. https://doi.org/10.1055/s-0041-1740630
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Herzog, N.J., Celik, D., Sulaiman, R.B. (2024). Artificial Intelligence in Healthcare and Medical Records Security. In: Jahankhani, H., Bowen, G., Sharif, M.S., Hussien, O. (eds) Cybersecurity and Artificial Intelligence. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-52272-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-52272-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-52271-0
Online ISBN: 978-3-031-52272-7
eBook Packages: Computer ScienceComputer Science (R0)