142,99 €
Digital evolution, whether through Internet advances or the development of connected objects, has triggered a veritable societal revolution. Thanks to technological advances, e-health services enable healthcare professionals to monitor patients in real time. However, new challenges have also arisen in the field of e-health, concerning the security of medical data, as well as the protection of patient privacy.
After presenting e-health architectures and explaining the proliferation of cyber attacks, e-Health Security Management focuses on proposing solutions designed to meet these security imperatives and respect patient privacy, such as the use of blockchain, "biometrics", new encryption methods or artificial intelligence. Implementing these solutions is crucial to guarantee the acceptance and effectiveness of e-health services.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 335
Veröffentlichungsjahr: 2024
Cover
Table of Contents
Title Page
Copyright Page
1 Overview of e-Health Architectures
1.1. Introduction
1.2. Definitions
1.3. e-Health services
1.4. Requirements for e-health systems
1.5. e-Health system architecture
1.6. e-Health system technologies
1.7. Security in e-health systems
1.8. Medical data security
1.9. Perspectives
1.10. Conclusion
1.11. References
2 Vulnerabilities in e-Health and Countermeasures
2.1. Introduction
2.2. The importance of digitization in healthcare systems
2.3. The challenges of digitization in e-health systems
2.4. Cyber-attacks in the healthcare sector
2.5. Security incidents in the healthcare sector
2.6. Existing security measures for e-health systems
2.7. Recommendations for protecting e-health systems
2.8. Conclusion
2.9. References
3 Security Policies for e-Health Systems
3.1. Introduction
3.2. The concept of the security policy
3.3. Environment for specifying, validating and testing security policies
3.4. Security services for e-health systems
3.5. Security requirements for e-health platforms
3.6. Future security challenges for e-health
3.7. Conclusion
3.8. References
4 Adaptive, Dynamic, Decentralized Authorizations for e-Health
4.1. Introduction
4.2. Fundamental principles
4.3. Proposal for dynamic, decentralized adaptation of e-health authorizations
4.4. Conclusion
4.5. References
5 Applying Blockchain to e-Health
5.1. Introduction
5.2. Blockchain technology
5.3. Health sector
5.4. Issues and challenges for the healthcare sector
5.5. Application of blockchain technology in e-health systems
5.6. Implementing blockchain technology in healthcare
5.7. Contribution of the blockchain solution
5.8. Conclusion
5.9. References
6 Using Biometrics to Secure Intra-BAN Communications
6.1. Introduction
6.2. Security for WBAN
6.3. Security solutions for intra-WBAN communications
6.4. Biometric data-based security solutions for WBANs
6.5. Discussion
6.6. Conclusion
6.7. References
7 Using Biometrics for Authentication in e-Health Systems
7.1. Introduction
7.2. e-Health systems
7.3. Authentication techniques
7.4. Biometric authentication
7.5. Multimodal authentication
7.6. Multi-factor authentication approaches for e-health system security
7.7. Conclusion
7.8. References
8 Security of Medical Data Processing
8.1. Introduction
8.2. Homomorphic encryption
8.3. Attribute-based encryption
8.4. Conclusion
8.5. References
9 Artificial Intelligence for Security of e-Health Systems
9.1. Introduction
9.2. e-Health systems
9.3. e-Health system security
9.4. Artificial intelligence techniques
9.5. Intrusion detection based on artificial intelligence
9.6. AI-based IDS in WBANs
9.7. Conclusion
9.8. References
List of Authors
Index
End User License Agreement
Chapter 1
Table 1.1. Application of sensors and connected objects in e-health systems
Table 1.2. Cryptography for e-health
Table 1.3. Biometrics for e-health
Table 1.4. Using the blockchain in e-health
Chapter 2
Table 2.1. Overview of the measures described (NCSC 2022)
Chapter 4
Table 4.1. Comparison of the proposed solution with a conventional solution
Chapter 5
Table 5.1. Medical applications using blockchain
Table 5.2. Characteristics of blockchain projects in the medical field
Table 5.3. Comparison of data processing approaches in the medical field
Chapter 6
Table 6.1. Security solutions for intra-WBAN communications (Narwal et al. 202...
Table 6.2. Notations used in the description of Sammoud et al.’s (2020) approa...
