An exhaustive survey on security and privacy issues in Healthcare 4.0

Computer Communications - Tập 153 - Trang 311-335 - 2020
Jigna J. Hathaliya1, Sudeep Tanwar1
1Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad, 382481, India

Tài liệu tham khảo

R. Gupta, S. Tanwar, S. Tyagi, N. Kumar, M.S. Obaidat, B. Sadoun, HaBiTs: Blockchain-based telesurgery framework for Healthcare 4.0, in: 2019 International Conference on Computer, Information and Telecommunication Systems, CITS, 2019, pp. 1–5. Hathaliya, 2019, Securing electronics healthcare records in healthcare 4.0: A biometric-based approach, Comput. Electr. Eng., 76, 398, 10.1016/j.compeleceng.2019.04.017 Coventry, 2018, Cybersecurity in healthcare: A narrative review of trends, threats and ways forward, Maturitas, 113, 48, 10.1016/j.maturitas.2018.04.008 K, 2019, Alzheimer detection using group grey wolf optimization based features with convolutional classifier, Comput. Electr. Eng., 77, 230, 10.1016/j.compeleceng.2019.06.001 Gupta, 2019, Tactile-internet-based telesurgery system for healthcare 4.0: An architecture, research challenges, and future directions, IEEE Netw., 33, 22, 10.1109/MNET.001.1900063 Kumari, 2018, Multimedia big data computing and Internet of Things applications: A taxonomy and process model, J. Netw. Comput. Appl., 124, 169, 10.1016/j.jnca.2018.09.014 Kumari, 2018, Fog computing for healthcare 4.0 environment: Opportunities and challenges, Comput. Electr. Eng., 72, 1, 10.1016/j.compeleceng.2018.08.015 Kumari, 2019, Fog data analytics: A taxonomy and process model, J. Netw. Comput. Appl., 128, 90, 10.1016/j.jnca.2018.12.013 Vora, 2018, Ensuring privacy and security in e-health records, 1 Vora, 2018, Blind signatures based secured e-healthcare system, 1 Fernández-Alemán, 2013, Security and privacy in electronic health records: A systematic literature review, J. Biomed. Inform., 46, 541, 10.1016/j.jbi.2012.12.003 Abbas, 2014, A review on the state-of-the-art privacy-preserving approaches in the e-health clouds, IEEE J. Biomed. Health Inf., 18, 1431, 10.1109/JBHI.2014.2300846 N. Al Nuaimi, A. AlShamsi, N. Mohamed, J. Al-Jaroodi, e-Health cloud implementation issues and efforts, in: International Conference on Industrial Engineering and Operations Management, IEOM, 2015, pp. 1–10. Idoga, 2016, Review of security issues in e-healthcare and solutions, 118 Pankomera, 2016, Privacy and security issues for a patient-centric approach in public healthcare in a resource constrained setting, 1 Olaronke, 2016, Big data in healthcare: Prospects, challenges and resolutions, 1152 Pussewalage, 2016, Privacy preserving mechanisms for enforcing security and privacy requirements in e-health solutions, Int. J. Inf. Manage., 36, 1161, 10.1016/j.ijinfomgt.2016.07.006 Shrestha, 2016, Enhanced e-health framework for security and privacy in healthcare system, 75 Vithanwattana, 2016, MHealth-investigating an information security framework for mhealth data: Challenges and possible solutions, 258 Filkins, 2016, Privacy and security in the era of digital health: what should translational researchers know and do about it?, Am. J. Transl. Res., 3, 1560 Yüksel, 2017, Research issues for privacy and security of electronic health services, Future Gener. Comput. Syst., 68, 1, 10.1016/j.future.2016.08.011 Priya, 2017, A survey on security attacks in electronic healthcare systems, 0691 Abouelmehdi, 2017, Big data security and privacy in healthcare: a review, Procedia Comput. Sci., 113, 73, 10.1016/j.procs.2017.08.292 Baker, 2017, Internet of Things for smart healthcare: Technologies, challenges, and opportunities, IEEE Access, 5, 26521, 10.1109/ACCESS.2017.2775180 Abouelmehdi, 2018, Big healthcare data: preserving security and privacy, J. Big Data, 1 Mutlag, 2019, Enabling technologies for fog computing in healthcare IoT systems, Future Gener. Comput. Syst., 90, 62, 10.1016/j.future.2018.07.049 Khanan A., 2019, 55 Onik, 2019, Personal data