Security of Cloud based Medical of Internet Things (MIoTs)

In this digital era expectations for medical quality have increased. As the number of patients continues to increase, conventional health care methods are having to deal with new complications. In light of these observations, researchers suggested a hybrid combination of conventional health care methods with IoT technology and develop MIoT. The goal of IoMT is to ensure that patients can respond more effectively and efficiently to their treatment. But preserving user privacy is a critical issue when it comes to collecting and handling highly sensitive personal health data. However, IoMTs have limited processing power; hence, they can only implement minimal security techniques. Consequently, throughout the health data transfer through MIoT, patient’s data is at risk of data leakage. This manuscript per the authors emphasizes the need of implementing suitable security measures to increase the IoMT's resilience to cyberattacks. Additionally, this manuscript per the authors discusses the main security and privacy issues associated with IoMT and provide an overview of existing techniques.

Web Services ◽  
2019 ◽  
pp. 1393-1410
Author(s):  
Alaa Hussein Al-Hamami ◽  
Rafal A. Al-Khashab

Cloud computing provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructure. These features make cloud computing more attractive to users and intruders. It needs more and complex security measures to protect user privacy and data centers. The main concern in this chapter is security, privacy and trust. This chapter will give a discussion and a suggestion for using cloud computing to preserve security and privacy. The malicious hacker and other threats are considering the major cause of leaking security of the personal cloud due to centralized location and remote accesses to the cloud. According to attacks, a centralized location can be easier target rather than several goals and remote access is insecure technologies which offer a boundary of options for attackers to infiltrate enterprises. The biggest concern is attackers that will use the remote connection as a jumping point to get deeper into an organization.


2019 ◽  
Author(s):  
Xiaochen Zheng ◽  
Shengjing Sun ◽  
Raghava Rao Mukkamala ◽  
Ravi Vatrapu ◽  
Joaquín Ordieres-Meré

BACKGROUND Huge amounts of health-related data are generated every moment with the rapid development of Internet of Things (IoT) and wearable technologies. These big health data contain great value and can bring benefit to all stakeholders in the health care ecosystem. Currently, most of these data are siloed and fragmented in different health care systems or public and private databases. It prevents the fulfillment of intelligent health care inspired by these big data. Security and privacy concerns and the lack of ensured authenticity trails of data bring even more obstacles to health data sharing. With a decentralized and consensus-driven nature, distributed ledger technologies (DLTs) provide reliable solutions such as blockchain, Ethereum, and IOTA Tangle to facilitate the health care data sharing. OBJECTIVE This study aimed to develop a health-related data sharing system by integrating IoT and DLT to enable secure, fee-less, tamper-resistant, highly-scalable, and granularly-controllable health data exchange, as well as build a prototype and conduct experiments to verify the feasibility of the proposed solution. METHODS The health-related data are generated by 2 types of IoT devices: wearable devices and stationary air quality sensors. The data sharing mechanism is enabled by IOTA’s distributed ledger, the Tangle, which is a directed acyclic graph. Masked Authenticated Messaging (MAM) is adopted to facilitate data communications among different parties. Merkle Hash Tree is used for data encryption and verification. RESULTS A prototype system was built according to the proposed solution. It uses a smartwatch and multiple air sensors as the sensing layer; a smartphone and a single-board computer (Raspberry Pi) as the gateway; and a local server for data publishing. The prototype was applied to the remote diagnosis of tremor disease. The results proved that the solution could enable costless data integrity and flexible access management during data sharing. CONCLUSIONS DLT integrated with IoT technologies could greatly improve the health-related data sharing. The proposed solution based on IOTA Tangle and MAM could overcome many challenges faced by other traditional blockchain-based solutions in terms of cost, efficiency, scalability, and flexibility in data access management. This study also showed the possibility of fully decentralized health data sharing by replacing the local server with edge computing devices.