Table 6.3. Biometric-based approaches to securing intra-BAN communications
Chapter 7
Table 7.1. Authentication factors
Table 7.2. Biometric features
Table 7.3. Effectiveness of biometric features (Fatima et al. 2019)
Table 7.4. Multimodal authentication
Table 7.5. Comparison of resource consumption of multifactor authentication ap...
Table 7.6. Security comparison of multifactor authentication approaches betwee...
Table 7.7. Notations used in the description of Sammoud et al.’s (2020) approa...
Chapter 8
Table 8.1. Comparison of PHE schemes
Table 8.2. Comparison of SHE schemes
Table 8.3. Comparison of FHE schemes
Table 8.4. Main differences between KP-ABE and CP-ABE
Table 8.5. Comparison of ABE schemes
Table 8.6. Summary of ABE solutions for securing e-health
Chapter 9
Table 9.1. Possible solutions for WBAN security (Chalouf 2020)
Chapter 1
Figure 1.1. Components of e-health
Figure 1.2. Services and requirements for e-health systems
Figure 1.3. Architecture of e-health systems (Hajar et al. 2021)
Figure 1.4. e-Health technologies
Figure 1.5. Security in e-health systems
Chapter 2
Figure 2.1. Representation of data breach incidents by industry sector (Seh et...
Figure 2.2. Attack statistics for e-health 2020, 2021 and 2022 (WHO 2022)
Figure 2.3. Safety mechanisms implemented (HIMSS 2021).
Chapter 3
Figure 3.1. Modeling an ESP
Figure 3.2. Security policy test environment
Figure 3.3. Information accountability framework (Gajanayake et al. 2012)
Chapter 4
Figure 4.1. Context lifecycle
Figure 4.2. Example of a context-aware security system
Figure 4.3. ACE framework base protocol exchanges
Figure 4.4. ACE e-health security framework architecture
Figure 4.5. A simplified view of blockchain architecture
Figure 4.6. Architecture for dynamic and decentralized adaptation of e-health ...
Figure 4.7. Proposed new authorization flow for dynamic, decentralized adaptat...
Chapter 5
Figure 5.1. How blockchain technology works (Dellys 2020)
Figure 5.2. Blockchain types and applications
Chapter 6
Figure 6.1. Example of a BAN (Hajar et al. 2021)
Figure 6.2. An ECG sequence (Yao et al. 2011)
Figure 6.3. A PPG sequence (Charlton et al. 2020)
Figure 6.4. Establishing symmetrical keys between a parent node and its child ...
Figure 6.5. Establishing the symmetrical key between two child nodes
Figure 6.6. Primary key generation by nodes N
1
and N
2
Figure 6.7. Generating a biometric session key
Chapter 7
Figure 7.1. Authentication techniques
Figure 7.2. Protocol registration phase
Figure 7.3. Connection and protocol authentication phase
Chapter 8
Figure 8.1. Homomorphic encryption for e-health solutions in cloud computing
Figure 8.2. Stages of an asymmetric homomorphic encryption scheme
Figure 8.3. Gentry’s model for building an FHE
Figure 8.4. KP-ABE schema
Figure 8.5. CP-ABE schema
Chapter 9
Figure 9.1. Confusion matrix for the “decision tree” model
Figure 9.2. Confusion matrix for the neural network model
Figure 9.3. Confusion matrix for the “naive Bayes” model
Figure 9.4. Confusion matrix for the “decision tree” model with 5% noise...
Figure 9.5. Confusion matrix for the “decision tree” model with 40% noise...
Figure 9.6. IDS performance as a function of noise level.
Cover Page
Table of Contents
Title Page
Copyright Page
Begin Reading
List of Authors
Index
WILEY END USER LICENSE AGREEMENT
iii
iv
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
237
238
239
240
241
SCIENCES
Networks and Communications,Field Director – Guy Pujolle
Network Management and Control,Subject Head – Francine Krief
Coordinated by
Omessaad Hamdi
First published 2024 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.
Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address:
ISTE Ltd27-37 St George’s RoadLondon SW19 4EUUK
www.iste.co.uk
John Wiley & Sons, Inc.111 River StreetHoboken, NJ 07030USA
www.wiley.com
© ISTE Ltd 2024The rights of Omessaad Hamdi to be identified as the author of this work have been asserted by her in accordance with the Copyright, Designs and Patents Act 1988.
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s), contributor(s) or editor(s) and do not necessarily reflect the views of ISTE Group.
