Название: Advanced Healthcare Systems
Автор: Группа авторов
Издательство: John Wiley & Sons Limited
Жанр: Программы
isbn: 9781119769279
isbn:
Data Tampering Attack: In this, attacker can tamper health-related data by changing, editing, manipulating, and destroying.
Spamming: In this attack, fake data of patients is created and flooded in the system which induces unnecessary entry in data tables which leads to inaccurate results.
Denial-of-Service Attack: In this, attacker creates a large number of fake packets to flood the network, and then, the system engages in fulfilling the request generated by the fake packets and denies the request generated by genuine packets. This results in poor system performance and uptime. Eavesdropping: In this, attackers take access of the communication channel and start snooping the packet traveling in that channel. If a very strong encryption technique is not applied, then it is very easy for attackers to read and understand those data.
Location Privacy: In this, attacker can gain live location access of the patient, generated form the wearable IoT devices attached to the patient or the mobile phone.
Usages Privacy: In this, attacker can gain usage information of the patient or the person involved in the healthcare to find the useful and predict some sensitive information.
2.5 Conclusion
Technological advancement in the healthcare industry is increasing rapidly, and a variety of wearable devices are available for gathering health-related patient data. Data gathered from these smart devices are very huge.
The high volume of important data invites attackers to steal and manipulate it. To maintain integrity, security and privacy of health-related data. In this paper we have discussed architecture of the next generation healthcare system with latest available IoT devices, use of fog computing for local processing and storing, then for pattern recognition sends it to the cloud. Here, deep learning and data mining are done on that data. There are many security privacy issues, and challenges are there that need to be addressed very carefully.
References
1. Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., Wang, G., Security and Privacy in the Medical Internet of Things: A Review. Secur. Commun. Netw., 2018, 9, 2018.
2. Zhang, H., Cai, Z., Liu, Q. et al., A survey on security-aware measurement in SDN. Secur. Commun. Netw., 2018, 2018. https://doi.org/10.1155/2018/2459154.
3. Han, S., Zhao, S., Li, Q., Ju, C.-H., Zhou, W., PPM-HDA: privacy-preserving and multifunctional health data aggregation with fault tolerance. IEEE Trans. Inf. Forensics Secur., 11, 9, 1940–1955, 2016.
4. Yin, H. et al., Smart Healthcare. Found. Trends R Electron. Des. Autom., 1, 1–67, 2018.
5. Abuwardih, L.A., Shatnawi, W., Aleroud, A., Privacy preserving data mining on published data in healthcare: A survey. 1–6, 2016. https://ieeexplore.ieee.org/document/7549444
6. Anwar, M., Joshi, J., Tan, J., Anytime anywhere access to secure privacy-aware healthcare services: Issues approaches and challenges. Health Policy Technol., 4, 4, 299–311, 2015.
7. Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y., Secure medical architecture on the cloud using wireless sensor networks for emergency management, in: Proceedings of the 2013 IEEE 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013, pp. 248–252, October 2013.
8. Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y., Healing on the cloud: secure cloud architecture for medical wireless sensor networks. Future Gener. Comput. Syst., 55, 266–277, 2016.
9. Li, M., Yu, S., Zheng, Y., Scalable and secure sharing of personal health records in cloud computing using attributebased encryption. IEEE Trans. Parallel Distrib. Syst., 24, 1, 131–143, 2012.
10. Abdmeziem, M.R. and Tandjaoui, D., A cooperative end to end key management scheme for e-health applications in the context of internet of things, in: Ad-hoc Networks and Wireless, pp. 35–46, Springer, Berlin Heidelberg, 2014.
11. Hu, J.-X., Chen, C.-L., Fan, C.-L., Wang, K.-H., An intelligent and secure health monitoring scheme using IoT sensor based on cloud computing. J. Sens., 2017, Article ID 3734764, 11 pages, 2017.
12. Li, M., Yu, S., Cao, N., Lou, W., Authorized private keyword search over encrypted data in cloud computing, in: Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS ‘11), IEEE, Minneapolis, Minn, USA, pp. 383–392, July, 2011.
13. Miao, Y., Ma, J., Liu, X., Wei, F., Liu, Z., Wang, X.A., m2-ABKS: attributebased multi-keyword search over encrypted personal health records in multi-owner setting. J. Med. Syst., 40, 11, 246, 2016. https://link.springer.com/article/10.1007/s10916-016-0617-z
14. Song, C., Lin, X., Shen, X. et al., Kernel regression based encrypted images compression for e-healthcare systems, in: Proceedings of the International Conference on Wireless Communications and Signal Processing, pp. 1–6, 2013.
15. Bezawada, B., Liu, A.X., Jayaraman, B., Wang, A.L., Li, R., Privacy Preserving String Matching for Cloud Computing, in: Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, ICDCS ‘15, pp. 609–618, July 2015.
16. Li, C.-T., Lee, C.-C., Weng, C.-Y., A secure cloud-assisted wireless body area network in mobile emergency medical care system. J. Med. Syst., 40, 5, 1–15, 2016.
17. Gong, T., Huang, H., Li, P., Zhang, K., Jiang, H., A Medical Healthcare System for Privacy Protection Based on IoT, in: Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms, and Programming, PAAP ‘15, pp. 217–222, December 2015.
18. Rahman, F., Ahamed, S., II, Yang, J.-J., Wang, Q., nclusive Society: Health and Wellbeing in the Community and Care at Home. 11th International Conference on Smart Homes and Health Telematics ICOST 2013, June 19–21, 2013.
19. Bindahman, S. and Zakaria, N., Informatics Engineering and Information Science. International Conference ICIEIS 2011, November 14–16, 2011.
20. Dubovitskaya, A., Urovi, V., Vasirani, M., Aberer, K., ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference SEC 2015, May 26-28, 2015.
21. Farahani, B., Firouzi, F., Chang, V., Badaroglu, M., Constant, N., Mankodiya, K. , Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare. Future Gener. Comput. Syst., 78, Part 2, 2018. https://digitalcommons.uri.edu/ele_facpubs/79
22. Idoga, P.E., Agoyi, M., Coker-Farrell, E.Y., Ekeoma, O.L., Review of security issues in e-Healthcare and solutions. 2016 HONET-ICT, Nicosia, pp. 118121, 2016.
23. Badidi, E. and Moumane, K., Enhancing the Processing of Healthcare Data Streams using Fog Computing. 2019 IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, pp. 1113–1118, 2019.
СКАЧАТЬ