10.2196/19487 ◽  
2020 ◽  
Vol 8 (8) ◽  
pp. e19487
Author(s):  
Yuan Wang ◽  
Yuqiao Liu ◽  
Yancui Shi ◽  
Yanjun Yu ◽  
Jucheng Yang

Background Virtual hospital apps are mobile apps that offer functionalities of online consultation, medical guidance, health community forums, referrals, outpatient appointments or virtual hospital-to-home care services. With an increasing number of online medical and health care consulting services, virtual hospital apps have made health care more accessible and fairer for all, especially in China. However, they have occurred without control or regulation. User evaluation can provide directions to help apps optimize identification, lower risks, and guarantee service quality. Objective We aimed to conduct a systematic search for virtual hospital apps in China. To get a global view, virtual hospital apps were assessed and characterized by means of quantitative analysis. To get a local view, we conducted a content feedback analysis to explore user requirements, expectations, and preferences. Methods A search was conducted of the most popular Apple and Android app stores in China. We characterized and verified virtual hospital apps and grouped apps according to quantification analysis. We then crawled apps and paid attention to corresponding reviews to incorporate users’ involvement, and then performed aspect-based content labeling and analysis using an inductive approach. Results A total of 239 apps were identified in the virtual hospital app markets in China, and 2686 informative corresponding reviews were analyzed. The evidence showed that usefulness and ease of use were vital facts for engagement. Users were likely to trust a consulting service with a high number of downloads. Furthermore, users expected frequently used apps with more optimization to improve virtual service. We characterized apps according to 4 key features: (1) app functionalities, including online doctor consultation, in-app purchases, tailored education, and community forums; (2) security and privacy, including user data management and user privacy; (3) health management, including health tracking, reminders, and notifications; and (4) technical aspects, including user interface and equipment connection. Conclusions Virtual hospitals relying on the mobile internet are growing rapidly. A large number of virtual hospital apps are available and accessible to a growing number of people. Evidence from this systematic search can help various types of virtual hospital models enhance virtual health care experiences, go beyond offline hospitals, and continuously meet the needs of individual end users.


2020 ◽  
Vol 10 (12) ◽  
pp. 4102 ◽  
Author(s):  
Lo’ai Tawalbeh ◽  
Fadi Muheidat ◽  
Mais Tawalbeh ◽  
Muhannad Quwaider

Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that IoT is facing. In this work, we are exploring the background of IoT systems and security measures, and identifying (a) different security and privacy issues, (b) approaches used to secure the components of IoT-based environments and systems, (c) existing security solutions, and (d) the best privacy models necessary and suitable for different layers of IoT driven applications. In this work, we proposed a new IoT layered model: generic and stretched with the privacy and security components and layers identification. The proposed cloud/edge supported IoT system is implemented and evaluated. The lower layer represented by the IoT nodes generated from the Amazon Web Service (AWS) as Virtual Machines. The middle layer (edge) implemented as a Raspberry Pi 4 hardware kit with support of the Greengrass Edge Environment in AWS. We used the cloud-enabled IoT environment in AWS to implement the top layer (the cloud). The security protocols and critical management sessions were between each of these layers to ensure the privacy of the users’ information. We implemented security certificates to allow data transfer between the layers of the proposed cloud/edge enabled IoT model. Not only is the proposed system model eliminating possible security vulnerabilities, but it also can be used along with the best security techniques to countermeasure the cybersecurity threats facing each one of the layers; cloud, edge, and IoT.


2018 ◽  
Author(s):  
Leming Zhou ◽  
Bambang Parmanto ◽  
Zakiy Alfikri ◽  
Jie Bao