Library of Congress Control Number: 2024942248
British Library Cataloguing-in-Publication DataA CIP record for this book is available from the British LibraryISBN 978-1-78945-179-5
ERC code:PE6 Computer Science and Informatics PE6_5 Cryptology, security, privacy, quantum cryptography PE6_7 Artificial intelligence, intelligent systems, multi agent systemsPE7 Systems and Communication Engineering PE7_8 Networks (communication networks, sensor networks, networks of robots, etc.) PE7_11 Components and systems for applications (in e.g. medicine, biology, environment)
Omessaad HAMDI
IEEE, Rennes, France
Digitization occupies a central place in all our daily activities, and the healthcare field is particularly affected by this digital evolution, which has considerably improved patient care (Hermes et al. 2020; Gupta et al. 2021). This improvement is based on two key factors: the increased involvement of patients in the management of their health, and easy access for healthcare professionals to digital tools and services.
Digitization is also improving people’s quality of life, in terms of well-being and autonomy, and is helping respond to the growing number of elderly people worldwide. The phenomenon of aging is becoming a growing concern. To enable this population to age in a secure environment with a good quality of life, while reducing costs, several approaches have been developed.
In this chapter, we focus on e-health architectures. We begin by introducing the terms used in e-health. Next, we present the services offered by e-health systems and their requirements. The final sections will focus on security and the techniques used to guarantee the required security services. Finally, we look ahead to the future of e-health.
The term e-health refers to information and communication technologies (ICT) combined with the Internet in the service of health.
Telehealth is part of e-health. It refers to the use of tools for producing, transmitting, and managing digitized medical information. Telehealth encompasses telemedicine and mobile health (m-health).
m-Health is part of telehealth. It refers to healthcare practices supported by mobile devices, such as cell phones, patient monitoring systems and other wireless devices. The term includes, among others, applications such as wellness apps. Bashshur et al. (2011) point out that m-health is the only ICT-based healthcare field that can be justified solely based on mobility.
Telemedicine is part of telehealth. It refers to the digital transmission of medical information (images, recordings, etc.) for remote diagnosis, specialist advice and continuous monitoring of a patient.
There are four forms of telemedicine (2010 decree):
Remote consultation is between a healthcare professional and a patient: It refers to the use of communication technologies to provide health consultations to patients in geographically different locations.
Remote education is between healthcare professionals, in the absence of the patient: It consists of a remote request for advice from colleagues based on information provided by the patient.
Remote monitoring involves remote monitoring of a patient’s health parameters, providing assessments of the patient’s state of health.
Remote assistance occurs when a doctor remotely guides a medical act. This can take place between two healthcare professionals or between a healthcare professional and a third-party present with the patient, for example, in an emergency.
Figure 1.1 summarizes the components of telehealth.
Figure 1.1.Components of e-health
e-Health offers a wide range of services designed to improve the quality of care and accessibility to medical services thanks to digital technologies:
Cost reduction: e-health considerably reduces hospitalization and the need to keep elderly people in nursing homes. It also enables early detection of illness. Both services can significantly reduce healthcare costs (Atienza et al.
2007
; Kostkova
2015
).
Social inclusion: the use of e-health technologies enables patients to remain active and independent as long as possible, enabling them to overcome their illness and/or disability without being excluded from society.
Prevention: body and environmental data collected from sensors can be interpreted. By effectively managing these data, doctors can uncover facts and detect illness at an early stage.
Support: e-health systems are designed to help people who are ill, elderly or disabled, and to promote their autonomy, safety and well-being. They make it possible to maintain and monitor patients at home, instead of hospitalizing them.
Supervision: the acquisition and processing of patient data and the use of several devices enable the patient’s condition to be monitored. This system is particularly interesting when it comes to high-risk patients, such as the elderly suffering from a wide range of chronic illnesses, for whom effective supervision is essential.
e-Health systems must meet certain requirements if they are to be adapted by users.
In this section, we present some of these requirements:
Acceptability: patients often wear sensors, and these are deployed in their environment to provide continuous monitoring. The sensors deployed must meet conditions of comfort and acceptability.
Reliability: an e-health system must generate a very low false alarm rate.
Energy autonomy: the energy autonomy of sensors plays an important role. Replacing sensor batteries is often complicated and/or costly.
