Skip to main content

Securing Healthcare Data Using Biometric Authentication

  • Conference paper
  • First Online:

Abstract

Preservation of privacy and security of healthcare data is very important in the electronic healthcare domain. Unauthorized access or attacks by hackers can breach or damage sensitive data of patients’ health records that may lead to disclosure of patient’s privacy or may slowdown the system. Hence, it is very crucial to provide and enforce privacy and security of clinical data using a secure authentication system. Biometric-based access control over healthcare data can provide the necessary security and privacy. In recent years, biometric technologies have gained traction in health care applications. This paper proposes a biometric authentication scheme to preserve privacy and security in healthcare systems. In this work, we have employed biometric fingerprint as a trait for user authentication and monitoring access to the healthcare systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Jahan, S., Chowdhury, M.M.H.: Assessment of present health status in Bangladesh and the applicability of e-health in healthcare services: a survey of patients’ expectation toward e-health. World J. Comput. Appl. Technol. 2(6), 121–124 (2014)

    Google Scholar 

  2. Martínez, S., Sánchez, D., Valls, A.: A semantic framework to protect the privacy of electronic health records with non-numerical attributes. J. Biomed. Inform. 46, 294–303 (2013)

    Article  Google Scholar 

  3. Fernández-Alemán, J.L., et al.: Security and privacy in electronic health records: a systematic literature review. J. Biomed. Inform. 46, 541–562 (2013)

    Article  Google Scholar 

  4. HIPAA 1996: US Department of Health & Human Services. https://www.hhs.gov/sites/default/files/privacysummary.pdf

  5. EU Directive 95. http://www.dataprotection.ie/docs/EU_Directive_95/46/EC_Chapter1/92.htm

  6. The Department of Health, Australian Government. PCEHR: Personally Controlled Electronic Health Record System Operator: Annual Report 2012–2013

    Google Scholar 

  7. Chandra, A., Durand, R., Weaver, S.: The uses and potential of biometrics in health care: are consumers and providers ready for it? Int. J. Pharm. Healthc. Mark. 2(1), 22–34 (2008)

    Article  Google Scholar 

  8. Chowdhury, M., Islam, R., Gao, J.: Robust ear biometric recognition using neural network. In: IEEE Conference on Industrial Electronics & Applications, ICIEA 2017, Siem Reap, Cambodia (2017)

    Google Scholar 

  9. Zhang, D., Campbell, J.P., Maltoni, D., Bolle, R.M.: Special issue on biometric systems. IEEE Trans. Syst. Man Cybern. Part C 35(3), 273–275 (2005)

    Article  Google Scholar 

  10. Wayman, J.L., Jain, A.K., Maltoni, D., Maio, D.: Biometric Systems: Technology. Design and Performance Evaluation. Springer, London (2005). https://doi.org/10.1007/b138151

    Book  Google Scholar 

  11. A4 Health Systems: A4 Health Systems Electronic Medical Record Solutions. http://www.a4healthsystems.com/

  12. BCBSRI: Blue Cross Blue Shield of Rhode Island. https://www.bcbsri.com

  13. University of South Alabama Health System. http://www.southalabama.edu/usahealthsystem/

  14. Bao, S.D., Zhang, Y.T., Shen, L.F.: Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems. In: 27th Annual International Conference of the Engineering in Medicine and Biology Society, IEEEEMBS 2005, pp. 2455–2458 (2005)

    Google Scholar 

  15. Poon, C.C.Y., Zhang, Y.-T., Bao, S.-D.: A novel biometrics method to secure wireless body area sensor networks for telemedicine and mhealth. IEEE Commun. Mag. 44(4), 73–81 (2006)

    Article  Google Scholar 

  16. Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.S.: ECG-based key agreement in body sensor networks. In: INFOCOM Workshops 2008, pp. 1–6. IEEE (2008)

    Google Scholar 

  17. Venkatasubramanian, K.K., Banerjee, A., Gupta, S.: Plethysmogram-based secure inter-sensor communication in body area networks. In Military Communications Conference, MILCOM 2008, pp. 1–7. IEEE (2008)

