Security Attacks and Solutions in Electronic Health (E-health) Systems

被引:0
|
作者
Sherali Zeadally
Jesús Téllez Isaac
Zubair Baig
机构
[1] University of Kentucky,College of Communication and Information
[2] Universidad de Carabobo,Computer Science Department (Facyt)
[3] Edith Cowan University,School of Science and Security Research Institute
来源
关键词
Attack; E-healthcare; Medical record; Security; Threat;
D O I
暂无
中图分类号
学科分类号
摘要
For centuries, healthcare has been a basic service provided by many governments to their citizens. Over the past few decades, we have witnessed a significant transformation in the quality of healthcare services provided by healthcare organizations and professionals. Recent advances have led to the emergence of Electronic Health (E-health), largely made possible by the massive deployment and adoption of information and communication technologies (ICTs). However, cybercriminals and attackers are exploiting vulnerabilities associated primarily with ICTs, causing data breaches of patients’ confidential digital health information records. Here, we review recent security attacks reported for E-healthcare and discuss the solutions proposed to mitigate them. We also identify security challenges that must be addressed by E-health system designers and implementers in the future, to respond to threats that could arise as E-health systems become integrated with technologies such as cloud computing, the Internet of Things, and smart cities.
引用
收藏
相关论文
共 50 条
  • [21] Electronic Health (e-Health): a conceptual framework for implementation in health services
    Diaz de Leon-Castaneda, Christian
    [J]. GACETA MEDICA DE MEXICO, 2019, 155 (02): : 176 - 183
  • [22] Method of Traffic Monitoring for DDoS Attacks Detection in e-Health systems and networks
    Zaliskyi, Maksym
    Odarchenko, Roman
    Gnatyuk, Sergiy
    Petrova, Yuliia
    Chaplits, Anastasiia
    [J]. PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON INFORMATICS & DATA- DRIVEN MEDICINE (IDDM 2018), 2018, 2255 : 193 - 204
  • [23] Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions
    Pussewalage, Harsha S. Gardiyawasam
    Oleshchuk, Vladimir A.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (06) : 1161 - 1173
  • [24] Security Improvement and Privacy Preservation in E-Health
    Kishore, Pushkar
    Barisal, Swadhin Kumar
    Kumar, Kulamala Vinod
    Mohapatra, Durga Prasad
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [25] Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing
    Chenthara, Shekha
    Ahmed, Khandakar
    Wang, Hua
    Whittaker, Frank
    [J]. IEEE ACCESS, 2019, 7 : 74361 - 74382
  • [26] e-Health: An Introduction to the Challenges of Privacy and Security
    Jara, H. R.
    Schafir, E.
    [J]. 2014 IEEE CENTRAL AMERICA AND PANAMA CONVENTION (CONCAPAN XXXIV), 2014,
  • [27] Data security in e-health monitoring system
    Abhishek, B.
    Panjanathan, Rukmani
    Sarobin, Vergin Raja
    Raja, Benson Edwin
    Narendra, Modigari
    [J]. MATERIALS TODAY-PROCEEDINGS, 2022, 62 : 4620 - 4628
  • [28] Sensor network security for pervasive e-health
    Garcia-Morchon, Oscar
    Falck, Thomas
    Wehrle, Klaus
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (11) : 1257 - 1273
  • [29] On managing security in smart e-health applications
    Marulli, Fiammetta
    Bellini, Emanuele
    Marrone, Stefano
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2021, 24 (06) : 639 - 652
  • [30] Ensuring Privacy and Security in E-Health Records
    Vora, Jayneel
    Italiya, Prit
    Tanwar, Sudeep
    Tyagi, Sudhanshu
    Kumar, Neeraj
    Obaidat, M. S.
    Hsiao, K-F.
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2018), 2018, : 192 - 196