scholarly journals A Survey and Classification of Security and Privacy Research in Smart Healthcare Systems

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 101879-101894 ◽  
Author(s):  
Abdullah Algarni
Author(s):  
B. D. Deebak ◽  
Fadi Al-Turjman

AbstractSustainable Computing has advanced the technological evolution of the Internet and information-based communication technology. It is nowadays emerging in the form of the Cloud of Medical Things (CoMT) to develop smart healthcare systems. The academic community has lately made great strides for the development of security for the CoMT based application systems, such as e-healthcare systems, industrial automation systems, military surveillance systems, and so on. To the architecture of CoMT based Smart Environment, Chebyshev Chaotic-Map based single-user sign-in (S-USI) is found as a significant security-control mechanism. To ensure the fidelity, the S-USI assigns a unary-token to the legal users to access the various services, provided by a service provider over an IP-enabled distributed networks. Numerous authentication mechanisms have been presented for the cloud-based distributed networks. However, most of the schemes are still persuasible to security threats, such as user-anonymity, privileged-insider, mutual authentication, and replay type of attacks. This paper applies a sensor/sensor-tag based smart healthcare environment that uses S-USI to provide security and privacy. To strengthen the authentication process, a robust secure based S-USI mechanism and a well-formed coexistence protocol proof for pervasive services in the cloud are proposed. Using the formal security analysis, the prominence of the proposed strategies is proven to show the security efficiency of proposed S-USI. From the formal verification, the comparison results demonstrate that the proposed S-USI consumes less computation overhead; and thus it can be more suitable for the telecare medical information systems.


Author(s):  
P. Jeyadurga ◽  
S. Ebenezer Juliet ◽  
I. Joshua Selwyn ◽  
P. Sivanisha

The Internet of things (IoT) is one of the emerging technologies that brought revolution in many application domains such as smart cities, smart retails, healthcare monitoring and so on. As the physical objects are connected via internet, security risk may arise. This paper analyses the existing technologies and protocols that are designed by different authors to ensure the secure communication over internet. It additionally focuses on the advancement in healthcare systems while deploying IoT services.


2021 ◽  
Vol 2 (3) ◽  
pp. 1-44
Author(s):  
Akm Iqtidar Newaz ◽  
Amit Kumar Sikder ◽  
Mohammad Ashiqur Rahman ◽  
A. Selcuk Uluagac

Recent advancements in computing systems and wireless communications have made healthcare systems more efficient than before. Modern healthcare devices can monitor and manage different health conditions of patients automatically without any manual intervention from medical professionals. Additionally, the use of implantable medical devices, body area networks, and Internet of Things technologies in healthcare systems improve the overall patient monitoring and treatment process. However, these systems are complex in software and hardware, and optimizing between security, privacy, and treatment is crucial for healthcare systems because any security or privacy violation can lead to severe effects on patients’ treatments and overall health conditions. Indeed, the healthcare domain is increasingly facing security challenges and threats due to numerous design flaws and the lack of proper security measures in healthcare devices and applications. In this article, we explore various security and privacy threats to healthcare systems and discuss the consequences of these threats. We present a detailed survey of different potential attacks and discuss their impacts. Furthermore, we review the existing security measures proposed for healthcare systems and discuss their limitations. Finally, we conclude the article with future research directions toward securing healthcare systems against common vulnerabilities.


2021 ◽  
Author(s):  
Michael Enbibel

This research is done for optimizing telemedicine framework by using fogging or fog computing for smart healthcare systems. Fog computing is used to solve the issues that arise on telemedicine framework of smart healthcare system like Infrastructural, Implementation, Acceptance, Data Management, Security, Bottleneck system organization, and Network latency Issues. we mainly used Distributed Data Flow (DDF) method using fog computing in order to fully solve the listed issues.


The advancement of information and communications technology has changed an IoMT-enabled healthcare system. The Internet of Medical Things (IoMT) is a subset of the Internet of Things (IoT) that focuses on smart healthcare (medical) device connectivity. While the Internet of Medical Things (IoMT) communication environment facilitates and supports our daily health activities, it also has drawbacks such as password guessing, replay, impersonation, remote hijacking, privileged insider, denial of service (DoS), and man-in-the-middle attacks, as well as malware attacks. Malware botnets cause assaults on the system's data and other resources, compromising its authenticity, availability, confidentiality and, integrity. In the event of such an attack, crucial IoMT communication data may be exposed, altered, or even unavailable to authorised users. As a result, malware protection for the IoMT environment becomes critical. In this paper, we provide several forms of malware attacks and their consequences. We also go through security, privacy, and different IoMT malware detection schemes


Author(s):  
Ahmed Shawish ◽  
Maria Salama

Healthcare is one of the most important sectors in all countries and significantly affects the economy. As such, the sector consumes an average of 9.5% of the gross domestic product across the most developed countries; they should invoke smart healthcare systems to efficiently utilize available resources, vastly handle spontaneous emergencies, and professionally manage the population health records. With the rise of the Cloud and Mobile Computing, a vast variety of added values have been introduced to software and IT infrastructure. This chapter provides a comprehensive review on the new Cloud-based and mobile-based applications that have been developed in the healthcare field. Cloud's availability, scalability, and storage capabilities, in addition to the Mobile's portability, wide coverage, and accessibility features, contributed to the fulfillment of healthcare requirements. The chapter shows how Cloud and Mobile opened a new environment for innovative services in the healthcare field and discusses the open research issues.


Sign in / Sign up

Export Citation Format

Share Document