    Google Scholar 

  18. Bao, S.D., Poon, C.C.Y., Shen, L.F., Zhang, Y.T.: Using the timing information of heartbeats as an entity identifier to secure body sensor network. IEEE Trans. Inf. Technol. Biomed. 12(6), 772–779 (2008)

    Article  Google Scholar 

  19. Bao, S.D., Shen, L.F., Zhang, Y.T.: A novel key distribution of body area networks for telemedicine. In: 2004 IEEE International Workshop on Biomedical Circuits and Systems, pp. 1–17–20a (2004)

    Google Scholar 

  20. Bui, F.M., Hatzinakos, D.: Biometric methods for secure communications in body sensor networks: resource-efficient key management and signal-level data scrambling. EURASIP J. Adv. Signal Process. 13, 3142–3156 (2008)

    MATH  Google Scholar 

  21. Challa, N., Cam, H., Sikri, M.: Secure and efficient data transmission over body sensor and wireless networks. EURASIP J. Wirel. Commun. Netw. 3, 707–710 (2008)

    Google Scholar 

  22. Cherukuri, S., Venkatasubramanian, K.K., Gupta, S.K.S.: BioSec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In: Proceedings of the 2003 International Conference on Parallel Processing Workshops, pp. 432–439 (2003)

    Google Scholar 

  23. Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcard-based fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications. ACM, Berkley (2003)

    Google Scholar 

  24. Biohealth Newsletter, vol. 5, December 2007. http://biohealth.gsf.de

  25. Marohn, D.: Biometrics in healthcare. Biometr. Technol. Today 14, 9–11 (2006)

    Article  Google Scholar 

  26. DOH: Review of Methadone treatment in Australia. http://www.health.gov.au/internet/main/publishing.nsf/content/phd-illicit-review-of-methadone-treatment

  27. Jain, A.K., Feng, J., Nandakum, K.: Fingerprint matching. IEEE Comput. Mag. 43, 36–44 (2010)

    Article  Google Scholar 

  28. Chowdhury, M., Gao, J., Islam, R.: Fuzzy logic based filtering for image de-noising. In: IEEE International Conference on Fuzzy Systems, FUZZ-IEEE 2016, Vancouver, Canada, pp. 2372–2376

    Google Scholar 

  29. Jain, A.K., Hong, L., Bolle, R.: On-line fingerprint verification. IEEE Trans. Pattern Anal. Mach. Intell. 19, 302–314 (1997). ISSN 0162-8828

    Article  Google Scholar 

  30. Chikkerur, S., Pankanti, S., Jea, A., Ratha, N., Bolle, R.: Fingerprint representation using localized texture features. In: Proceedings of ICPR 2006, August 2006, pp. 521–524. IEEE Computer Society, Hong Kong (2006). ISSN 1051-4651

    Google Scholar 

  31. Zhao, F., Tang, X.: Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction. Pattern Recognit. 40(4), 1270–1281 (2007)

    Article  Google Scholar 

  32. FVS 2003: Fingerprint Verification System. http://fvs.sourceforge.net

  33. Maeda, T., Matsushita, M., Sasakawa, K.: Identification algorithm using a matching score matrix. IEICE Trans. Inf. Syst. 1(7), 819–824 (2001)

    Google Scholar 

  34. FVC 2002 Fingerprint Database. http://bias.csr.unibo.it/fvc2002/

  35. Zhou, R., Zhong, D., Han, J.: Fingerprint Identification Using SIFT-Based Minutia Descriptors and Improved All Descriptor-Pair Matching. Sensors 13, 3142–3156 (2013). https://doi.org/10.3390/s130303142

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mozammel Chowdhury .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jahan, S., Chowdhury, M., Islam, R., Chaudhry, J. (2018). Securing Healthcare Data Using Biometric Authentication. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds) Security and Privacy in Communication Networks. SecureComm 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 239. Springer, Cham. https://doi.org/10.1007/978-3-319-78816-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-78816-6_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-78815-9

  • Online ISBN: 978-3-319-78816-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics