Skip to main content

Artificial Intelligence in Healthcare and Medical Records Security

  • Chapter
  • First Online:
Cybersecurity and Artificial Intelligence

Abstract

The digitisation of healthcare records continues to expand, and the security and privacy of sensitive patient information become increasingly critical. By leveraging AI technologies, such as machine learning and natural language processing, healthcare organisations can implement advanced security measures that enhance healthcare records’ security and reduce the risk of data breaches and unauthorised access. AI-based algorithms can analyse vast amounts of patient data to identify patterns and anomalies, enabling the early detection of potential security threats. These proactive approaches allow healthcare providers to respond promptly and mitigate risks before they escalate. AI can aid in the development of robust authentication systems, such as biometric recognition and behavioural analysis, strengthening access controls and reducing the reliance on easily compromised passwords. AI can be employed to enhance data encryption methods, making it harder for malicious actors to decipher and exploit sensitive information. It is important to outline the significance of ethical considerations associated with AI implementation in healthcare. AI technology must safeguard patient privacy and ensure the necessary level of transparency in the AI algorithms’ decision-making processes that increase trust in these technologies. Regulatory frameworks and standards must be established to govern the responsible use of AI in healthcare settings.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bajwa J, Munir U, Nori A, Williams B (2021) Artificial intelligence in healthcare: transforming the practice of medicine. Fut Healthc J 8:95. https://doi.org/10.7861/fhj.2021-0095

    Article  Google Scholar 

  2. Nelson KM, Chang ET, Zulman DM et al (2019) Using predictive analytics to guide patient care and research in a national health system. J Gen Intern Med 34:1379–1380

    Article  Google Scholar 

  3. Alowais SA, Alghamdi SS, Alsuhebany N et al (2023) Revolutionizing healthcare: the role of artificial intelligence in clinical practice. BMC Med Educ 23:689

    Article  Google Scholar 

  4. Javaid M, Haleem A, Pratap Singh R et al (2022) Significance of machine learning in healthcare: features, pillars and applications. Int J Intell Netw 3:58–73. https://doi.org/10.1016/j.ijin.2022.05.002

    Article  Google Scholar 

  5. European Parliamentary Research Service, Unit (STOA) - Scientific Foresight (2022) Artificial intelligence in healthcare. https://www.europarl.europa.eu/RegData/etudes/STUD/2022/729512/EPRS_STU(2022)729512_EN.pdf?ref=marco.health

  6. Steve Alder (2023) Healthcare data breach report. https://www.hipaajournal.com/may-2023-healthcare-data-breach-report/

  7. Alder S (2023) IBM: average cost of a healthcare data breach increases to almost $11. Hipaa J

    Google Scholar 

  8. Batko K, Ślęzak A (2022) The use of big data analytics in healthcare. J Big Data 9:3. https://doi.org/10.1186/s40537-021-00553-4

    Article  Google Scholar 

  9. Mahajan HB, Rashid AS, Junnarkar AA et al (2023) Integration of healthcare 4.0 and blockchain into secure cloud-based electronic health records systems. Appl Nanosci 13:2329–2342. https://doi.org/10.1007/s13204-021-02164-0

    Article  Google Scholar 

  10. Sharma N, Sharma R, Jindal N (2021) Machine learning and deep learning applications: a vision. Glob Trans Proc 2:24–28. https://doi.org/10.1016/j.gltp.2021.01.004

    Article  Google Scholar 

  11. Mason J, Dave R, Chatterjee P et al (2020) An investigation of biometric authentication in the healthcare environment. Array 8:10002. https://doi.org/10.1016/j.array.2020.100042

    Article  Google Scholar 

  12. Vyas S, Shabaz M, Pandit P et al (2022) Integration of artificial intelligence and blockchain technology in healthcare and agriculture. J Food Qual 2022:448. https://doi.org/10.1155/2022/4228448

    Article  Google Scholar 

  13. Karimian G, Petelos E, Evers SMAA (2022) The ethical issues of the application of artificial intelligence in healthcare: a systematic scoping review. AI Ethics 2:531–559. https://doi.org/10.1007/s43681-021-00131-7

    Article  Google Scholar 

  14. Clarke M, Braithwaite J (1984) Corporate crime in the pharmaceutical industry. J Law Soc 11:45. https://doi.org/10.2307/1410045