BACKGROUND On many websites and mobile apps for personal health data collection and management, there are security features and privacy policies available for users. Users sometimes are given an opportunity to make selections in a security setting page; however, it is challenging to make informed selections in these settings for users who do not have much education in information security as they may not precisely know the meaning of certain terms mentioned in the privacy policy or understand the consequences of their selections in the security and privacy settings. OBJECTIVE The aim of this study was to demonstrate several commonly used security features such as encryption, user authentication, and access control in a mobile app and to determine whether this brief security education is effective in encouraging users to choose stronger security measures to protect their personal health data. METHODS A mobile app named SecSim (Security Simulator) was created to demonstrate the consequences of choosing different options in security settings. A group of study participants was recruited to conduct the study. These participants were asked to make selections in the security settings before and after they viewed the consequences of security features. At the end of the study, a brief interview was conducted to determine the reason for their selections in the security settings. Their selections before and after the security education were compared in order to determine the effectiveness of the security education. The usability of the app was also evaluated. RESULTS In total, 66 participants finished the study and provided their answers in the app and during a brief interview. The comparison between the pre- and postsecurity education selection in security settings indicated that 21% (14/66) to 32% (21/66) participants chose a stronger security measure in text encryption, access control, and image encryption; 0% (0/66) to 2% (1/66) participants chose a weaker measure in these 3 security features; and the remainder kept their original selections. Several demographic characteristics such as marital status, years of experience using mobile devices, income, employment, and health status showed an impact on the setting changes. The usability of the app was good. CONCLUSIONS The study results indicate that a significant percentage of users (21%-32%) need guidance to make informed selection in security settings. If websites and mobile apps can provide embedded security education for users to understand the consequences of their security feature selection and the meaning of commonly used security features, it may help users to make the best choices in terms of security settings. Our mobile app, SecSim, offers a unique approach for mobile app users to understand commonly used security features. This app may be incorporated into other apps or be used before users make selections in their security settings.


2016 ◽  
pp. 2402-2418
Author(s):  
Alaa Hussein Al-Hamami ◽  
Rafal A Al-Khashab

Cloud computing provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructure. These features make cloud computing more attractive to users and intruders. It needs more and complex security measures to protect user privacy and data centers. The main concern in this chapter is security, privacy and trust. This chapter will give a discussion and a suggestion for using cloud computing to preserve security and privacy. The malicious hacker and other threats are considering the major cause of leaking security of the personal cloud due to centralized location and remote accesses to the cloud. According to attacks, a centralized location can be easier target rather than several goals and remote access is insecure technologies which offer a boundary of options for attackers to infiltrate enterprises. The biggest concern is attackers that will use the remote connection as a jumping point to get deeper into an organization.


Author(s):  
Alaa Hussein Al-Hamami ◽  
Rafal A Al-Khashab

Cloud computing provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructure. These features make cloud computing more attractive to users and intruders. It needs more and complex security measures to protect user privacy and data centers. The main concern in this chapter is security, privacy and trust. This chapter will give a discussion and a suggestion for using cloud computing to preserve security and privacy. The malicious hacker and other threats are considering the major cause of leaking security of the personal cloud due to centralized location and remote accesses to the cloud. According to attacks, a centralized location can be easier target rather than several goals and remote access is insecure technologies which offer a boundary of options for attackers to infiltrate enterprises. The biggest concern is attackers that will use the remote connection as a jumping point to get deeper into an organization.


2021 ◽  
Author(s):  
Reza Assadi ◽  
Ghazal GHasemi

BACKGROUND Health is the most valuable property of all humans, and for long, scientists have had to cope with a tremendous amount of health-related data globally. Recording of health data has always faced challenges concerning privacy, accuracy, and interoperability. So in this study, we intended to summarize health records to a minimal and abridged string that can be easily reused and shared among health systems. For this purpose, we attempted to use various coding systems and combine them with disability codes defined in Global Burden of Disease (GBD) studies to reach a unique method for presenting health records. However, this type of data is prone to disclosing personal information and should be secured safely. Today, one of the safest methods for storing and sharing data is a blockchain network that makes data transactions safe and secure. OBJECTIVE Ultimately, we have envisaged a global network of interconnected health data communicating through approved protocols, namely the Internet of Health data (IoHd). METHODS In other words, we propose a decentralized, blockchain-based network where EHRs (Electronic Health Records) are stored in the form of a hashed health code, as explained earlier. The distributed system connects the health-related data among the trusted nodes, leading to the emergence of IoH. RESULTS This data would be hashed health codes stored on the blockchain, so all healthcare professionals and health-related corporations/institutions/companies may access this network using their login information. The network consists of three sub-networks, the private (for health wallets), the permissioned (for care wallets), and the or pseudonymous (for data wallets). CONCLUSIONS Considering blockchain technology's high security and privacy, it would be possible to safely and widely provide relevant health information for caregivers, healthcare professionals, research centers, big data studies, and artificial intelligence platforms to offer better access, data storage, care provision, data transfer, and surveillance.


