A Survey on Security and Privacy Issues in Modern Healthcare Systems

2021 ◽  
Vol 2 (3) ◽  
pp. 1-44
Author(s):  
Akm Iqtidar Newaz ◽  
Amit Kumar Sikder ◽  
Mohammad Ashiqur Rahman ◽  
A. Selcuk Uluagac

Recent advancements in computing systems and wireless communications have made healthcare systems more efficient than before. Modern healthcare devices can monitor and manage different health conditions of patients automatically without any manual intervention from medical professionals. Additionally, the use of implantable medical devices, body area networks, and Internet of Things technologies in healthcare systems improve the overall patient monitoring and treatment process. However, these systems are complex in software and hardware, and optimizing between security, privacy, and treatment is crucial for healthcare systems because any security or privacy violation can lead to severe effects on patients’ treatments and overall health conditions. Indeed, the healthcare domain is increasingly facing security challenges and threats due to numerous design flaws and the lack of proper security measures in healthcare devices and applications. In this article, we explore various security and privacy threats to healthcare systems and discuss the consequences of these threats. We present a detailed survey of different potential attacks and discuss their impacts. Furthermore, we review the existing security measures proposed for healthcare systems and discuss their limitations. Finally, we conclude the article with future research directions toward securing healthcare systems against common vulnerabilities.

2021 ◽  
Vol 13 (8) ◽  
pp. 4206
Author(s):  
Jamilya Nurgazina ◽  
Udsanee Pakdeetrakulwong ◽  
Thomas Moser ◽  
Gerald Reiner

The lack of transparency and traceability in food supply chains (FSCs) is raising concerns among consumers and stakeholders about food information credibility, food quality, and safety. Insufficient records, a lack of digitalization and standardization of processes, and information exchange are some of the most critical challenges, which can be tackled with disruptive technologies, such as the Internet of Things (IoT), blockchain, and distributed ledger technologies (DLTs). Studies provide evidence that novel technological and sustainable practices in FSCs are necessary. This paper aims to describe current practical applications of DLTs and IoT in FSCs, investigating the challenges of implementation, and potentials for future research directions, thus contributing to achievement of the United Nations’ Sustainable Development Goals (SDGs). Within a systematic literature review, the content of 69 academic publications was analyzed, describing aspects of implementation and measures to address the challenges of scalability, security, and privacy of DLT, and IoT solutions. The challenges of high costs, standardization, regulation, interoperability, and energy consumption of DLT solutions were also classified as highly relevant, but were not widely addressed in literature. The application of DLTs in FSCs can potentially contribute to 6 strategic SDGs, providing synergies and possibilities for more sustainable, traceable, and transparent FSCs.


2022 ◽  
Author(s):  
Farkhanda Zafar ◽  
Hasan Ali Khattak ◽  
Moayad Aloqaily ◽  
Rasheed Hussain

Owing to the advancements in communication and computation technologies, the dream of commercialized connected and autonomous cars is becoming a reality. However, among other challenges such as environmental pollution, cost, maintenance, security, and privacy, the ownership of vehicles (especially for Autonomous Vehicles (AV)) is the major obstacle in the realization of this technology at the commercial level. Furthermore, the business model of pay-as-you-go type services further attracts the consumer because there is no need for upfront investment. In this vein, the idea of car-sharing ( aka carpooling) is getting ground due to, at least in part, its simplicity, cost-effectiveness, and affordable choice of transportation. Carpooling systems are still in their infancy and face challenges such as scheduling, matching passengers interests, business model, security, privacy, and communication. To date, a plethora of research work has already been done covering different aspects of carpooling services (ranging from applications to communication and technologies); however, there is still a lack of a holistic, comprehensive survey that can be a one-stop-shop for the researchers in this area to, i) find all the relevant information, and ii) identify the future research directions. To fill these research challenges, this paper provides a comprehensive survey on carpooling in autonomous and connected vehicles and covers architecture, components, and solutions, including scheduling, matching, mobility, pricing models of carpooling. We also discuss the current challenges in carpooling and identify future research directions. This survey is aimed to spur further discussion among the research community for the effective realization of carpooling.


Cyber Crime ◽  
2013 ◽  
pp. 918-935
Author(s):  
Xunhua Wang ◽  
Ralph Grove ◽  
M. Hossain Heydari

In recent years, computer and network-based voting technologies have been gradually adopted for various elections. However, due to the fragile nature of electronic ballots and voting software, computer voting has posed serious security challenges. This chapter studies the security of computer voting and focuses on a cryptographic solution based on mix-nets. Like traditional voting systems, mix-net-based computer voting provides voter privacy and prevents vote selling/buying and vote coercion. Unlike traditional voting systems, mix-net-based computer voting has several additional advantages: 1) it offers vote verifiability, allowing individual voters to directly verify whether their votes have been counted and counted correctly; 2) it allows voters to check the behavior of potentially malicious computer voting machines and thus does not require voters to blindly trust computer voting machines. In this chapter, we give the full details of the building blocks for the mix-net-based computer voting scheme, including semantically secure encryption, threshold decryption, mix-net, and robust mix-net. Future research directions on secure electronic voting are also discussed.


