A Review-based Taxonomy for Secure Health Care Monitoring: Wireless
Smart Cameras
- URL: http://arxiv.org/abs/2107.06833v1
- Date: Mon, 5 Jul 2021 11:59:10 GMT
- Title: A Review-based Taxonomy for Secure Health Care Monitoring: Wireless
Smart Cameras
- Authors: Ravi Teja Batchu, Abeer Alsadoon, P.W.C. Prasad, Rasha S. Ali, Tarik
A. Rashid, Ghossoon Alsadoon, Oday D. Jerew
- Abstract summary: This research focuses on the secure storage of patient and medical records in the healthcare sector.
A potential solution comes from biometrics, although their use may be time-consuming and can slow down data retrieval.
This research aims to overcome these challenges and enhance data access control in the healthcare sector through the addition of biometrics in the form of fingerprints.
- Score: 9.4545147165828
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Health records data security is one of the main challenges in e-health
systems. Authentication is one of the essential security services to support
the stored data confidentiality, integrity, and availability. This research
focuses on the secure storage of patient and medical records in the healthcare
sector where data security and unauthorized access is an ongoing issue. A
potential solution comes from biometrics, although their use may be
time-consuming and can slow down data retrieval. This research aims to overcome
these challenges and enhance data access control in the healthcare sector
through the addition of biometrics in the form of fingerprints. The proposed
model for application in the healthcare sector consists of Collection, Network
communication, and Authentication (CNA) using biometrics, which replaces an
existing password-based access control method. A sensor then collects data and
by using a network (wireless or Zig-bee), a connection is established, after
connectivity analytics and data management work which processes and aggregate
the data. Subsequently, access is granted to authenticated users of the
application. This IoT-based biometric authentication system facilitates
effective recognition and ensures confidentiality, integrity, and reliability
of patients, records and other sensitive data. The proposed solution provides
reliable access to healthcare data and enables secure access through the
process of user and device authentication. The proposed model has been
developed for access control to data through the authentication of users in
healthcare to reduce data manipulation or theft.
Related papers
- An Intelligent Quantum Cyber-Security Framework for Healthcare Data Management [4.828148213747833]
This paper introduces a comprehensive quantum-based framework to overwhelm the potential security and privacy issues for secure healthcare data management.
The proposed framework delivers overall healthcare data management by coupling the advanced and more competent quantum approach with machine learning.
The experimental evaluation and comparison of the proposed IQ-HDM framework with state-of-the-art methods outline a considerable improvement up to 67.6%, in tackling cyber threats related to healthcare data security.
arXiv Detail & Related papers (2024-10-04T08:04:48Z) - Advancing a Consent-Forward Paradigm for Digital Mental Health Data [39.14432077937818]
Service users are given little say over how their data is collected, shared, or used to generate revenue for private companies.
We propose an alternative approach that is attentive to this history: the consent-forward paradigm.
This paradigm embeds principles of affirmative consent in the design of digital mental health tools and services.
arXiv Detail & Related papers (2024-04-22T19:39:35Z) - S3PHER: Secure and Searchable System for Patient-driven HEalth data shaRing [0.0]
Current systems for sharing health data between patients and caregivers do not fully address the critical security requirements of privacy, confidentiality, and consent management.
We present S3PHER, a novel approach to sharing health data that provides patients with control over who accesses their data, what data is accessed, and when.
arXiv Detail & Related papers (2024-04-17T13:31:50Z) - A Solution for Commercializing, Decentralizing and Storing Electronic Medical Records by Integrating Proxy Re-Encryption, IPFS, and Blockchain [6.237350715303438]
We propose an innovative solution for implementing a decentralized system utilizing an EVM-compatible blockchain and IPFS for decentralized storage.
To ensure privacy and control, we employ Proxy Re-Encryption (PRE), a cryptographic authorized method, within the medical data marketplace.
It empowers users with enhanced control over their health data through tamperproof blockchain smart contracts and IPFS, safeguarding the integrity and privacy of their medical records.
arXiv Detail & Related papers (2024-02-08T09:09:03Z) - Blockchain-empowered Federated Learning for Healthcare Metaverses:
User-centric Incentive Mechanism with Optimal Data Freshness [66.3982155172418]
We first design a user-centric privacy-preserving framework based on decentralized Federated Learning (FL) for healthcare metaverses.
We then utilize Age of Information (AoI) as an effective data-freshness metric and propose an AoI-based contract theory model under Prospect Theory (PT) to motivate sensing data sharing.
arXiv Detail & Related papers (2023-07-29T12:54:03Z) - A Blockchain-Based Consent Mechanism for Access to Fitness Data in the
Healthcare Context [0.966840768820136]
This study introduces an architecture for a human-centric, legally compliant, decentralized and dynamic consent system based on blockchain and smart contracts.
The security properties of the proposed system were evaluated using the formal security modeling framework SeMF.
arXiv Detail & Related papers (2022-02-25T09:51:02Z) - User-Centric Health Data Using Self-sovereign Identities [69.50862982117127]
This article presents the potential use of the issuers Self-Sovereign Identities (SSI) and Distributed Ledger Technologies (DLT) to improve the privacy and control of health data.
The paper lists the prominent use cases of decentralized identities in the health area, and discusses an effective blockchain-based architecture.
arXiv Detail & Related papers (2021-07-26T17:09:52Z) - Investigating Protected Health Information Leakage from Android Medical
Applications [36.56303585709521]
Smartphones and smartphone applications are widely used in a healthcare context (e.g., remote healthcare)
These devices and applications may need to comply with the Health Insurance Portability and Accountability Act (HIPAA) of 1996.
In this study, we forensically focus on the potential of recovering residual data from Android medical applications.
arXiv Detail & Related papers (2021-05-16T05:54:24Z) - Biometrics: Trust, but Verify [49.9641823975828]
Biometric recognition has exploded into a plethora of different applications around the globe.
There are a number of outstanding problems and concerns pertaining to the various sub-modules of biometric recognition systems.
arXiv Detail & Related papers (2021-05-14T03:07:25Z) - When Physical Unclonable Function Meets Biometrics [0.5156484100374058]
Electrocardiogram (ECG) based biometric has become popular as it can authenticate patients and monitor the patient's vital signs.
volatile memory-based (NVM) PUF can be easily placed in the device to avoid counterfeit.
Our aim is to provide a comprehensive study on the state-of-the-art developments papers based on biometrics enabled hardware security.
arXiv Detail & Related papers (2020-12-14T20:00:40Z) - Decentralized Privacy-Preserving Proximity Tracing [50.27258414960402]
DP3T provides a technological foundation to help slow the spread of SARS-CoV-2.
System aims to minimise privacy and security risks for individuals and communities.
arXiv Detail & Related papers (2020-05-25T12:32:02Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.