Threats to patients’ privacy in smart healthcare environment

Abstract The smart healthcare environment offers plenty of opportunities to help organizations and healthcare practitioners offer better services to the patients. The increasingly networked nature of the healthcare environment coupled with the introduction of Internet of Things devices in the mix allow physicians to both deliver critical-care and preventive medicine services to their patients more effectively and efficiently. However, the smart healthcare environment exposes the patients’ data to various risks including exposure. The two biggest threats to patients’ data privacy are (1) lack of understanding of various policies and regulations that are in place and how they affect the handling of patients’ data and (2) the threats that are posed by the hackers. A recent study indicated the lack of knowledge of general population as to how information is processed, transmitted, and stored in a corporate environment. This chapter intends to educate the reader regarding various prevalent legislation and the threats that can potentially expose corporate digital assets and patients’ sensitive data.

[1]  Josep Domingo-Ferrer,et al.  FRR: Fair remote retrieval of outsourced private medical records in electronic health networks , 2014, J. Biomed. Informatics.

[2]  Kevin Ashton,et al.  That ‘Internet of Things’ Thing , 1999 .

[3]  Giuseppe Piro,et al.  Information centric services in Smart Cities , 2014, J. Syst. Softw..

[4]  Chia-Hung Hsiao,et al.  Privacy preservation and information security protection for patients' portable electronic health records , 2009, Comput. Biol. Medicine.

[5]  Muhammad Waseem,et al.  A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .

[6]  Alptekin Küpçü,et al.  Research issues for privacy and security of electronic health services , 2017, Future Gener. Comput. Syst..

[7]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[8]  Noboru Sonehara,et al.  Aspects of privacy for electronic health records , 2011, Int. J. Medical Informatics.

[9]  Danah Boyd,et al.  Facebook privacy settings: Who cares? , 2010, First Monday.

[10]  Kun Liu,et al.  Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework , 2007, PKDD.

[11]  Adil Rajput,et al.  Natural Language Processing, Sentiment Analysis and Clinical Analytics , 2019, Innovation in Health Informatics.

[12]  Aristides Lopes da Silva,et al.  Health and emergency-care platform for the elderly and disabled people in the Smart City , 2015, J. Syst. Softw..

[13]  James A. Hendler,et al.  Embracing "Web 3.0" , 2007, IEEE Internet Computing.

[14]  José Luis Fernández Alemán,et al.  Security and privacy in electronic health records: A systematic literature review , 2013, J. Biomed. Informatics.

[15]  Michele Nogueira Lima,et al.  Interoperability issues on heterogeneous wireless communication for smart cities , 2015, Comput. Commun..

[16]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[17]  Batami Sadan Patient data confidentiality and patient rights , 2001, Int. J. Medical Informatics.

[18]  Steven Furnell,et al.  Assessing the security perceptions of personal Internet users , 2007, Comput. Secur..

[19]  Milan Petkovic,et al.  Secure management of personal health records by applying attribute-based encryption , 2009, Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health.

[20]  Patricia A. H. Williams,et al.  Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem , 2015, Medical devices.

[21]  Yuguang Fang,et al.  A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks , 2014, IEEE Transactions on Mobile Computing.

[22]  Klaus Wehrle,et al.  Privacy in the Internet of Things: threats and challenges , 2014, Secur. Commun. Networks.

[23]  Tayeb Brahimi,et al.  Characterizing IOMT/Personal Area Networks Landscape , 2019, ArXiv.

[24]  Yan Li,et al.  Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan , 2016, Comput. Biol. Medicine.

[25]  Eric Becker,et al.  Digital cities of the future: Extending @home assistive technologies for the elderly and the disabled , 2011, Telematics Informatics.

[26]  Chunxiao Jiang,et al.  Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.

[27]  Yier Jin,et al.  Privacy and Security in Internet of Things and Wearable Devices , 2015, IEEE Transactions on Multi-Scale Computing Systems.

[28]  James B. D. Joshi,et al.  Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges , 2015 .

[29]  Laura A. Dabbish,et al.  "My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security , 2015, SOUPS.