Author(s):  
Abraham Pouliakis ◽  
Niki Margari ◽  
Effrosyni Karakitsou ◽  
Stavros Archondakis ◽  
Petros Karakitsos

Cytopathology became a popular since George Papanicolaou proposed the famous test Pap 60 years ago. Today cytopathology laboratories use the microscope as primary diagnostic device; however modern laboratories host numerous modalities for molecular tests and exchange data via networks; additionally, there are imaging systems producing pictures and virtual slides at enormous sizes and volume. The latest technological developments for cloud computing, big data and mobile devices has changed the way enterprises, institutions and people use computerized systems. In this chapter are explored potential applications of these technologies in the cytopathology laboratory including: data storage, laboratory information systems, population screening programs, quality control and assurance, education and proficiency testing, e-learning, tele-consultation, primary diagnosis and research. The impact of their adoption on the daily workflow is highlighted, possible shortcomings especially for security and privacy issues are identified and future research directions are presented.


2014 ◽  
Vol 10 (2) ◽  
pp. 78-95 ◽  
Author(s):  
Karen Smith ◽  
Francis Mendez ◽  
Garry L. White

A model is developed and tested to explain the relationships among narcissism, privacy concern, vigilance, and exposure to risk on Facebook, with age and gender as controlling variables. Two important constructs are conceptualized and measured in this research. Facebook exposure is defined as the opportunity for privacy and security breaches on Facebook. Facebook vigilance is the extent to which consumers stay focused, attentive, and alert to potential security and privacy risks on Facebook by restricting who can access and post to their Facebook accounts. Data from a survey of 286 adult Facebook users in the U.S. support the hypothesized relationships in the model. Results suggest that narcissism is related to increased Facebook exposure and lower Facebook vigilance, despite greater stated concern for privacy and security. Furthermore, females and younger users have greater risk exposure compared to males and older users. Implications of the findings and future research directions are discussed.


Author(s):  
R. Babu ◽  
K. Jayashree ◽  
R. Abirami

Internet of Things (IoT) enables inters connectivity among devices and platforms. IoT devices such as sensors, or embedded systems offer computational, storage, and networking resources and the existence of these resources permits to move the execution of IoT applications to the edge of the network and it is known as fog computing. It is able to handle billions of Internet-connected devices and is well situated for real-time big data analytics and provides advantages in advertising and personal computing. The main issues in fog computing includes fog networking, QoS, interfacing and programming model, computation offloading, accounting, billing and monitoring, provisioning and resource management, security and privacy. A particular research challenge is the Quality of Service metric for fog services. Thus, this paper gives a survey of cloud computing, discusses the QoS metrics, and the future research directions in fog computing.


2012 ◽  
Vol 100 (12) ◽  
pp. 3172-3186 ◽  
Author(s):  
Alireza Attar ◽  
Helen Tang ◽  
Athanasios V. Vasilakos ◽  
F. Richard Yu ◽  
Victor C. M. Leung

Energies ◽  
2021 ◽  
Vol 15 (1) ◽  
pp. 193
Author(s):  
Yohannes T. Aklilu ◽  
Jianguo Ding

Power generation, distribution, transmission, and consumption face ongoing challenges such as smart grid management, control, and operation, resulting from high energy demand, the diversity of energy sources, and environmental or regulatory issues. This paper provides a comprehensive overview of blockchain-based solutions for smart grid management, control, and operations. We systematically summarize existing work on the use and implementation of blockchain technology in various smart grid domains. The paper compares related reviews and highlights the challenges in the management, control, and operation for a blockchain-based smart grid as well as future research directions in the five categories: collaboration among stakeholders; data analysis and data management; control of grid imbalances; decentralization of grid management and operations; and security and privacy. All these aspects have not been covered in previous reviews.


2019 ◽  
pp. 206-225
Author(s):  
Karen H. Smith ◽  
Francis A. Mendez ◽  
Garry L. White

A model is developed and tested to explain the relationships among narcissism, privacy concern, vigilance, and exposure to risk on Facebook, with age and gender as controlling variables. Two important constructs are conceptualized and measured in this research. Facebook exposure is defined as the opportunity for privacy and security breaches on Facebook. Facebook vigilance is the extent to which consumers stay focused, attentive, and alert to potential security and privacy risks on Facebook by restricting who can access and post to their Facebook accounts. Data from a survey of 286 adult Facebook users in the U.S. support the hypothesized relationships in the model. Results suggest that narcissism is related to increased Facebook exposure and lower Facebook vigilance, despite greater stated concern for privacy and security. Furthermore, females and younger users have greater risk exposure compared to males and older users. Implications of the findings and future research directions are discussed.


Sign in / Sign up

Export Citation Format

Share Document