privacy challenges of the fourth industrial revolution, 635 Javaid, 2019, Industry 4.0 applications in medical field: A brief review, Curr. Med. Res. Pract., 9, 102, 10.1016/j.cmrp.2019.04.001 Sun, 2008, A new design of wearable token system for mobile device security, IEEE Trans. Consum. Electron., 54, 10.1109/TCE.2008.4711235 Hassan, 2012, A conceptual model for investigating factors influencing information security culture in healthcare environment, Procedia-Soc. Behav. Sci., 65, 1007, 10.1016/j.sbspro.2012.11.234 Box, 2013, Improving information security behaviour in the healthcare context, Proc. Technol., 9, 1093, 10.1016/j.protcy.2013.12.122 Gupta, 2019, Tactile internet and its applications in 5G era: A comprehensive review, Int. J. Commun. Syst., 32, 10.1002/dac.3981 Budhiraja, 2019, Tactile internet for smart communities in 5G: An insight for NOMA-based solutions, IEEE Trans. Ind. Inf., 15, 3104, 10.1109/TII.2019.2892763 S. Kaneriya, J. Vora, S. Tanwar, S. Tyagi, Standardising the use of duplex channels in 5G-WiFi networking for ambient assisted living, in: 2019 IEEE International Conference on Communications Workshops, ICC Workshops, 2019, pp. 1–6. He, 2015, Authentication protocol for an ambient assisted living system, IEEE Commun. Mag., 53, 71, 10.1109/MCOM.2015.7010518 Mutlag, 2019, Enabling technologies for fog computing in healthcare IoT systems, Future Gener. Comput. Syst., 90, 62, 10.1016/j.future.2018.07.049 Kitchenham, 2009, Systematic literature reviews in software engineering – A systematic literature review, Inf. Softw. Technol., 51, 7, 10.1016/j.infsof.2008.09.009 Kitchenham, 2009, Systematic literature reviews in software engineering – A systematic literature review, Inf. Softw. Technol., 51, 7, 10.1016/j.infsof.2008.09.009 Kitchenham, 2007 Kumari, 2019, Verification and validation techniques for streaming big data analytics in Internet of Things environment, IET Netw., 8, 155, 10.1049/iet-net.2018.5187 S. Kaneriya, D. Lakhani, H.U. Brahmbhatt, S. Tanwar, S. Tyagi, N. Kumar, J.J.P.C. Rodrigues, Can tactile internet be a solution for low latency heart disorientation measure: an analysis, in: ICC 2019 - 2019 IEEE International Conference on Communications, ICC, 2019, pp. 1–6. Vora, 2019, TILAA: Tactile internet-based ambient assistant living in fog environment, Future Gener. Comput. Syst., 98, 635, 10.1016/j.future.2019.01.035 Mistry, 2020, Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges, Mech. Syst. Signal Process., 135, 10.1016/j.ymssp.2019.106382 U. Bodkhe, P. Bhattacharya, S. Tanwar, S. Tyagi, N. Kumar, M.S. Obaidat, BloHosT: Blockchain enabled smart tourism and hospitality management, in: 2019 International Conference on Computer, Information and Telecommunication Systems, CITS, 2019, pp. 1–5. Vora, 2018, BHEEM: A blockchain-based framework for securing electronic health records, 1 Kabra, 2020, MudraChain: Blockchain-based framework for automated cheque clearance in financial institutions, Future Gener. Comput. Syst., 102, 574, 10.1016/j.future.2019.08.035 Tanwar, 2020, Blockchain-based electronic healthcare record system for healthcare 4.0 applications, J. Inf. Secur. Appl., 50 Bhattacharya, 2020, Mobile edge computing-enabled blockchain framework-A survey, 797 Al Hamid, 2017, A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography, IEEE Access, 5, 22313, 10.1109/ACCESS.2017.2757844 Aledhari, 2017, A new cryptography algorithm to protect cloud-based healthcare services, 37 Zhou, 2015, TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems, 2398 S. Kaneriya, M. Chudasama, S. Tanwar, S. Tyagi, N. Kumar, J.J.P.C. Rodrigues, Markov decision-based recommender system for sleep apnea patients, in: ICC 2019 - 2019 IEEE International Conference on Communications, ICC, 2019, pp. 1–6. Mutlag, 2019, Enabling technologies for fog computing in healthcare IoT systems, Future Gener. Comput. Syst., 90, 62, 10.1016/j.future.2018.07.049 Farahani, 