Security Attacks and Solutions in Electronic Health (E-health) Systems

被引:0
|
作者
Sherali Zeadally
Jesús Téllez Isaac
Zubair Baig
机构
[1] University of Kentucky,College of Communication and Information
[2] Universidad de Carabobo,Computer Science Department (Facyt)
[3] Edith Cowan University,School of Science and Security Research Institute
来源
关键词
Attack; E-healthcare; Medical record; Security; Threat;
D O I
暂无
中图分类号
学科分类号
摘要
For centuries, healthcare has been a basic service provided by many governments to their citizens. Over the past few decades, we have witnessed a significant transformation in the quality of healthcare services provided by healthcare organizations and professionals. Recent advances have led to the emergence of Electronic Health (E-health), largely made possible by the massive deployment and adoption of information and communication technologies (ICTs). However, cybercriminals and attackers are exploiting vulnerabilities associated primarily with ICTs, causing data breaches of patients’ confidential digital health information records. Here, we review recent security attacks reported for E-healthcare and discuss the solutions proposed to mitigate them. We also identify security challenges that must be addressed by E-health system designers and implementers in the future, to respond to threats that could arise as E-health systems become integrated with technologies such as cloud computing, the Internet of Things, and smart cities.
引用
收藏
相关论文
共 50 条
  • [1] Security Attacks and Solutions in Electronic Health (E-health) Systems
    Zeadally, Sherali
    Isaac, Jesus Tellez
    Baig, Zubair
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (12)
  • [2] Cloud E-health Systems: A Survay on Security Challenges and Solutions
    Kamoona, Mohammed Ali
    Altamimi, Ahmad Mousa
    [J]. 2018 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2018, : 189 - 194
  • [3] A Comprehensive Overview of Security Monitoring Solutions for e-health Systems
    Katt, Basel
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI), 2014, : 364 - 364
  • [4] Privacy and security shield for health information systems (e-health)
    Ulieru, M
    Ionescu, D
    [J]. IECON 2004 - 30TH ANNUAL CONFERENCE OF IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOL. 1, 2004, : 496 - 501
  • [5] Privacy and security shield for health information systems (e-health)
    Ulieru, Mihaela
    Ionescu, Dan
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2006, 21 (03): : 215 - 221
  • [6] Trust assessment of security for e-health systems
    Bahtiyar, Erif
    Caglayan, Mehmet Ufuk
    [J]. ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2014, 13 (03) : 164 - 177
  • [7] Increasing security in wireless e-health systems
    Papalambrou, Andreas
    Gialelis, John
    Serpanos, Dimitrios
    [J]. 2013 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (IEEE ISSPIT 2013), 2013, : 15 - 20
  • [8] Cloud-Based E-Health Systems: Security and Privacy Challenges and Solutions
    Dawoud, Mohanad
    Altilar, D. Turgay
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 861 - 865
  • [9] Security Aspects of e-Health Systems Migration to the Cloud
    Michalas, Antonis
    Paladi, Nicolae
    Gehrmann, Christian
    [J]. 2014 IEEE 16TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM), 2014, : 212 - 218
  • [10] A Security and Privacy Validation Methodology for e-Health Systems
    Amato, Flora
    Casola, Valentina
    Cozzolino, Giovanni
    Benedictis, Alessandra De
    Mazzocca, N. Icola
    Moscato, Francesco
    [J]. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 17 (02)