Ergonomics: it is essential that the devices and applications used are ergonomic and user-friendly to guarantee ease of use.
Safety: devices and applications must comply with standards and regulatory requirements.
Privacy protection: this is of paramount importance when dealing with media information, as this is sensitive data. To guarantee this protection, appropriate mechanisms must be put in place, especially in an environment where several users are involved.
Figure 1.2 summarizes the services and requirements of e-health systems.
Figure 1.2.Services and requirements for e-health systems
Different e-health system architectures have been developed to meet the specific needs of each project.
An architecture that summarizes most of the architectures proposed in the literature is shown in Figure 1.3.
In all e-health architectures, information flows from the patient to a medical server. Data are transferred from the sensors to a gateway that manages the sensors. Data transfer in the network can be continuous or ad hoc. Collected data are stored in a gateway, and then uploaded to a medical server.
The main components of an e-health system are as follows (Hamdi et al. 2014):
Sensors: these are devices that capture, store, process and transmit data.
Wireless body area network (WBAN): it provides short-range wired or radio communication capability for sensors to exchange data with a gateway around an individual’s body.
Gateway: it collects vital and environmental data from sensors. It analyzes the data received from body and/or environmental measurements, compiles them and uploads them to a medical server via the network.
Local area network (LAN): it provides wired or wireless communications for sensors to exchange data with a gateway.
Wide area network (WAN): it provides wired or wireless (e.g. cellular) communications capability for gateways to download data to a medical server.
e-Health systems platform: it includes servers for storing, processing and securing medical data.
Figure 1.3 gives an overview of the main components of e-health systems.
Data capture: this layer refers to the collection of patient data from vital signs and/or environmental sensors.
Computation: this layer includes data analysis, management and personalization of care.
Communication and storage: this layer covers vital signs communication, calculation and storage modules.
Access: this layer refers to the way in which data are accessed. It often takes the form of a web portal or mobile application connected to a secure system hosted in the cloud, enabling continuous monitoring of patients’ health status.
Figure 1.3.Architecture of e-health systems (Hajar et al. 2021)
Connection technologies such as Bluetooth, WiFi, Internet and ZigBee play a key role in the growth of e-health applications and systems. When used in conjunction with other technologies, such as the Internet of Things (IoT), robotics, artificial intelligence (AI), cloud and Big Data, high-performance e-health systems can be created (Devedžić et al. 2021).
Figure 1.4.e-Health technologies
Figure 1.4 illustrates the main technologies used in e-health systems. These are grouped into medical devices, connection technologies and other technologies, and are detailed below.
Devices are mainly made up of sensors and connected objects, which play a key role in monitoring and ensuring the well-being of individuals, offering medical, safety and wellness services (Javaid et al. 2022).
Sensors are devices that detect and measure specific information, such as body temperature, heart rate, blood pressure, physical activity, sleep quality and so on. These sensors collect valuable data on people’s health and well-being.
Connected objects, also known as IoT devices, are devices that can connect to the Internet and exchange data. These can include smartwatches, connected bracelets, connected scales, blood pressure monitors, thermometers and many more. These connected objects work in tandem with sensors to collect, transmit and analyze data relating to users’ health and well-being (Fagroud et al.
2019
; Balakrishnan et al.
2021
).
Using these sensors and connected objects, medical services can provide precise monitoring of an individual’s health status, detecting signs of potential health problems and enabling early intervention. Security services can use these devices to ensure the safety of the elderly or people at risk by detecting falls or monitoring unusual movements.
Several approaches have focused on the uses of sensors or connected objects in the medical field. Table 1.1 illustrates a few examples.
Table 1.1.Application of sensors and connected objects in e-health systems
References
Sensor
Proposition
(Rabbani et al. 2021)
Implant
A real-time immune response monitoring system used in cancer therapy to track disease progression and provide personalized care.
(Gourob et al. 2021)
Artificial hand
Human–robot interactions to control a patient’s hand gesture recognition system.
(Basaklar et al. 2021)
Smart clothing
A portable, low-energy device for personalized care without manual intervention.
(Gupta et al. 2021)
WBAN
A system for monitoring psychological parameters such as temperature and heart rate to provide real-time diagnosis.
(Hodgkiss and Djahel 2022)
WBAN
The use of biometric data to ensure strong authentication as part of an e-health system.
(Behera 2022)
Patches
Using chip-less RFID sensors to measure data and monitor vital signs in real time.
In this section, we present the connection technologies used in the various components of an e-health architecture.
ZigBee is a wireless technology offering long battery life, low data rate and a secure network (Chung et al. 2013; Minakshi 2016). In addition, ZigBee is an easy network to install and configure, supports various network topologies and allows for a large number of nodes to be connected. ZigBee meets the specific requirements of WBANs.
Bluetooth was designed for short-range wireless communications, where several Bluetooth devices form a short-range network (Negra et al. 2016). Bluetooth is widely used in WBANs.
LPWAN technology, proprietary to the LoRa (Long Range) Alliance, consists of two main elements, LoRa and the LoRaWAN protocol. This technology has been the focus of much research into e-health systems, due to its low cost, long coverage area and long sensor lifetime (Sundaram et al. 2019).
In recent years, e-health has become more efficient and smarter thanks to cloud technologies, Big Data, AI and robotics.
The application of Big Data in the e-health sector has enabled the better exploitation of data to diagnose disease and improve quality of care.
Online e-health services and technologies generate huge volumes of data. The analysis of these data enables the transformation of conventional hypothesis-based information analysis into innovative data-driven analysis, capable of identifying links between heterogeneous information (Wang et al. 2016; Saranya et al. 2019).
AI is attracting a great deal of interest due to its ability to process large quantities of data, produce accurate results and control processes to generate optimized outcomes. It is being used to aid decision-making and predict the effects of diseases, as well as longer term consequences (Kaur 2022). AI can perform processes such as logical reasoning, knowledge-based learning, drug discovery, guided surgery and advanced imagery (Sobhan et al. 2021).
To ensure continuous, personalized care for patients in hospitals, or nursing homes, or homecare, solutions involving the use of robots are being proposed. These intelligent machines will help patients perform simple daily gestures, facilitate remote monitoring and communication with medical staff or relatives, administer simple therapies or be used for entertainment purposes (reading, storytelling, playing, etc.).
In addition to this type of robot, devices and control strategies for rehabilitation are being designed, such as the development of agents that can interact with the patient and provide real-time data to medical staff (Mashayekhi et al. 2020).
It is known as a paradigm in which IT resources are made accessible to users. It offers many advantages, such as flexibility, cost and energy savings, resource sharing and rapid deployment. The rapid growth of e-health systems to deliver quality medical services has led to the use of cloud-based solutions. This choice makes it possible to take advantage of cloud resources to store and process large volumes of medical data.
The IoT refers to a network of physical objects connected to the Internet and capable of communicating and exchanging data with each other and with other systems. These objects, also known as IoT devices, are equipped with sensors, software and communication technologies that enable them to collect, analyze and transmit information.
Currently, the approach used in most smart applications is to store all sensor data in the cloud and perform machine-learning processing on these data. The two worlds of IoT and cloud have seen rapid progress in the medical field. IoT can take advantage of the cloud’s almost limitless resources to compensate for its insufficient capabilities. The main drivers of IoT integration in the cloud are as follows (Farahani et al. 2018; Yang et al. 2022):
Communication: IoT is heterogeneous by nature and relies on a variety of communication protocols. The cloud offers an efficient solution for registering, discovering and managing any type of object, regardless of communication protocol.
Resource pooling: physical IoT resources can be integrated into cloud resources, enabling us to allocate and share them on demand.
Storage: IoT generates an enormous amount of data, characterized by its volume, variety and speed of data generation. In this context, IoT benefits from large-scale, long-term storage.
Computing: data processing is generally a resource-intensive task. As a result, IoT can benefit from the cloud’s unlimited processing resources to aggregate data and perform real-time analysis on the data collected.
In this section, we present the required security services and legal requirements for e-health systems.
The main security services required for data in an e-health system are as follows:
Confidentiality: medical data must be protected from disclosure to unauthorized parties during transmission, processing and/or storage (Siva Bharathi et al.
2019
).
Availability: having access to data and being able to dispose of it at any time is paramount in an e-health context. Given the critical applications of e-health, any disruption to the system can be life-threatening. Therefore, the ability to access the required data under any circumstances is essential.
Integrity: integrity ensures that health data captured by a system or supplied to any entity is accurate and consistent with the information intended, without having been altered. Inappropriate treatment based on incorrect data can have serious consequences for patient health.
Data authentication: unlike data integrity, which aims to prevent data being altered during transmission, data authentication aims to ensure that the message received comes from the originating node.
Access control: it is a mechanism that limits access to legitimate entities. Access control policy is generally based on the privilege and right of each authorized entity. Several solutions have been proposed to address access control issues, among which role-based access control (RBAC) and attribute-based access control (ABAC) are the most popular models for e-health (Sandhu
1996
).
Data freshness: an attacker may intend to capture transmitted messages and replay them later, leading to confusion and instability in the network. It is therefore essential to have a mechanism in place to verify that the message received is fresh.
Non-repudiation: repudiation threats concern users who deny having had access to medical data after consulting it.
Devices and applications that manage medical data must comply with regulations. In Europe, a regulation on the protection of personal data processing was adopted in 2018 (Koren et al. 2022). This directive is called the general data protection regulation (GDPR). It aims to harmonize data protection standards at European level and defines the rights and responsibilities of entities in charge of data processing. In the medical field, this directive specifies that personal health data are considered regardless of the source, for example, from a medical device (Koren et al. 2022). This directive imposes the concept of security by design, which means that security requirements must be considered right at the start of the solution design process.
In the United States, personal health data are governed by the Health Insurance Portability and Accountability Act (HIPAA) (Koren et al. 2022). HIPAA establishes security rules for all healthcare providers who process health information in electronic format. The law protects all individually identifiable health-related information held or transmitted by healthcare providers and which is held or transmitted by an entity. Indeed, under the rules defined by HIPAA, an entity (healthcare provider, health service provider, etc.) is responsible for the security of patient data, which means that an application or service that collects, processes and stores patient data must ensure data confidentiality and integrity and impose access restrictions.
In this section, we present the security techniques most widely used in the medical field. These include cryptography, biometrics and blockchain. A comparative analysis is carried out to identify the contribution of the techniques examined.
Figure 1.5 illustrates the security services required in e-health systems, as well as the different security techniques most commonly used to mitigate attacks in medical environments.
Figure 1.5.Security in e-health systems
Cryptography techniques offer important security services, such as confidentiality, integrity, non-repudiation and authentication of digital data (Anand et al. 2020; Singh et al. 2020).
Encryption is a technique used to encode information in order to guarantee the security of medical data (Thakur et al. 2018; Anand et al. 2020).
Some encryption techniques, such as public key cryptosystems or symmetric cryptosystems, have been developed to ensure confidentiality. In public-key cryptosystems, a public–private key pair is used to encrypt and decrypt the message. In the symmetric method, a single key is used to encrypt and decrypt the data (Qadir et al. 2019; Gupta et al. 2020).
Vinoth et al. (2017) proposed a cryptographic approach to sharing and storing medical records in the cloud. The patient reserves the right to grant each party access to his or her record by sharing a key. Sujatha et al. (2013) proposed an approach for fast and secure transmission of electrocardiogram (ECG) data in a WBAN. They adapted an encryption technique (set partitioning in hierarchical trees [SPIHT]).
Sun et al. (2011) proposed an approach that ensures medical data security, including confidentiality, access control, integrity, accountability. This system ensures high security by encrypting medical records using searchable symmetric encryption (SSE) and public key encryption with keyword search (PEKS) algorithms and cryptographic algorithms using identity-based cryptography (IBC). This system is highly effective in emergency situations.
Table 1.2.Cryptography for e-health
References
Type of Data
Algorithm
Proposition
(Sujatha et al. 2013)
ECG
SPIHT
Secure ECG transmission using encryption, compression and genetic algorithms.
(Vinoth et al. 2017)
Medical records
Blowfish
Storing and sharing medical records in unsecured environments.
(Sun et al. 2011)
Medical records
SSE, PEKS, IBC
Protecting patient privacy in emergency situations.
(Nagamani et al. 2018)
Medical data
MD5, password
Authentication and security of medical data in the cloud.
(Sammoud et al. 2020)
Session key
ECG
Session key exchange in a WBAN.
(Sharma et al. 2021)
Health data
Quantum
Securing IoT-based healthcare systems.
(Jegadeesan et al. 2020)
Health data
Authentication
Anonymous authentication preserves patient privacy while reducing communication and computing costs.
Nagamani et al. (2018) proposed a secure e-health system to predict patient condition based on problems and symptoms described by the user. This approach uses a system to study symptoms and provide an appropriate solution. To guarantee the confidentiality of transmitted information, it is encrypted using password-based encryption (PBE). The system also generates an encryption key from the user’s password. In addition, a checksum is generated using the MD5 hash algorithm, and this value is appended to the transmitted data for user authentication.
Sammoud et al. (2020) proposed a session key exchange protocol using ECG. Sharma and Bhatt (2021) used quantum mechanics to secure IoT-based healthcare systems. Jegadeesan et al. (2020) presented an anonymous authentication scheme that preserves patient privacy while reducing communication and computational costs. Table 1.2 presents some cryptography-based security proposals.
Biometrics is the science of establishing an individual’s identity based on physical or behavioral characteristics. The most common examples of biometric characteristics are DNA, fingerprint, iris, face, keystroke, smell, signature, retina, voice and hand veins. Biometric systems normally operate in two modes: verification and identification. In verification mode, the system validates the person’s identity by matching the captured biometric information with its own biometric template(s) stored in the database. In identification mode, the system identifies a person by looking for a match between the templates of all the users in the database. As a result, the verification system performs a one-to-many comparison to establish an individual’s identity. Biometrics has been used to improve the security and confidentiality of patient data in e-health applications.
In Jahan et al. (2019), an efficient and robust biometric system is proposed to authenticate the user and preserve the confidentiality of medical records. An approach using ECG-based biometrics is proposed for verifying patient identity and maintaining confidentiality of medical records. The specificity and availability of the ECG make it a suitable biometric choice. The signal is captured, processed and then compared with the sample model; the result obtained indicates whether the user is authentic or not.
Ali et al. (2018) used biometric authentication. It operates in several phases: initialization, registration, login and authentication. To provide multi-level authentication, both the patient’s fingerprints and the smart card are verified for login. In addition, mutual authentication and session key exchange are performed between the user and the medical server.
After studying a variety of attacks when accessing electronic medical records in a cloud environment, Hathaliya et al. (2019) developed an authentication and key exchange system based on fingerprint biometrics. The system also encrypts biometric data and a 160-bit random number and performs mutual authentication using a message authentication code (MAC). Sammoud et al. (2020) have proposed a multifactor authentication protocol using ECG biometric data. Table 1.3 presents some biometric-based security proposals.
Table 1.3.Biometrics for e-health
References
Type of Data
Algorithm
Proposition
(Ali et al. 2018)
Medical data
Digital fingerprint + hash function
Secure data transmission between patient and healthcare professional.
(Jahan et al. 2019)
Base of ECG
ECG
User authentication to safeguard the security of medical records.
(Hathaliya et al. 2019)
Medical record
Digital fingerprint
Fingerprint authentication for secure access to medical records.
(Sammoud et al. 2020)
Medical data
ECG
Multi-factor authentication using ECG.
Blockchain is one of the technologies used in e-health systems. It consists of a list of blocks in a distributed connected structure (Casino et al. 2018). It stores transactions and groups them in a structure (Li et al. 2020). Each block is stored at all network nodes in chronological order. Blockchain has solved the problem of centralization in a distributed system, bypassing single-point-of-failure issues and reducing transaction costs. Since no central authority is involved, transaction speed is also increased (Li et al. 2020).
Maintaining the integrity and confidentiality of medical records is paramount (Singh et al. 2017). The immutable property of blockchain ensures this (Agbo et al. 2019). In addition, it also guarantees data security and confidentiality. The decentralized structure of the blockchain can be implemented in healthcare systems, helping to preserve the confidentiality of sensitive data. Since blocks are replicated at each network node, the likelihood of data loss decreases and patients can also control access to their records (Agbo et al. 2019).
A system is proposed in Chen et al. (2018) for secure storage and communication using the blockchain of medical records between patients, medical institutes and third-party agencies. Patient details as well as medical records are encrypted using asymmetric encryption. What is more, the patient can authorize or withdraw access at any time.
An access control method is proposed in Fan et al. (2018), combining the concepts of blockchain and cryptography. It provides a solution for managing and sharing a large volume of medical data. Asymmetric encryption is used to secure medical records. The hash value of encrypted data is added to verify data integrity and authenticity.
Ichikawa et al. (2017) have designed an app for patients with insomnia, which allows timely scheduling of sessions based on patient-supplied data. JavaScript Object Notation (JSON) format is used to store the data. The proposed system also offers tamper-resistance using the Practical Byzantine Fault Tolerance (PBFT) consensus algorithm. Data can be successfully updated even in situations such as a network failure.
Garg et al. (2020) proposed a low-cost protocol with authentication in the IoT environment using blockchain. Islam and Young Shin proposed a blockchain-based healthcare system to help unmanned aerial vehicles (UAVs) secure health data collected from users and store it on the nearest server on the UAV’s path (Islam et al. 2020). Miyachi et al. (2021) presented a blockchain-based system that preserves patient privacy.
Table 1.4 presents security proposals based on the blockchain.
Table 1.4.Using the blockchain in e-health
References
Type of Data
Algorithm
Proposition
(Ichikawa et al. 2017)
Insomnia patient data
PBFT
Non-violation of medical data when updating.
(Chen et al. 2018)
Indexing information for medical data and transaction records
Encryption
Privacy protection, secure sharing and storage of medical data.
(Fan et al. 2018)
Medical information
Asymmetric encryption and hashing
Secure data sharing and controlled access to medical data.
(Garg et al. 2020)
Medical information
Hashing
Access control.
(Islam et al. 2020)
Patient data in UAVs
Hashing
Securing health data collected from users in the UAV and storing it on the server closest to the UAV.
(Miyachi et al. 2021)
Confidential patient data
Encryption and hashing
Protecting patient privacy.
Data sharing: data generated by different devices can pose a variety of security and confidentiality problems for e-health systems, as patient data are sensitive and should not be shared by all medical staff. It is therefore necessary to adapt security countermeasures to guarantee the security, confidentiality and access control of medical data and devices.
Medical data: a considerable amount of data is collected from various devices. These data are constantly changing as a function of the patient’s state of health. Managing this amount of information is a time-consuming task. What is more, different types of data need to be stored in different formats. It is therefore necessary to have an efficient data management system capable of converting the file according to the needs of each medical application.
Lack of standardization: many devices are used in e-health systems to measure, collect and relay health data. Each device has its own set of protocols and configurations for sharing this information with medical staff. However, there is no centralized consensus or standardization available for the communication, implementation and deployment of these devices. It is therefore necessary to research this aspect, so that devices using different standards and protocols can communicate.
In the digital age, e-health is playing an increasingly important role in the management of chronic diseases and in communication between healthcare professionals and patients. Thanks to technological advances, it is now possible to ensure continuous, real-time disease management, both inside and outside medical structures.
The aim of e-health is to improve healthcare services using digital technologies. This makes healthcare more accessible, efficient and personalized for a greater number of people, contributing to better health and well-being.
In this context, various e-health architectures have been developed to integrate digital technologies into healthcare systems. A simplified architecture has been presented, bringing together the different technologies used in this field. This architecture makes it possible to visualize the various components and interactions between healthcare system actors, connected medical devices, mobile applications, data platforms and so on.
The security of e-health systems is also an essential aspect examined in this chapter. Healthcare data are sensitive and confidential, and it is crucial to implement robust security measures to protect them against cyber-attacks and unauthorized access. Various security techniques are used, such as user authentication and authorization, data encryption, access management and suspicious activity monitoring.
In short, e-health uses technological advances to improve healthcare services and promote continuous, real-time management of chronic diseases. e-Health architectures provide a global vision of the various technologies used, while security techniques guarantee data protection and the confidentiality of medical information. These advances contribute to improved accessibility and more effective, personalized healthcare for patients.
Agbo, C.C., Mahmoud, Q.H., Eklund, J.M. (2019). Blockchain technology in healthcare: A systematic review.
Healthcare
, 7(2), 56.
Ali, R. and Pal, A.K. (2018). Cryptanalysis and biometric-based enhancement of a remote user authentication scheme for e-healthcare system.
Arabian Journal for Science and Engineering
, 43, 7837–7852.
Anand, A. and Singh, A.K. (2020). Joint watermarking-encryption-ECC for patient record security in wavelet domain.
IEEE MultiMedia
, 27(3), 66–75.
Atienza, A.A., Hesse, B.W., Baker, T.B., Abrams, D.B., Rimer, B.K., Croyle, R.T., Volckmann, L.N. (2007). Critical issues in e-health research.
American Journal of Preventive Medicine
, 32(5), S71–S74.