2020 ◽  
Author(s):  
Yuan Wang ◽  
Yuqiao Liu ◽  
Yancui Shi ◽  
Yanjun Yu ◽  
Jucheng Yang

BACKGROUND Virtual hospital apps are mobile apps that offer functionalities of online consultation, medical guidance, health community forums, referrals, outpatient appointments or virtual hospital-to-home care services. With an increasing number of online medical and health care consulting services, virtual hospital apps have made health care more accessible and fairer for all, especially in China. However, they have occurred without control or regulation. User evaluation can provide directions to help apps optimize identification, lower risks, and guarantee service quality. OBJECTIVE We aimed to conduct a systematic search for virtual hospital apps in China. To get a global view, virtual hospital apps were assessed and characterized by means of quantitative analysis. To get a local view, we conducted a content feedback analysis to explore user requirements, expectations, and preferences. METHODS A search was conducted of the most popular Apple and Android app stores in China. We characterized and verified virtual hospital apps and grouped apps according to quantification analysis. We then crawled apps and paid attention to corresponding reviews to incorporate users’ involvement, and then performed aspect-based content labeling and analysis using an inductive approach. RESULTS A total of 239 apps were identified in the virtual hospital app markets in China, and 2686 informative corresponding reviews were analyzed. The evidence showed that usefulness and ease of use were vital facts for engagement. Users were likely to trust a consulting service with a high number of downloads. Furthermore, users expected frequently used apps with more optimization to improve virtual service. We characterized apps according to 4 key features: (1) app functionalities, including online doctor consultation, in-app purchases, tailored education, and community forums; (2) security and privacy, including user data management and user privacy; (3) health management, including health tracking, reminders, and notifications; and (4) technical aspects, including user interface and equipment connection. CONCLUSIONS Virtual hospitals relying on the mobile internet are growing rapidly. A large number of virtual hospital apps are available and accessible to a growing number of people. Evidence from this systematic search can help various types of virtual hospital models enhance virtual health care experiences, go beyond offline hospitals, and continuously meet the needs of individual end users.


2019 ◽  
Author(s):  
Ketan Paranjape ◽  
Josip Car ◽  
Mitchell Parker ◽  
David Houlding

BACKGROUND Healthcare is undergoing a transformation worldwide1. In many developed countries, mature but antiqued national healthcare services are being burdened with a growing aging population, changes in payment reforms, worker shortage and rising costs2. Combined with a surge in innovative technologies like Artificial Intelligence (AI)3 and blockchain4 which can help with automating medical record mining to provide a more accurate diagnosis5 or reduce errors in medical practice6 by providing accurate and tailored treatment while reducing the financial burden, today’s healthcare systems are ready for change. After success in industries like financial services7 and retail8, if blockchain can be scaled and moved into the mainstream in healthcare, it can help alleviate the many concerns with security and privacy of health data and help stitch together a longitudinal history of health data that is fragmented and locked away in multiple silos today. Sophisticated use of blockchain technology will contribute to improving health outcomes, improved health care quality, and lower health care costs – the three overarching aims that the U.S. is striving to achieve (also known as the “Triple aim”)9. OBJECTIVE This paper aims to provide a primer on blockchain technology, and implementation considerations for blockchain at healthcare institutions. METHODS Systematic literature survey, conversation with experts. RESULTS After extensive research and interviews, we developed a primer and high level implementation guide for healthcare systems exploring the use of blockchain technology. CONCLUSIONS The use of blockchain technology in healthcare is at a promising stage in development but Blockchain-based applications are yet to be demonstrated as a viable platform for exchanging and reviewing information. Healthcare systems should be cautiously optimistic regarding the potential of blockchain and do a thorough business and technical diligence that is driven by targeted use cases (s) to be successful.


Sign in / Sign up

Export Citation Format

Share Document