skip to main content
10.1145/3326467.3326496acmotherconferencesArticle/Chapter ViewAbstractPublication PageswimsConference Proceedingsconference-collections
research-article

Medical Information Protection Frameworks for Smart Healthcare based on IoT

Authors Info & Claims
Published:26 June 2019Publication History

ABSTRACT

The smart healthcare area is expanding its application to telemedicine, mobile health, EHR/EMR/PHR, wireless medical services, and precision medicine through a combination of Internet of Things (IoT) technologies. In the IoT environment, it is difficult to actively control packets and traffic using existing network technologies because multiple devices and sensors create different types of packets and cause variable traffic. Furthermore, it is difficult to apply various existing security technologies in the IoT environment because various services are provided using low-end sensor devices with limited performances. This study presented here aims to construct an IoT-based smart healthcare service security model. The security requirements for IoT environments are summarized while a framework for designing security areas for IoT services is proposed and applied to smart healthcare services. For this purpose, a medical information protection framework was designed to provide authentication, access control, network and system security, integrity, and confidentiality by investigating the characteristics of the smart healthcare environment.

References

  1. G. Yang, L. Xie, M. Mäntysalo, X. Zhou, Z. Pang, L. Xu, S. Kao-Walter, Q. Chen, and L. Zheng., "A Health-IoT Platform Based on the Integration of Intelligent Packaging, Unobtrusive Bio-Sensor, and Intelligent Medicine Box," IEEE Transactions on Industrial Informatics, vol. 10, no. 4, pp.2180--2191, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  2. X. Yi et al., "Privacy Protection for Wireless Medical Sensor Data," IEEE Commun. Mag., vol. 13, no. 3, pp.369--83, 2016.Google ScholarGoogle Scholar
  3. Islam S M R, Kwak D, Kabir M D H, et al. "The internet of things for healthcare: a comprehensive survey," IEEE Access, vol.3, pp.678--708. 2015.Google ScholarGoogle ScholarCross RefCross Ref
  4. A. Mosenia, N.K. Jha, "A Comprehensive Study of Security of Internet-of-Things," IEEE Transactions on Emerging Topics in Computing, vol.5, no.4, pp.586--602, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  5. A. Mukherjee, "Physical-layer security in the Internet of Things: Sensing and communication confidentiality under resource constraints", Proc. IEEE, vol.103, no.10, pp.1747--1761, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  6. J. Choi, C. Choi, H.Ko, and P. Kim, "Intelligent Healthcare Service using Health Lifelog Analysis," Journal of Medical Systems, vol.40, issue.8, pp.1--10, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. M. Nia, S. Sur-Kolay, A. Raghunathan, and N. K. Jha, "Physiological information leakage: A new frontier in health information security," IEEE Trans. Emerging Topics Comput., vol.4, no.3, pp.321--334, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  8. H. Ning, H. Liu, and L. T. Yang, "Cyberentity security in the internet of things," Computer, vol.46, no.4, pp.46--53, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. I. You, J. Choi, C. Choi, and P. Kim, "Intelligent Healthcare Service Based on Context Inference Using Smart Device," Soft Computing, vol.18, no.12, pp.2577--2586, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A.K. Alharam, W. El-madany, "Complexity of Cyber Security Architecture for IoT Healthcare Industry: A Comparative Study," Future Internet of Things and Cloud Workshops (FiCloudW), 2017.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    WIMS2019: Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics
    June 2019
    231 pages
    ISBN:9781450361903
    DOI:10.1145/3326467

    Copyright © 2019 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 26 June 2019

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate140of278submissions,50%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader