Skip to main content

The Dependency of Healthcare on Security: Issues and Challenges

  • Conference paper
  • First Online:
ICCCE 2020

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 698))

Abstract

Information security and privacy in the sector of healthcare is an important issue that has to be given importance. With the growing adoption of electronic health records of patients, the need of accessing and sharing information between different healthcare professionals is also increasing. This gives rise to the attention that has to be provided for securing the information. Also the adoption of the Internet of Things in wireless body sensor networks, leads to the usage of Cloud and Fog in healthcare systems. Thus pointing towards secure methods of accessing, storing, processing of sensitive data. In this paper, an overview of different issues and challenges pertaining to the security of healthcare systems is presented. Also, the solutions to address the security concerns in the healthcare systems are also discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. He D, Naveed M, Gunter CA, Nahrstedt K (2014) Security concerns in android mhealth apps. In: AMIA annual symposium proceedings, vol 2014. American Medical Informatics Association, p 645

    Google Scholar 

  2. Al-Janabi S, Al-Shourbaji I, Shojafar M, Shamshirband S (2017) Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt Inf J 18(2):113–122

    Google Scholar 

  3. Kumari A, Tanwar S, Tyagi S, Kumar N, Opportunities and challenges (2018) Fog computing for healthcare 4.0 environment. Comput Electr Eng 72:1–13

    Article  Google Scholar 

  4. Win KT, Susilo W, Mu Y (2006) Personal health record systems and their security protection. J Med Syst 30(4):309–315

    Article  Google Scholar 

  5. Ding D, Conti M, Solanas A (2016) A smart health application and its related privacy issues. In: 2016 smart city security and privacy workshop (SCSP-W). IEEE, pp 1–5

    Google Scholar 

  6. Martínez-Pérez B, De La Torre-Díez I, Lopez-Coronado M (2015) Privacy and´ security in mobile health apps: a review and recommendations. J Med Syst 39(1):181

    Google Scholar 

  7. Manogaran G, Thota C, Lopez D, Vijayakumar V, Abbas KM, Sundarsekar R (2017) Big data knowledge system in healthcare. In Internet of things and big data technologies for next generation healthcare. Springer, pp 133–157

    Google Scholar 

  8. Patil HK, Seshadri R (2014) Big data security and privacy issues in healthcare. In: 2014 IEEE international congress on big data. IEEE, pp 762–765

    Google Scholar 

  9. Abouelmehdi K, Beni-Hessane A, Khaloufi H (2018) Big healthcare data: preserving security and privacy. J Big Data 5(1):1

    Article  Google Scholar 

  10. Zhang P, Zhou M, Fortino G (2018) Security and trust issues in fog computing: a survey. Future Gener Comput Syst 88:16–27

    Article  Google Scholar 

  11. Appari A, Johnson ME (2010) Information security and privacy in healthcare: current state of research. Int J Internet Enterp Manag 6(4):279–314

    Article  Google Scholar 

  12. Perakslis ED (2014) Cybersecurity in health care. N Engl J Med 371(5):395–397

    Article  Google Scholar 

  13. S¸cheau MC, Pop SZ (2018) Cybercrime evolution. In: International conference knowledge-based organization, vol 24, Sciendo, pp 225–229

    Google Scholar 

  14. Kaur H, Alam MA, Jameel R, Mourya AK, Chang V (2018) A proposed solution and future direction for blockchain-based heterogeneous medicare data in cloud environment. J Med Syst 42(8):156

    Google Scholar 

  15. Wang H, Wang Z, Domingo-Ferrer J (2018) Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Gener Comput Syst 78:712–719

    Article  Google Scholar 

  16. Ariu D, Tronci R, Giacinto G (2011) Hmmpayl: an intrusion detection system based on hidden Markov models. Comput Secur 30(4):221–241

    Article  Google Scholar 

  17. Gallaher M, O’Connor A, Kropp B, Tassey G (2002) The economic impact of role-based access control. Technical report, National Institute of Standards and Technology (NIST)

    Google Scholar 

  18. Chen C-L, Hu J-X, Fan C-L, Wang K. Design of a secure medical data sharing system via an authorized mechanism

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lakshmi Jayant Kittur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kittur, L.J., Mehra, R., Chandavarkar, B.R. (2021). The Dependency of Healthcare on Security: Issues and Challenges. In: Kumar, A., Mozar, S. (eds) ICCCE 2020. Lecture Notes in Electrical Engineering, vol 698. Springer, Singapore. https://doi.org/10.1007/978-981-15-7961-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-7961-5_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-7960-8

  • Online ISBN: 978-981-15-7961-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics