Skip to main content

Smart Home Solutions: Privacy Issues

  • Reference work entry
  • First Online:
Handbook of Smart Homes, Health Care and Well-Being

Abstract

Smart home solutions enable access to health-care services to patients by the use of ubiquitous, smart devices or sensors, at the convenience of their home. As in any health-care IT infrastructure, sensitive health information of a patient is processed and transmitted to third parties, increasing the risk of a privacy breach. The smart home environment, due to its pervasive nature, augments such privacy challenges and poses requirements for the devices and software designed. In this chapter, we identify privacy requirements for this environment, and we map requirements to existing solutions. The chapter concludes with identified priorities and challenges for future work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 379.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Ahamed SI, Talukder N, Kameas AD (2007) Towards privacy protection in pervasive healthcare. Paper presented at the 3rd international conference on intelligent environments, Ulm, Sept 2007

    Google Scholar 

  • AMA (2006) Checklist for HIPAA privacy. In: HIPAA insider. Alabama Medicaid Agency. Available via MEDICAID. http://www.medicaid.state.al.us/old_site/hipaa/Checklist%20for%20HIPAA%20Privacy.pdf. Accessed 9 Sept 2013

  • Amaya I, Favela J, Rodriguez M (2005) Componentes de software para el desarrollo de ambientes de cómputo ubicuo. Paper presented at the in the international ubiquitous computing and ambient intelligence conference, Granada, Sept 2005

    Google Scholar 

  • ARRA (2009) American recovery and reinvestment act. US Government Printing Office. Available via GPO. http://www.gpo.gov/fdsys/pkg/PLAW-111publ5/pdf/PLAW-111publ5.pdf. Accessed 9 Sept 2013

  • Athavale Y (2011) Potential applications of smart healthcare technologies. SAR-NexJ NSERC Engage Collaboration. Available via SAR-NexJ. http://sarnexj.wikispaces.com/file/view/Potential+applications+of+smart+healthcare+technologies.pdf. Accessed 22 Sept 2013

  • Avancha S, Baxi A, Kotz D (2012) Privacy in mobile technology for personal healthcare. ACM Comput Surv 45:1–54

    Article  Google Scholar 

  • Bhatti R, Grandison T (2007) Towards improved privacy policy coverage in healthcare using policy refinement. Paper presented at the 4th VLDB conference on secure data management, Springer, Vienna, Sept 2007

    Google Scholar 

  • CCHIT (2008) Consumer’s guide to certification of personal health records. Certification Commission for Healthcare Information Technology. Available via CCHIT. http://cchit.org/files/CCHITPHRConsumerGuide08.pdf. Accessed 9 Sept 2013

  • CDT (2009) Summary of health privacy provisions in the 2009 economic stimulus legislation. Centre for Democracy and Technology. Available via CDT. https://www.cdt.org/healthprivacy/20090324_ARRAPrivacy.pdf. Accessed 9 Sept 2013

  • Deng M, Petkovic M, Nalin M, Baroni I (2011) A home healthcare system in the cloud – addressing security and privacy challenges. Paper presented at the 4th international conference on cloud computing, IEEE, USA, July 2011

    Google Scholar 

  • Dritsas S, Gritzalis D, Lambrinoudakis C (2006) Protecting privacy and anonymity in pervasive computing trends and perspectives. Telemat Inform J 23(3):196–210, Special Issue on Privacy and Anonymity in the Global Village

    Article  Google Scholar 

  • Fang SJY, Zhu X (2010) Privacy and emergency response in e-healthcare leveraging wireless body sensor networks. IEEE Wirel Commun 17(1):66–73

    Article  MathSciNet  Google Scholar 

  • Gates C, Bishop M (2010) The security and privacy implications of using social networks to deliver healthcare. Paper presented at the 3rd international conference on pervasive technologies related to assistive environments, University of Texas at Arlington, USA

    Google Scholar 

  • Giannetsos T, Dimitriou T, Prasad NR (2011) People-centric sensing in assistive healthcare: privacy challenges and directions. Secur Commun Netw 4(11):1295–1307

    Article  Google Scholar 

  • Gritzalis D (1997) A baseline security policy for distributed healthcare information systems. Comput Secur 16(8):709–719

    Article  Google Scholar 

  • Gritzalis D (1998) Enhancing security and improving interoperability in healthcare information systems. Med Inform 23(4):309–324

    Article  Google Scholar 

  • Gritzalis D (2004) Embedding privacy in IT applications development. Inform Manag Comput Secur J 12(1):8–26

    Google Scholar 

  • Gritzalis D, Lambrinoudakis C (2004) A security architecture for interconnecting health information systems. Int J Med Inform 73:305–309

    Article  Google Scholar 

  • Health & Human Services U.S. Department (1996) The Health Insurance Portability and Accountability Act. http://www.hhs.gov/ocr/privacy/index.html. Accessed 9 Sept 2013

  • HPP (2007) Best practices for employers offering personal health records (PHRs). In: Health privacy project. Employers’ working group on personal health records. Available via CDT. https://www.cdt.org/files/pdfs/2007Best_Practices.pdf. Accessed 9 Sept 2013

  • Katzenbeisser S, Petkovic M (2008) Privacy-preserving recommendation systems for consumer healthcare services. Paper presented at the 3rd international conference on reliability and security, technical University of Catalonia, Spain, Mar 2008

    Google Scholar 

  • Kotz D, Sasikanth A, Amit B (2009) A privacy framework for mobile health and home-care systems. Paper presented at the 1st ACM workshop on security and privacy in medical and home-care systems, ACM, Chicago, Nov 2009

    Google Scholar 

  • Langheinrich M (2001) Privacy by design – principles of privacy – aware ubiquitous systems. In: Proceedings of the 3rd international conference on ubiquitous computing, September 2001. Lecture notes in computer science, vol 2201. Springer, Heidelberg, pp 273–229

    Google Scholar 

  • Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. Ubiquitous Comput 206:237–245

    MATH  Google Scholar 

  • Lekkas D, Gritzalis D (2006) Long-term verifiability of healthcare records authenticity. Int J Med Inform 76(5–6):442–448

    Google Scholar 

  • Liang X, Lu R, Chen L, Lin X, Shen X (2011) PEC: a privacy-preserving emergency call scheme for mobile healthcare social networks. J Commun Netw 13(2):102–112

    Article  Google Scholar 

  • Markle (2008) Common framework for networked personal health information: overview and principles. In: Connecting for health. Markle common framework. Available via MARKLE. http://www.markle.org/sites/default/files/CF-Consumers-Full.pdf. Accessed 9 Sept 2013

  • Mohammed N, Fung BCM, Hung PCK, Lee C (2009) Anonymizing healthcare data: a case study on the blood transfusion service. Paper presented at the 15th ACM international conference on knowledge discovery and data mining, ACM, France, June 2009

    Google Scholar 

  • Oladimeji EA, Chung L, Jung HT, Kim J (2011) Managing security and privacy in ubiquitous health information interchange. Paper presented at the 5th international conference on ubiquitous information management and communication, ACM, Korea, Feb 2011

    Google Scholar 

  • ONCHIT (2008), Nationwide Privacy and Security Framework For Electronic Exchange of Individually Identifiable Health Information. Office of the National Coordinator for Health Information Technology, U.S. Department of Health and Human Service. Available via Healthit. http://www.healthit.gov/sites/default/files/nationwide-ps-framework-5.pdf. Accessed 22 May 2014

  • Park N (2011) Customized healthcare infrastructure using privacy weight level based on smart device. Converg Hybrid Inf Technol 206:467–474

    Article  Google Scholar 

  • Rodriguez M, Favela J, Preciado A, Vizcaino A (2005) Agent-based ambient intelligence for healthcare. AI Commun 18(3):10–16

    MathSciNet  Google Scholar 

  • Rui Z, Liu L (2010) Security models and requirements for healthcare application clouds. Paper presented at the 33rd international conference on cloud computing, USA, July 2010

    Google Scholar 

  • Stajano F (2010) Security issues in ubiquitous computing. In: Nakashima H, Aghajan H, Augusto JC (eds) Handbook of ambient intelligence and smart environments, vol 3. Springer, New York, pp 281–314

    Chapter  Google Scholar 

  • Tentori M, Favela J, González VM (2006) Quality of privacy (QoP) for the design of ubiquitous healthcare applications. J Univ Comput Sci 12(3):252–269

    Google Scholar 

  • Venkatasubramanian K, Gupta SKS (2006) Security solutions for pervasive healthcare. Paper presented at the 3rd international conference on security in pervasive computing, UK, Apr 2006

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marianthi Theoharidou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this entry

Cite this entry

Theoharidou, M., Tsalis, N., Gritzalis, D. (2017). Smart Home Solutions: Privacy Issues. In: van Hoof, J., Demiris, G., Wouters, E. (eds) Handbook of Smart Homes, Health Care and Well-Being. Springer, Cham. https://doi.org/10.1007/978-3-319-01583-5_5

Download citation

Publish with us

Policies and ethics