    Article  Google Scholar 

  15. Anna Wilde Mathews (2015) Anthem: hacked database included 78.8 million people. Wall Str J

    Google Scholar 

  16. Jones A (2022) Security posture: a systematic review of cyber threats and proactive security. Sr Honor Theses

    Google Scholar 

  17. Neprash HT, McGlave CC, Cross DA et al (2022) Trends in ransomware attacks on US hospitals, clinics, and other health care delivery organizations, 2016–2021. JAMA Heal Forum 3:4873. https://doi.org/10.1001/jamahealthforum.2022.4873

    Article  Google Scholar 

  18. Guide to the General Data Protection Regulation (GDPR) (2018) InforHarvardmation commissioners office

    Google Scholar 

  19. Ayala L (2016) Cybersecurity for hospitals and healthcare facilities

    Google Scholar 

  20. Security.radware.com (2015) DDoS case study: DDoS attack mitigation Boston children’s hospital. https://www.radware.com/security/ddos-experts-insider/ert-case-studies/boston-childrens-hospital-ddos-mitigation-case-study/

  21. Hempel S, Ganz D, Saluja S et al (2023) Care coordination across healthcare systems: development of a research agenda, implications for practice, and recommendations for policy based on a modified Delphi panel. BMJ Open 13:232. https://doi.org/10.1136/bmjopen-2021-060232

    Article  Google Scholar 

  22. World Health Organization (2021) The protection of personal data in health information systems-principles and processes for public health

    Google Scholar 

  23. Yip C, Han NLR, Sng BL (2016) Legal and ethical issues in research. Indian J Anaesth 60:684

    Article  Google Scholar 

  24. Hoofnagle CJ, van der Sloot B, Borgesius FZ (2019) The European Union general data protection regulation: what it is and what it means. Inf Commun Technol Law 28:65–98. https://doi.org/10.1080/13600834.2019.1573501

    Article  Google Scholar 

  25. Team IGP (2020) EU general data protection regulation (gdpr)–an implementation and compliance guide. https://www.hipaajournal.com/2023-cost-healthcare-data-breach/

  26. Vazirani AA, O’Donoghue O, Brindley D, Meinert E (2019) Implementing blockchains for efficient health care: systematic review. J Med Internet Res 21:e12439

    Article  Google Scholar 

  27. Khan F, Khan S, Tahir S et al (2021) Granular data access control with a patient-centric policy update for healthcare. Sensors 21:3556. https://doi.org/10.3390/s21103556

    Article  Google Scholar 

  28. Abouelmehdi K, Beni-Hessane A, Khaloufi H (2018) Big healthcare data: preserving security and privacy. J Big Data 5:1–18. https://doi.org/10.1186/s40537-017-0110-7

    Article  Google Scholar 

  29. Kruse CS, Smith B, Vanderlinden H, Nealand A (2017) Security techniques for the electronic health records. J Med Syst 41:1–9. https://doi.org/10.1007/s10916-017-0778-4

    Article  Google Scholar 

  30. Basil NN, Ambe S, Ekhator C, Fonkem E (2022) Health records database and inherent security concerns: a review of the literature. Cureus 14:10. https://doi.org/10.7759/cureus.30168

    Article  Google Scholar 

  31. He Y, Aliyu A, Evans M, Luo C (2021) Health care cybersecurity challenges and solutions under the climate of COVID-19: scoping review. J Med Internet Res 23:e21747

    Article  Google Scholar 

  32. Javaid M, Haleem A, Singh RP, Suman R (2023) Towards insighting cybersecurity for healthcare domains: a comprehensive review of recent practices and trends. Cyber Secur Appl 1:100016. https://doi.org/10.1016/j.csa.2023.100016

    Article  Google Scholar 

  33. Ardila D, Kiraly AP, Bharadwaj S et al (2019) End-to-end lung cancer screening with three-dimensional deep learning on low-dose chest computed tomography. Nat Med 25:954–961. https://doi.org/10.1038/s41591-019-0447-x

    Article  Google Scholar 

  34. Shaik T, Tao X, Higgins N et al (2023) Remote patient monitoring using artificial intelligence: current state, applications, and challenges. Wiley Interdiscip Rev Data Min Knowl Discov 13:e1485

    Article  Google Scholar 

  35. Qureshi R, Irfan M, Gondal TM et al (2023) AI in drug discovery and its clinical relevance. Heliyon 9:357

    Article  Google Scholar 

  36. El-Kassabi HT, Serhani MA, Masud MM et al (2023) Deep learning approach to security enforcement in cloud workflow orchestration. J Cloud Comput 12:10. https://doi.org/10.1186/s13677-022-00387-2

    Article  Google Scholar 

  37. Breiman L (2001) Random forests. Mach Learn 45:4324. https://doi.org/10.1023/A:1010933404324

    Article  Google Scholar 

  38. Firat Kilincer I, Ertam F, Sengur A et al (2023) Automated detection of cybersecurity attacks in healthcare systems with recursive feature elimination and multilayer perceptron optimization. Biocybern Biomed Eng 43:30–41. https://doi.org/10.1016/j.bbe.2022.11.005

    Article  Google Scholar 

  39. Hady AA, Ghubaish A, Salman T et al (2020) Intrusion detection system for healthcare systems using medical and network data: a comparison study. IEEE Access 8:106576–106584. https://doi.org/10.1109/ACCESS.2020.3000421

    Article  Google Scholar 

  40. Zachos G, Essop I, Mantas G et al (2021) An anomaly-based intrusion detection system for internet of medical things networks. Electron 10:2562. https://doi.org/10.3390/electronics10212562

    Article  Google Scholar 

  41. Hussain F, Abbas SG, Shah GA et al (2021) A framework for malicious traffic detection in IoT healthcare environment. Sensors 21:3025. https://doi.org/10.3390/s21093025

    Article  Google Scholar 

  42. Bengio Y, Lecun Y, Hinton G (2021) Deep learning for AI. Commun ACM 64:58–65. https://doi.org/10.1145/3448250

    Article  Google Scholar 

  43. Akshay Kumaar M, Samiayya D, Vincent PMDR et al (2022) A hybrid framework for intrusion detection in healthcare systems using deep learning. Front Public Heal 9:824898. https://doi.org/10.3389/fpubh.2021.824898

    Article  Google Scholar 

  44. Al-Hawawreh M, Hossain MS (2023) A privacy-aware framework for detecting cyber attacks on internet of medical things systems using data fusion and quantum deep learning. Inf Fusion 99:1889. https://doi.org/10.1016/j.inffus.2023.101889

    Article  Google Scholar 

  45. Ghazanfar S, Hussain F, Rehman AU et al (2020) IoT-flock: an open-source framework for IoT traffic generation. In: Proceedings of the 2020 international conference on emerging trends in smart technologies, ICETST 2020

    Google Scholar 

  46. Shalev-Shwartz S, Ben-David S (2013) Understanding machine learning: From theory to algorithms

    Google Scholar 

  47. Yeng PK, Nweke LO, Yang B et al (2021) Artificial intelligence–based framework for analyzing health care staff security practice: mapping review and simulation study. JMIR Med. Informatics 9:e19250

    Article  Google Scholar 

  48. Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20:273–297. https://doi.org/10.1023/A:1022627411411

    Article  Google Scholar 

  49. Al-Sadi M, Di Pietro R, Lombardi F, Signorini M (2023) LENTO: unpredictable latency-based continuous authEntication for network inTensive IoT envirOnments. Futur Gener Comput Syst 139:151–166. https://doi.org/10.1016/j.future.2022.09.023

    Article  Google Scholar 

  50. Torkzadehmahani R, Nasirigerdeh R, Blumenthal DB et al (2022) Privacy-preserving artificial intelligence techniques in biomedicine. Methods Inf Med 61:e12–e27. https://doi.org/10.1055/s-0041-1740630

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nitsa J. Herzog .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Herzog, N.J., Celik, D., Sulaiman, R.B. (2024). Artificial Intelligence in Healthcare and Medical Records Security. In: Jahankhani, H., Bowen, G., Sharif, M.S., Hussien, O. (eds) Cybersecurity and Artificial Intelligence. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-52272-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-52272-7_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-52271-0

  • Online ISBN: 978-3-031-52272-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics