A Review-based Taxonomy for Secure Health Care Monitoring: Wireless
Smart Cameras
- URL: http://arxiv.org/abs/2107.06833v1
- Date: Mon, 5 Jul 2021 11:59:10 GMT
- Title: A Review-based Taxonomy for Secure Health Care Monitoring: Wireless
Smart Cameras
- Authors: Ravi Teja Batchu, Abeer Alsadoon, P.W.C. Prasad, Rasha S. Ali, Tarik
A. Rashid, Ghossoon Alsadoon, Oday D. Jerew
- Abstract summary: This research focuses on the secure storage of patient and medical records in the healthcare sector.
A potential solution comes from biometrics, although their use may be time-consuming and can slow down data retrieval.
This research aims to overcome these challenges and enhance data access control in the healthcare sector through the addition of biometrics in the form of fingerprints.
- Score: 9.4545147165828
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Health records data security is one of the main challenges in e-health
systems. Authentication is one of the essential security services to support
the stored data confidentiality, integrity, and availability. This research
focuses on the secure storage of patient and medical records in the healthcare
sector where data security and unauthorized access is an ongoing issue. A
potential solution comes from biometrics, although their use may be
time-consuming and can slow down data retrieval. This research aims to overcome
these challenges and enhance data access control in the healthcare sector
through the addition of biometrics in the form of fingerprints. The proposed
model for application in the healthcare sector consists of Collection, Network
communication, and Authentication (CNA) using biometrics, which replaces an
existing password-based access control method. A sensor then collects data and
by using a network (wireless or Zig-bee), a connection is established, after
connectivity analytics and data management work which processes and aggregate
the data. Subsequently, access is granted to authenticated users of the
application. This IoT-based biometric authentication system facilitates
effective recognition and ensures confidentiality, integrity, and reliability
of patients, records and other sensitive data. The proposed solution provides
reliable access to healthcare data and enables secure access through the
process of user and device authentication. The proposed model has been
developed for access control to data through the authentication of users in
healthcare to reduce data manipulation or theft.
Related papers
- Empower Healthcare through a Self-Sovereign Identity Infrastructure for Secure Electronic Health Data Access [1.444899524297657]
We propose an open-source health data management framework, that follows a patient-centric approach.
The framework uses technology to provide immutability, verifiable data registry, and auditability.
We discuss the differences and novelties of this framework, which includes the patient-centric approach also for data storage, the designed recovery and emergency plan, the defined backup procedure, and the selected blockchain platform.
arXiv Detail & Related papers (2025-01-21T15:52:26Z) - Empowering Patients for Disease Diagnosis and Clinical Treatment: A Smart Contract-Enabled Informed Consent Strategy [0.312488427986006]
Digital healthcare systems have revolutionized medical services, facilitating provider collaboration, enhancing diagnosis, and optimizing and improving treatments.
They deliver superior quality, faster, reliable, and cost-effective services.
Researchers are addressing pressing health challenges by integrating information technology, computing resources, and digital health records.
digitizing healthcare introduces significant risks to patient data privacy and security, with the potential for unauthorized access to protected health information.
arXiv Detail & Related papers (2024-12-13T03:20:15Z) - Balancing Confidentiality and Transparency for Blockchain-based Process-Aware Information Systems [46.404531555921906]
We propose an architecture for blockchain-based PAISs aimed at preserving both confidentiality and transparency.
Smart contracts enact, enforce and store public interactions, while attribute-based encryption techniques are adopted to specify access grants to confidential information.
arXiv Detail & Related papers (2024-12-07T20:18:36Z) - An Intelligent Quantum Cyber-Security Framework for Healthcare Data Management [4.828148213747833]
This paper introduces a comprehensive quantum-based framework to overwhelm the potential security and privacy issues for secure healthcare data management.
The proposed framework delivers overall healthcare data management by coupling the advanced and more competent quantum approach with machine learning.
The experimental evaluation and comparison of the proposed IQ-HDM framework with state-of-the-art methods outline a considerable improvement up to 67.6%, in tackling cyber threats related to healthcare data security.
arXiv Detail & Related papers (2024-10-04T08:04:48Z) - Advancing a Consent-Forward Paradigm for Digital Mental Health Data [39.14432077937818]
Service users are given little say over how their data is collected, shared, or used to generate revenue for private companies.
We propose an alternative approach that is attentive to this history: the consent-forward paradigm.
This paradigm embeds principles of affirmative consent in the design of digital mental health tools and services.
arXiv Detail & Related papers (2024-04-22T19:39:35Z) - S3PHER: Secure and Searchable System for Patient-driven HEalth data shaRing [0.0]
Current systems for sharing health data between patients and caregivers do not fully address the critical security requirements of privacy, confidentiality, and consent management.
We present S3PHER, a novel approach to sharing health data that provides patients with control over who accesses their data, what data is accessed, and when.
arXiv Detail & Related papers (2024-04-17T13:31:50Z) - Blockchain-empowered Federated Learning for Healthcare Metaverses:
User-centric Incentive Mechanism with Optimal Data Freshness [66.3982155172418]
We first design a user-centric privacy-preserving framework based on decentralized Federated Learning (FL) for healthcare metaverses.
We then utilize Age of Information (AoI) as an effective data-freshness metric and propose an AoI-based contract theory model under Prospect Theory (PT) to motivate sensing data sharing.
arXiv Detail & Related papers (2023-07-29T12:54:03Z) - A Blockchain-Based Consent Mechanism for Access to Fitness Data in the
Healthcare Context [0.966840768820136]
This study introduces an architecture for a human-centric, legally compliant, decentralized and dynamic consent system based on blockchain and smart contracts.
The security properties of the proposed system were evaluated using the formal security modeling framework SeMF.
arXiv Detail & Related papers (2022-02-25T09:51:02Z) - User-Centric Health Data Using Self-sovereign Identities [69.50862982117127]
This article presents the potential use of the issuers Self-Sovereign Identities (SSI) and Distributed Ledger Technologies (DLT) to improve the privacy and control of health data.
The paper lists the prominent use cases of decentralized identities in the health area, and discusses an effective blockchain-based architecture.
arXiv Detail & Related papers (2021-07-26T17:09:52Z) - Investigating Protected Health Information Leakage from Android Medical
Applications [36.56303585709521]
Smartphones and smartphone applications are widely used in a healthcare context (e.g., remote healthcare)
These devices and applications may need to comply with the Health Insurance Portability and Accountability Act (HIPAA) of 1996.
In this study, we forensically focus on the potential of recovering residual data from Android medical applications.
arXiv Detail & Related papers (2021-05-16T05:54:24Z) - Decentralized Privacy-Preserving Proximity Tracing [50.27258414960402]
DP3T provides a technological foundation to help slow the spread of SARS-CoV-2.
System aims to minimise privacy and security risks for individuals and communities.
arXiv Detail & Related papers (2020-05-25T12:32:02Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.