2018, Towards fog-driven IoT ehealth: Promises and challenges of IoT in medicine and healthcare, Future Gener. Comput. Syst., 78, 659, 10.1016/j.future.2017.04.036 Elmisery, 2016, A fog based middleware for automated compliance with OECD privacy principles in internet of healthcare things, IEEE Access, 4, 8418, 10.1109/ACCESS.2016.2631546 Rauf, 2018, Security and privacy for IoT and fog computing paradigm, 96 Zhou, 2015, PPDM: A privacy-preserving protocol for cloud-assisted e-healthcare systems, IEEE J. Sel. Top. Sign. Proces., 9, 1332, 10.1109/JSTSP.2015.2427113 Ziglari, 2017, Evaluating cloud deployment models based on security in EHR system, 1 Sanz-Requena, 2015, A cloud-based radiological portal for the patients: It contributing to position the patient as the central axis of the 21st century healthcare cycles, 54 Huang, 2017, A privacy-preserving data sharing solution for mobile healthcare, 260 Solapurkar, 2016, Building secure healthcare services using OAuth 2.0 and JSON web token in IoT cloud scenario, 99 Deshmukh, 2017, Design of cloud security in the EHR for Indian healthcare services, J. King Saud Univ.-Comput. Inf. Sci., 29, 281 Liu, 2016, The yoking-proof-based authentication protocol for cloud-assisted wearable devices, Pers. Ubiquitous Comput., 20, 469, 10.1007/s00779-016-0926-8 Mehta, 2020, Blockchain envisioned UAV networks: Challenges, solutions, and comparisons, Comput. Commun., 151, 518, 10.1016/j.comcom.2020.01.023 Banerjee, 2018, A blockchain future for Internet of Things security: a position paper, Digit. Commun. Netw., 4, 149, 10.1016/j.dcan.2017.10.006 Gordon, 2018, Blockchain technology for healthcare: Facilitating the transition to patient-driven interoperability, Comput. Struct. Biotechnol. J., 16, 224, 10.1016/j.csbj.2018.06.003 Vora, 2017, FAAL: Fog computing-based patient monitoring system for ambient assisted living, 1 Theodouli, 2018, On the design of a blockchain-based system to facilitate healthcare data sharing, 1374 Kshetri, 2017, Blockchain’s roles in strengthening cybersecurity and protecting privacy, Telecommun. Policy, 41, 1027, 10.1016/j.telpol.2017.09.003 Kumar, 2018, Blockchain technology for security issues and challenges in IoT, Procedia Comput. Sci., 132, 1815, 10.1016/j.procs.2018.05.140 Zhang, 2018, Fhirchain: applying blockchain to securely and scalably share clinical data, Comput. Struct. Biotechnol. J., 16, 267, 10.1016/j.csbj.2018.07.004 Sadki, 2014, PPAMH: A novel privacy-preserving approach for mobile healthcare, 209 Kaura, 2018, Big data and machine learning based secure healthcare framework, Procedia Comput. Sci., 132, 1049, 10.1016/j.procs.2018.05.020 Marwan, 2018, Security enhancement in healthcare cloud using machine learning, Procedia Comput. Sci., 127, 388, 10.1016/j.procs.2018.01.136 Chaurasia, 2014, Data mining approach to detect heart diseases, Int. J. Adv. Comput. Sci. Inf. Technol., 2, 56 Vembandasamy, 2015, Heart diseases detection using Naive Bayes algorithm, Int. J. Innov. Sci. Eng. Technol., 2, 441 Kumari, 2013, Classification of diabetes disease using support vector machine, Int. J. Eng. Res. Appl., 3, 1797 Sarwar, 2012, Intelligent Naïve Bayes approach to diagnose diabetes type-2, Int. J. Comput. Appl., 14 Venkatesan, 2015, Performance analysis of decision tree algorithms for breast cancer classification, Indian J. Sci. Technol., 8, 1, 10.17485/ijst/2015/v8i1/84646 Sivakami, 2015, Mining big data: Breast cancer prediction using DT-SVM hybrid model, Int. J. Sci. Eng. Appl. Sci., 1, 418 Kousarrizi, 2012, An experimental comparative study on thyroid disease diagnosis based on feature subset selection and classification, Int. J. Electr. Comput. Sci., 12, 13 Shailaja, 2018, Machine learning in healthcare: A review, 910 Shajahaan, 2013, Application of data mining techniques to model breast cancer data, Int. J. Emerg. Technol. Adv. Eng., 3, 362 Shrivastava, 2013, An overview on data mining approach on breast cancer data, Int. J. Adv. Comput. Res., 3, 256 Srinivas, 2018, Cloud centric authentication for wearable healthcare monitoring system, IEEE Trans. Dependable Secure Comput., 1 Armando, 2005, The AVISPA tool for the automated validation of internet security protocols and applications, 281 Das, 2018, Design of secure and lightweight authentication protocol for wearable devices environment, IEEE J. Biomed. Health Inform., 22, 1310, 10.1109/JBHI.2017.2753464 Liu, 2016, A novel asymmetric three-party based authentication scheme in wearable devices environment, J. Netw. Comput. Appl., 60, 144, 10.1016/j.jnca.2015.10.001 Kumar, 2014, Security issues and privacy concerns in the implementation of wireless body area network, 58 Vora, 2017, Home-based exercise system for patients using IoT enabled smart speaker, 1 Yang, 2017, RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks, 1 Zhang, 2015, Security and privacy for mobile healthcare networks: from a quality of protection perspective, IEEE Wirel. Commun., 22, 104, 10.1109/MWC.2015.7224734 Sathya, 2017, Secured remote health monitoring system, Healthc. Technol. Lett., 4, 228, 10.1049/htl.2017.0033 Hiremath, 2014, Wearable Internet of Things: Concept, architectural components and promises for person-centered healthcare, 304 Boric-Lubecke, 2014, E-healthcare: Remote monitoring, privacy, and security, 1 Mekki, 2018, A privacy-preserving scheme using chaos theory for wireless body area network, 774 Strielkina, 2018, Cybersecurity of healthcare IoT-based systems: Regulation and case-oriented assessment, 67 Kai, 2013, Security and privacy mechanism for health Internet of Things, J. China Univ. Posts Telecommun., 20, 64, 10.1016/S1005-8885(13)60219-8 Williams, 2016, Always connected: The security challenges of the healthcare Internet of Things, 30 Laplante, 2018, Building caring healthcare systems in the Internet of Things, IEEE Syst. J., 12, 3030, 10.1109/JSYST.2017.2662602 Kodali, 2015, An implementation of IoT for healthcare, 411 Kumar, 2015, Ontology based public healthcare system in Internet of Things (IoT), Procedia Comput. Sci., 50, 99, 10.1016/j.procs.2015.04.067 Alsubaei, 2017, Security and privacy in the internet of medical things: Taxonomy and risk assessment, 112 He, 2018, Privacy in the Internet of Things for smart healthcare, IEEE Commun. Mag., 56, 38, 10.1109/MCOM.2018.1700809 Jisha, 2016, RFID based security platform for Internet of Things in health care environment, 1 Huang, 2018, Secure identity-based data sharing and profile matching for mobile healthcare social networks in cloud computing, IEEE Access, 6, 36584, 10.1109/ACCESS.2018.2852784 Sadki, 2015, Towards negotiable privacy policies in mobile healthcare, 94 Iwaya, 2018, mhealth: A privacy threat analysis for public health surveillance systems, 42 Seymour, 2004, Security and interconnection of medical devices to healthcare networks, 131 Martínez, 2013, A semantic framework to protect the privacy of electronic health records with non-numerical attributes, J. Biomed. Inform., 46, 294, 10.1016/j.jbi.2012.11.005 Ray, 2014, A certificate authority (CA)-based cryptographic solution for HIPAA privacy/security regulations, J. King Saud Univ.-Comput. Inf. Sci., 26, 170 Tupakula, 2013, Security techniques for counteracting attacks in mobile healthcare services, Procedia Comput. Sci., 21, 374, 10.1016/j.procs.2013.09.049 Vaast, 2007, Danger is in the eye of the beholders: Social representations of information systems security in healthcare, J. Strateg. Inf. Syst., 16, 130, 10.1016/j.jsis.2007.05.003 Patil, 2014, Big data security and privacy issues in healthcare, 762 Kwon, 2013, Healthcare security strategies for regulatory compliance and data security, 3972 Ghazvini, 2013, Security challenges and success factors of electronic healthcare system, Proc. Technol., 11, 212, 10.1016/j.protcy.2013.12.183 Liu, 2014, E-health PST (privacy, security and trust) mobile networking infrastructure, 1 Li, 2017, Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks, Comput. Netw., 129, 429, 10.1016/j.comnet.2017.03.013 Puppala, 2016, Data security and privacy management in healthcare applications and clinical data warehouse environment, 5 Moosavi, 2015, SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways, Procedia Comput. Sci., 52, 452, 10.1016/j.procs.2015.05.013 Mamun, 2017, A robust authentication model using multi-channel communication for ehealth systems to enhance privacy and security, 255 Kumari, 2019, Fog computing for smart grid systems in the 5G environment: Challenges and solutions, IEEE Wirel. Commun., 26, 47, 10.1109/MWC.2019.1800356 Wu, 2018, A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion, Comput. Electr. Eng., 68, 107, 10.1016/j.compeleceng.2018.03.030 Kumar, 2018, A certificateless aggregate signature scheme for healthcare wireless sensor network, Sustain. Comput. Inform. Syst., 18, 80 Tang, 2018, Enabling trusted and privacy-preserving healthcare services in social media health networks, IEEE Trans. Multimed. Sharma, 2018, Privacy preservation in WSN for healthcare application, Procedia Comput. Sci., 132, 1243, 10.1016/j.procs.2018.05.040 Mohan, 2016, Improved classical cipher for healthcare applications, Procedia Comput. Sci., 93, 742, 10.1016/j.procs.2016.07.285 Ray, 2017, Using attribute-based access control for remote healthcare monitoring, 137 Xu, 2016, An integrated privacy preserving attribute based access control framework, 68 Xiao, 2008, A security model and its application to a distributed decision support system for healthcare, 578 Sahi, 2018, Privacy preservation in e-healthcare environments: State of the art and future directions, IEEE Access, 6, 464, 10.1109/ACCESS.2017.2767561 S., 2017, Adaptive content-aware access control of EPR resource in a healthcare system, 205 Yang, 2018, Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system, Inform. Sci. Tseng, 2016, Designing privacy information protection of electronic medical records, 75 Mohammedi, 2018, Secure and lightweight biometric-based remote patient authentication scheme for home healthcare systems, 1 Shakil, 2017, BAMHealthCloud: A biometric authentication and data management system for healthcare data in cloud, J. King Saud Univ.-Comput. Inf. Sci. Dwivedi, 2003, Towards a practical healthcare information security model for healthcare institutions, 114 Jahan, 2017, Robust fingerprint verification for enhancing security in healthcare system, 1 Chatterjee, 2018, Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment, IEEE Trans. Dependable Secure Comput., 15, 824, 10.1109/TDSC.2016.2616876 He, 2015, Robust biometrics-based authentication scheme for multiserver environment, IEEE Syst. J., 9, 816, 10.1109/JSYST.2014.2301517 Odelu, 2015, An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards, Secur. Commun. Netw., 8, 4136, 10.1002/sec.1330 Khan, 2014, A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks, Procedia Comput. Sci., 34, 511, 10.1016/j.procs.2014.07.058 Song, 2006, SHOES: secure healthcare oriented environement service model, 89 Chen, 2018, Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control, Future Gener. Comput. Syst., 87, 712, 10.1016/j.future.2017.10.022 Ma, 2018, Certificateless searchable public key encryption scheme for mobile healthcare system, Comput. Electr. Eng., 65, 413, 10.1016/j.compeleceng.2017.05.014 Tewari, 2018, Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework, Future Gener. Comput. Syst., 10.1016/j.future.2018.04.027 Strielkina, 2018, Availability models for healthcare IoT systems: Classification and research considering attacks on vulnerabilities, 58 McLeod, 2018, Cyber-analytics: Modeling factors associated with healthcare data breaches, Decis. Support Syst., 108, 57, 10.1016/j.dss.2018.02.007 Rai, 2014, Security and privacy issues in healthcare information system, Int. J. Emerg. Trends Technol. Comput. Sci., 3