Abstract
Preservation of privacy and security of healthcare data is very important in the electronic healthcare domain. Unauthorized access or attacks by hackers can breach or damage sensitive data of patients’ health records that may lead to disclosure of patient’s privacy or may slowdown the system. Hence, it is very crucial to provide and enforce privacy and security of clinical data using a secure authentication system. Biometric-based access control over healthcare data can provide the necessary security and privacy. In recent years, biometric technologies have gained traction in health care applications. This paper proposes a biometric authentication scheme to preserve privacy and security in healthcare systems. In this work, we have employed biometric fingerprint as a trait for user authentication and monitoring access to the healthcare systems.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Jahan, S., Chowdhury, M.M.H.: Assessment of present health status in Bangladesh and the applicability of e-health in healthcare services: a survey of patients’ expectation toward e-health. World J. Comput. Appl. Technol. 2(6), 121–124 (2014)
Martínez, S., Sánchez, D., Valls, A.: A semantic framework to protect the privacy of electronic health records with non-numerical attributes. J. Biomed. Inform. 46, 294–303 (2013)
Fernández-Alemán, J.L., et al.: Security and privacy in electronic health records: a systematic literature review. J. Biomed. Inform. 46, 541–562 (2013)
HIPAA 1996: US Department of Health & Human Services. https://www.hhs.gov/sites/default/files/privacysummary.pdf
EU Directive 95. http://www.dataprotection.ie/docs/EU_Directive_95/46/EC_Chapter1/92.htm
The Department of Health, Australian Government. PCEHR: Personally Controlled Electronic Health Record System Operator: Annual Report 2012–2013
Chandra, A., Durand, R., Weaver, S.: The uses and potential of biometrics in health care: are consumers and providers ready for it? Int. J. Pharm. Healthc. Mark. 2(1), 22–34 (2008)
Chowdhury, M., Islam, R., Gao, J.: Robust ear biometric recognition using neural network. In: IEEE Conference on Industrial Electronics & Applications, ICIEA 2017, Siem Reap, Cambodia (2017)
Zhang, D., Campbell, J.P., Maltoni, D., Bolle, R.M.: Special issue on biometric systems. IEEE Trans. Syst. Man Cybern. Part C 35(3), 273–275 (2005)
Wayman, J.L., Jain, A.K., Maltoni, D., Maio, D.: Biometric Systems: Technology. Design and Performance Evaluation. Springer, London (2005). https://doi.org/10.1007/b138151
A4 Health Systems: A4 Health Systems Electronic Medical Record Solutions. http://www.a4healthsystems.com/
BCBSRI: Blue Cross Blue Shield of Rhode Island. https://www.bcbsri.com
University of South Alabama Health System. http://www.southalabama.edu/usahealthsystem/
Bao, S.D., Zhang, Y.T., Shen, L.F.: Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems. In: 27th Annual International Conference of the Engineering in Medicine and Biology Society, IEEEEMBS 2005, pp. 2455–2458 (2005)
Poon, C.C.Y., Zhang, Y.-T., Bao, S.-D.: A novel biometrics method to secure wireless body area sensor networks for telemedicine and mhealth. IEEE Commun. Mag. 44(4), 73–81 (2006)
Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.S.: ECG-based key agreement in body sensor networks. In: INFOCOM Workshops 2008, pp. 1–6. IEEE (2008)
Venkatasubramanian, K.K., Banerjee, A., Gupta, S.: Plethysmogram-based secure inter-sensor communication in body area networks. In Military Communications Conference, MILCOM 2008, pp. 1–7. IEEE (2008)
Bao, S.D., Poon, C.C.Y., Shen, L.F., Zhang, Y.T.: Using the timing information of heartbeats as an entity identifier to secure body sensor network. IEEE Trans. Inf. Technol. Biomed. 12(6), 772–779 (2008)
Bao, S.D., Shen, L.F., Zhang, Y.T.: A novel key distribution of body area networks for telemedicine. In: 2004 IEEE International Workshop on Biomedical Circuits and Systems, pp. 1–17–20a (2004)
Bui, F.M., Hatzinakos, D.: Biometric methods for secure communications in body sensor networks: resource-efficient key management and signal-level data scrambling. EURASIP J. Adv. Signal Process. 13, 3142–3156 (2008)
Challa, N., Cam, H., Sikri, M.: Secure and efficient data transmission over body sensor and wireless networks. EURASIP J. Wirel. Commun. Netw. 3, 707–710 (2008)
Cherukuri, S., Venkatasubramanian, K.K., Gupta, S.K.S.: BioSec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In: Proceedings of the 2003 International Conference on Parallel Processing Workshops, pp. 432–439 (2003)
Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcard-based fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications. ACM, Berkley (2003)
Biohealth Newsletter, vol. 5, December 2007. http://biohealth.gsf.de
Marohn, D.: Biometrics in healthcare. Biometr. Technol. Today 14, 9–11 (2006)
DOH: Review of Methadone treatment in Australia. http://www.health.gov.au/internet/main/publishing.nsf/content/phd-illicit-review-of-methadone-treatment
Jain, A.K., Feng, J., Nandakum, K.: Fingerprint matching. IEEE Comput. Mag. 43, 36–44 (2010)
Chowdhury, M., Gao, J., Islam, R.: Fuzzy logic based filtering for image de-noising. In: IEEE International Conference on Fuzzy Systems, FUZZ-IEEE 2016, Vancouver, Canada, pp. 2372–2376
Jain, A.K., Hong, L., Bolle, R.: On-line fingerprint verification. IEEE Trans. Pattern Anal. Mach. Intell. 19, 302–314 (1997). ISSN 0162-8828
Chikkerur, S., Pankanti, S., Jea, A., Ratha, N., Bolle, R.: Fingerprint representation using localized texture features. In: Proceedings of ICPR 2006, August 2006, pp. 521–524. IEEE Computer Society, Hong Kong (2006). ISSN 1051-4651
Zhao, F., Tang, X.: Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction. Pattern Recognit. 40(4), 1270–1281 (2007)
FVS 2003: Fingerprint Verification System. http://fvs.sourceforge.net
Maeda, T., Matsushita, M., Sasakawa, K.: Identification algorithm using a matching score matrix. IEICE Trans. Inf. Syst. 1(7), 819–824 (2001)
FVC 2002 Fingerprint Database. http://bias.csr.unibo.it/fvc2002/
Zhou, R., Zhong, D., Han, J.: Fingerprint Identification Using SIFT-Based Minutia Descriptors and Improved All Descriptor-Pair Matching. Sensors 13, 3142–3156 (2013). https://doi.org/10.3390/s130303142
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Jahan, S., Chowdhury, M., Islam, R., Chaudhry, J. (2018). Securing Healthcare Data Using Biometric Authentication. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds) Security and Privacy in Communication Networks. SecureComm 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 239. Springer, Cham. https://doi.org/10.1007/978-3-319-78816-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-78816-6_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78815-9
Online ISBN: 978-3-319-78816-6
eBook Packages: Computer ScienceComputer Science (R0)