An exhaustive survey on security and privacy issues in Healthcare 4.0
Tài liệu tham khảo
R. Gupta, S. Tanwar, S. Tyagi, N. Kumar, M.S. Obaidat, B. Sadoun, HaBiTs: Blockchain-based telesurgery framework for Healthcare 4.0, in: 2019 International Conference on Computer, Information and Telecommunication Systems, CITS, 2019, pp. 1–5.
Hathaliya, 2019, Securing electronics healthcare records in healthcare 4.0: A biometric-based approach, Comput. Electr. Eng., 76, 398, 10.1016/j.compeleceng.2019.04.017
Coventry, 2018, Cybersecurity in healthcare: A narrative review of trends, threats and ways forward, Maturitas, 113, 48, 10.1016/j.maturitas.2018.04.008
K, 2019, Alzheimer detection using group grey wolf optimization based features with convolutional classifier, Comput. Electr. Eng., 77, 230, 10.1016/j.compeleceng.2019.06.001
Gupta, 2019, Tactile-internet-based telesurgery system for healthcare 4.0: An architecture, research challenges, and future directions, IEEE Netw., 33, 22, 10.1109/MNET.001.1900063
Kumari, 2018, Multimedia big data computing and Internet of Things applications: A taxonomy and process model, J. Netw. Comput. Appl., 124, 169, 10.1016/j.jnca.2018.09.014
Kumari, 2018, Fog computing for healthcare 4.0 environment: Opportunities and challenges, Comput. Electr. Eng., 72, 1, 10.1016/j.compeleceng.2018.08.015
Kumari, 2019, Fog data analytics: A taxonomy and process model, J. Netw. Comput. Appl., 128, 90, 10.1016/j.jnca.2018.12.013
Vora, 2018, Ensuring privacy and security in e-health records, 1
Vora, 2018, Blind signatures based secured e-healthcare system, 1
Fernández-Alemán, 2013, Security and privacy in electronic health records: A systematic literature review, J. Biomed. Inform., 46, 541, 10.1016/j.jbi.2012.12.003
Abbas, 2014, A review on the state-of-the-art privacy-preserving approaches in the e-health clouds, IEEE J. Biomed. Health Inf., 18, 1431, 10.1109/JBHI.2014.2300846
N. Al Nuaimi, A. AlShamsi, N. Mohamed, J. Al-Jaroodi, e-Health cloud implementation issues and efforts, in: International Conference on Industrial Engineering and Operations Management, IEOM, 2015, pp. 1–10.
Idoga, 2016, Review of security issues in e-healthcare and solutions, 118
Pankomera, 2016, Privacy and security issues for a patient-centric approach in public healthcare in a resource constrained setting, 1
Olaronke, 2016, Big data in healthcare: Prospects, challenges and resolutions, 1152
Pussewalage, 2016, Privacy preserving mechanisms for enforcing security and privacy requirements in e-health solutions, Int. J. Inf. Manage., 36, 1161, 10.1016/j.ijinfomgt.2016.07.006
Shrestha, 2016, Enhanced e-health framework for security and privacy in healthcare system, 75
Vithanwattana, 2016, MHealth-investigating an information security framework for mhealth data: Challenges and possible solutions, 258
Filkins, 2016, Privacy and security in the era of digital health: what should translational researchers know and do about it?, Am. J. Transl. Res., 3, 1560
Yüksel, 2017, Research issues for privacy and security of electronic health services, Future Gener. Comput. Syst., 68, 1, 10.1016/j.future.2016.08.011
Priya, 2017, A survey on security attacks in electronic healthcare systems, 0691
Abouelmehdi, 2017, Big data security and privacy in healthcare: a review, Procedia Comput. Sci., 113, 73, 10.1016/j.procs.2017.08.292
Baker, 2017, Internet of Things for smart healthcare: Technologies, challenges, and opportunities, IEEE Access, 5, 26521, 10.1109/ACCESS.2017.2775180
Abouelmehdi, 2018, Big healthcare data: preserving security and privacy, J. Big Data, 1
Mutlag, 2019, Enabling technologies for fog computing in healthcare IoT systems, Future Gener. Comput. Syst., 90, 62, 10.1016/j.future.2018.07.049
Khanan A., 2019, 55
Onik, 2019, Personal data privacy challenges of the fourth industrial revolution, 635
Javaid, 2019, Industry 4.0 applications in medical field: A brief review, Curr. Med. Res. Pract., 9, 102, 10.1016/j.cmrp.2019.04.001
Sun, 2008, A new design of wearable token system for mobile device security, IEEE Trans. Consum. Electron., 54, 10.1109/TCE.2008.4711235
Hassan, 2012, A conceptual model for investigating factors influencing information security culture in healthcare environment, Procedia-Soc. Behav. Sci., 65, 1007, 10.1016/j.sbspro.2012.11.234
Box, 2013, Improving information security behaviour in the healthcare context, Proc. Technol., 9, 1093, 10.1016/j.protcy.2013.12.122
Gupta, 2019, Tactile internet and its applications in 5G era: A comprehensive review, Int. J. Commun. Syst., 32, 10.1002/dac.3981
Budhiraja, 2019, Tactile internet for smart communities in 5G: An insight for NOMA-based solutions, IEEE Trans. Ind. Inf., 15, 3104, 10.1109/TII.2019.2892763
S. Kaneriya, J. Vora, S. Tanwar, S. Tyagi, Standardising the use of duplex channels in 5G-WiFi networking for ambient assisted living, in: 2019 IEEE International Conference on Communications Workshops, ICC Workshops, 2019, pp. 1–6.
He, 2015, Authentication protocol for an ambient assisted living system, IEEE Commun. Mag., 53, 71, 10.1109/MCOM.2015.7010518
Mutlag, 2019, Enabling technologies for fog computing in healthcare IoT systems, Future Gener. Comput. Syst., 90, 62, 10.1016/j.future.2018.07.049
Kitchenham, 2009, Systematic literature reviews in software engineering – A systematic literature review, Inf. Softw. Technol., 51, 7, 10.1016/j.infsof.2008.09.009
Kitchenham, 2009, Systematic literature reviews in software engineering – A systematic literature review, Inf. Softw. Technol., 51, 7, 10.1016/j.infsof.2008.09.009
Kitchenham, 2007
Kumari, 2019, Verification and validation techniques for streaming big data analytics in Internet of Things environment, IET Netw., 8, 155, 10.1049/iet-net.2018.5187
S. Kaneriya, D. Lakhani, H.U. Brahmbhatt, S. Tanwar, S. Tyagi, N. Kumar, J.J.P.C. Rodrigues, Can tactile internet be a solution for low latency heart disorientation measure: an analysis, in: ICC 2019 - 2019 IEEE International Conference on Communications, ICC, 2019, pp. 1–6.
Vora, 2019, TILAA: Tactile internet-based ambient assistant living in fog environment, Future Gener. Comput. Syst., 98, 635, 10.1016/j.future.2019.01.035
Mistry, 2020, Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges, Mech. Syst. Signal Process., 135, 10.1016/j.ymssp.2019.106382
U. Bodkhe, P. Bhattacharya, S. Tanwar, S. Tyagi, N. Kumar, M.S. Obaidat, BloHosT: Blockchain enabled smart tourism and hospitality management, in: 2019 International Conference on Computer, Information and Telecommunication Systems, CITS, 2019, pp. 1–5.
Vora, 2018, BHEEM: A blockchain-based framework for securing electronic health records, 1
Kabra, 2020, MudraChain: Blockchain-based framework for automated cheque clearance in financial institutions, Future Gener. Comput. Syst., 102, 574, 10.1016/j.future.2019.08.035
Tanwar, 2020, Blockchain-based electronic healthcare record system for healthcare 4.0 applications, J. Inf. Secur. Appl., 50
Bhattacharya, 2020, Mobile edge computing-enabled blockchain framework-A survey, 797
Al Hamid, 2017, A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography, IEEE Access, 5, 22313, 10.1109/ACCESS.2017.2757844
Aledhari, 2017, A new cryptography algorithm to protect cloud-based healthcare services, 37
Zhou, 2015, TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems, 2398
S. Kaneriya, M. Chudasama, S. Tanwar, S. Tyagi, N. Kumar, J.J.P.C. Rodrigues, Markov decision-based recommender system for sleep apnea patients, in: ICC 2019 - 2019 IEEE International Conference on Communications, ICC, 2019, pp. 1–6.
Mutlag, 2019, Enabling technologies for fog computing in healthcare IoT systems, Future Gener. Comput. Syst., 90, 62, 10.1016/j.future.2018.07.049
Farahani, 2018, Towards fog-driven IoT ehealth: Promises and challenges of IoT in medicine and healthcare, Future Gener. Comput. Syst., 78, 659, 10.1016/j.future.2017.04.036
Elmisery, 2016, A fog based middleware for automated compliance with OECD privacy principles in internet of healthcare things, IEEE Access, 4, 8418, 10.1109/ACCESS.2016.2631546
Rauf, 2018, Security and privacy for IoT and fog computing paradigm, 96
Zhou, 2015, PPDM: A privacy-preserving protocol for cloud-assisted e-healthcare systems, IEEE J. Sel. Top. Sign. Proces., 9, 1332, 10.1109/JSTSP.2015.2427113
Ziglari, 2017, Evaluating cloud deployment models based on security in EHR system, 1
Sanz-Requena, 2015, A cloud-based radiological portal for the patients: It contributing to position the patient as the central axis of the 21st century healthcare cycles, 54
Huang, 2017, A privacy-preserving data sharing solution for mobile healthcare, 260
Solapurkar, 2016, Building secure healthcare services using OAuth 2.0 and JSON web token in IoT cloud scenario, 99
Deshmukh, 2017, Design of cloud security in the EHR for Indian healthcare services, J. King Saud Univ.-Comput. Inf. Sci., 29, 281
Liu, 2016, The yoking-proof-based authentication protocol for cloud-assisted wearable devices, Pers. Ubiquitous Comput., 20, 469, 10.1007/s00779-016-0926-8
Mehta, 2020, Blockchain envisioned UAV networks: Challenges, solutions, and comparisons, Comput. Commun., 151, 518, 10.1016/j.comcom.2020.01.023
Banerjee, 2018, A blockchain future for Internet of Things security: a position paper, Digit. Commun. Netw., 4, 149, 10.1016/j.dcan.2017.10.006
Gordon, 2018, Blockchain technology for healthcare: Facilitating the transition to patient-driven interoperability, Comput. Struct. Biotechnol. J., 16, 224, 10.1016/j.csbj.2018.06.003
Vora, 2017, FAAL: Fog computing-based patient monitoring system for ambient assisted living, 1
Theodouli, 2018, On the design of a blockchain-based system to facilitate healthcare data sharing, 1374
Kshetri, 2017, Blockchain’s roles in strengthening cybersecurity and protecting privacy, Telecommun. Policy, 41, 1027, 10.1016/j.telpol.2017.09.003
Kumar, 2018, Blockchain technology for security issues and challenges in IoT, Procedia Comput. Sci., 132, 1815, 10.1016/j.procs.2018.05.140
Zhang, 2018, Fhirchain: applying blockchain to securely and scalably share clinical data, Comput. Struct. Biotechnol. J., 16, 267, 10.1016/j.csbj.2018.07.004
Sadki, 2014, PPAMH: A novel privacy-preserving approach for mobile healthcare, 209
Kaura, 2018, Big data and machine learning based secure healthcare framework, Procedia Comput. Sci., 132, 1049, 10.1016/j.procs.2018.05.020
Marwan, 2018, Security enhancement in healthcare cloud using machine learning, Procedia Comput. Sci., 127, 388, 10.1016/j.procs.2018.01.136
Chaurasia, 2014, Data mining approach to detect heart diseases, Int. J. Adv. Comput. Sci. Inf. Technol., 2, 56
Vembandasamy, 2015, Heart diseases detection using Naive Bayes algorithm, Int. J. Innov. Sci. Eng. Technol., 2, 441
Kumari, 2013, Classification of diabetes disease using support vector machine, Int. J. Eng. Res. Appl., 3, 1797
Sarwar, 2012, Intelligent Naïve Bayes approach to diagnose diabetes type-2, Int. J. Comput. Appl., 14
Venkatesan, 2015, Performance analysis of decision tree algorithms for breast cancer classification, Indian J. Sci. Technol., 8, 1, 10.17485/ijst/2015/v8i1/84646
Sivakami, 2015, Mining big data: Breast cancer prediction using DT-SVM hybrid model, Int. J. Sci. Eng. Appl. Sci., 1, 418
Kousarrizi, 2012, An experimental comparative study on thyroid disease diagnosis based on feature subset selection and classification, Int. J. Electr. Comput. Sci., 12, 13
Shailaja, 2018, Machine learning in healthcare: A review, 910
Shajahaan, 2013, Application of data mining techniques to model breast cancer data, Int. J. Emerg. Technol. Adv. Eng., 3, 362
Shrivastava, 2013, An overview on data mining approach on breast cancer data, Int. J. Adv. Comput. Res., 3, 256
Srinivas, 2018, Cloud centric authentication for wearable healthcare monitoring system, IEEE Trans. Dependable Secure Comput., 1
Armando, 2005, The AVISPA tool for the automated validation of internet security protocols and applications, 281
Das, 2018, Design of secure and lightweight authentication protocol for wearable devices environment, IEEE J. Biomed. Health Inform., 22, 1310, 10.1109/JBHI.2017.2753464
Liu, 2016, A novel asymmetric three-party based authentication scheme in wearable devices environment, J. Netw. Comput. Appl., 60, 144, 10.1016/j.jnca.2015.10.001
Kumar, 2014, Security issues and privacy concerns in the implementation of wireless body area network, 58
Vora, 2017, Home-based exercise system for patients using IoT enabled smart speaker, 1
Yang, 2017, RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks, 1
Zhang, 2015, Security and privacy for mobile healthcare networks: from a quality of protection perspective, IEEE Wirel. Commun., 22, 104, 10.1109/MWC.2015.7224734
Sathya, 2017, Secured remote health monitoring system, Healthc. Technol. Lett., 4, 228, 10.1049/htl.2017.0033
Hiremath, 2014, Wearable Internet of Things: Concept, architectural components and promises for person-centered healthcare, 304
Boric-Lubecke, 2014, E-healthcare: Remote monitoring, privacy, and security, 1
Mekki, 2018, A privacy-preserving scheme using chaos theory for wireless body area network, 774
Strielkina, 2018, Cybersecurity of healthcare IoT-based systems: Regulation and case-oriented assessment, 67
Kai, 2013, Security and privacy mechanism for health Internet of Things, J. China Univ. Posts Telecommun., 20, 64, 10.1016/S1005-8885(13)60219-8
Williams, 2016, Always connected: The security challenges of the healthcare Internet of Things, 30
Laplante, 2018, Building caring healthcare systems in the Internet of Things, IEEE Syst. J., 12, 3030, 10.1109/JSYST.2017.2662602
Kodali, 2015, An implementation of IoT for healthcare, 411
Kumar, 2015, Ontology based public healthcare system in Internet of Things (IoT), Procedia Comput. Sci., 50, 99, 10.1016/j.procs.2015.04.067
Alsubaei, 2017, Security and privacy in the internet of medical things: Taxonomy and risk assessment, 112
He, 2018, Privacy in the Internet of Things for smart healthcare, IEEE Commun. Mag., 56, 38, 10.1109/MCOM.2018.1700809
Jisha, 2016, RFID based security platform for Internet of Things in health care environment, 1
Huang, 2018, Secure identity-based data sharing and profile matching for mobile healthcare social networks in cloud computing, IEEE Access, 6, 36584, 10.1109/ACCESS.2018.2852784
Sadki, 2015, Towards negotiable privacy policies in mobile healthcare, 94
Iwaya, 2018, mhealth: A privacy threat analysis for public health surveillance systems, 42
Seymour, 2004, Security and interconnection of medical devices to healthcare networks, 131
Martínez, 2013, A semantic framework to protect the privacy of electronic health records with non-numerical attributes, J. Biomed. Inform., 46, 294, 10.1016/j.jbi.2012.11.005
Ray, 2014, A certificate authority (CA)-based cryptographic solution for HIPAA privacy/security regulations, J. King Saud Univ.-Comput. Inf. Sci., 26, 170
Tupakula, 2013, Security techniques for counteracting attacks in mobile healthcare services, Procedia Comput. Sci., 21, 374, 10.1016/j.procs.2013.09.049
Vaast, 2007, Danger is in the eye of the beholders: Social representations of information systems security in healthcare, J. Strateg. Inf. Syst., 16, 130, 10.1016/j.jsis.2007.05.003
Patil, 2014, Big data security and privacy issues in healthcare, 762
Kwon, 2013, Healthcare security strategies for regulatory compliance and data security, 3972
Ghazvini, 2013, Security challenges and success factors of electronic healthcare system, Proc. Technol., 11, 212, 10.1016/j.protcy.2013.12.183
Liu, 2014, E-health PST (privacy, security and trust) mobile networking infrastructure, 1
Li, 2017, Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks, Comput. Netw., 129, 429, 10.1016/j.comnet.2017.03.013
Puppala, 2016, Data security and privacy management in healthcare applications and clinical data warehouse environment, 5
Moosavi, 2015, SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways, Procedia Comput. Sci., 52, 452, 10.1016/j.procs.2015.05.013
Mamun, 2017, A robust authentication model using multi-channel communication for ehealth systems to enhance privacy and security, 255
Kumari, 2019, Fog computing for smart grid systems in the 5G environment: Challenges and solutions, IEEE Wirel. Commun., 26, 47, 10.1109/MWC.2019.1800356
Wu, 2018, A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion, Comput. Electr. Eng., 68, 107, 10.1016/j.compeleceng.2018.03.030
Kumar, 2018, A certificateless aggregate signature scheme for healthcare wireless sensor network, Sustain. Comput. Inform. Syst., 18, 80
Tang, 2018, Enabling trusted and privacy-preserving healthcare services in social media health networks, IEEE Trans. Multimed.
Sharma, 2018, Privacy preservation in WSN for healthcare application, Procedia Comput. Sci., 132, 1243, 10.1016/j.procs.2018.05.040
Mohan, 2016, Improved classical cipher for healthcare applications, Procedia Comput. Sci., 93, 742, 10.1016/j.procs.2016.07.285
Ray, 2017, Using attribute-based access control for remote healthcare monitoring, 137
Xu, 2016, An integrated privacy preserving attribute based access control framework, 68
Xiao, 2008, A security model and its application to a distributed decision support system for healthcare, 578
Sahi, 2018, Privacy preservation in e-healthcare environments: State of the art and future directions, IEEE Access, 6, 464, 10.1109/ACCESS.2017.2767561
S., 2017, Adaptive content-aware access control of EPR resource in a healthcare system, 205
Yang, 2018, Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system, Inform. Sci.
Tseng, 2016, Designing privacy information protection of electronic medical records, 75
Mohammedi, 2018, Secure and lightweight biometric-based remote patient authentication scheme for home healthcare systems, 1
Shakil, 2017, BAMHealthCloud: A biometric authentication and data management system for healthcare data in cloud, J. King Saud Univ.-Comput. Inf. Sci.
Dwivedi, 2003, Towards a practical healthcare information security model for healthcare institutions, 114
Jahan, 2017, Robust fingerprint verification for enhancing security in healthcare system, 1
Chatterjee, 2018, Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment, IEEE Trans. Dependable Secure Comput., 15, 824, 10.1109/TDSC.2016.2616876
He, 2015, Robust biometrics-based authentication scheme for multiserver environment, IEEE Syst. J., 9, 816, 10.1109/JSYST.2014.2301517
Odelu, 2015, An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards, Secur. Commun. Netw., 8, 4136, 10.1002/sec.1330
Khan, 2014, A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks, Procedia Comput. Sci., 34, 511, 10.1016/j.procs.2014.07.058
Song, 2006, SHOES: secure healthcare oriented environement service model, 89
Chen, 2018, Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control, Future Gener. Comput. Syst., 87, 712, 10.1016/j.future.2017.10.022
Ma, 2018, Certificateless searchable public key encryption scheme for mobile healthcare system, Comput. Electr. Eng., 65, 413, 10.1016/j.compeleceng.2017.05.014
Tewari, 2018, Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework, Future Gener. Comput. Syst., 10.1016/j.future.2018.04.027
Strielkina, 2018, Availability models for healthcare IoT systems: Classification and research considering attacks on vulnerabilities, 58
McLeod, 2018, Cyber-analytics: Modeling factors associated with healthcare data breaches, Decis. Support Syst., 108, 57, 10.1016/j.dss.2018.02.007
Rai, 2014, Security and privacy issues in healthcare information system, Int. J. Emerg. Trends Technol. Comput. Sci., 3