Internet of Things in the Healthcare Sector: Overview of Security and Privacy Issues

In Zaigham Mahmood (ed.), Security, Privacy and Trust in the Iot Environment. Springer Verlag. pp. 153-179 (2019)
  Copy   BIBTEX

Abstract

The Internet of Things in health care is an emerging trend which provides a substantial amount of efficient and effective services for patients as well as healthcare professionals for the treatment of various diseases. Although the IoT paradigm offers numerous benefits, there are also inherent security and Privacy challenges in relation to patient data. This chapter aims to investigate such security and privacy-related issues of the IoT Healthcare applications that often operate on Cloud and Fog Computing architectures. In this chapter, 30 peer-reviewed publications from the years 2016 to 2018 are reviewed to construct a structured guide for the identification of related problems. Healthcare software applications, service architectures, patient data, and diverse sensory devices used are some of the factors considered for the collection of data, determination of related security and privacy issues, and implications of the said problems. Based on the factors, a comparison table is developed for analysis. Results show that most of these applications are used for remote patient care and monitoring. Furthermore, the results show that most threats occur due to Unauthorized access to data, Data breaches, and Impersonation. Considering the IoT healthcare applications architecture (consisting of application, communication, device, network, and Transport layer we find that the Device layer is the most affected layer regarding the security issues. Since most of the similar studies are limited to providing solutions regarding a specific aspect of security and privacy without considering the entire process, we have carried out additional research for a holistic approach to solve the bigger problem. We suggest that application developers should pay particular attention to these threats when designing IoT healthcare applications to provide secure and efficient applications to enhance the services within the healthcare sector. This study could be helpful to plan mitigation methodologies to conquer the inherent Vulnerabilities in the IoT healthcare applications.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,682

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Privacy and Security Issues with Mobile Health Research Applications.Stacey A. Tovino - 2020 - Journal of Law, Medicine and Ethics 48 (S1):154-158.
Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
The Social Impact of Computers.Richard S. Rosenberg - 1997 - Elsevier Academic Press.
Cloud Computing and its ethical issues.J. Jeniffer - 2012 - Eubios Journal of Asian and International Bioethics 22 (4):155-157.

Analytics

Added to PP
2020-06-17

Downloads
9 (#1,270,522)

6 months
2 (#1,236,853)

Historical graph of downloads
How can I increase my downloads?