Answer To: This is my dissertation project Topic of the dissertation is to design or make “A SECURE AND...
Neha answered on Dec 17 2021
A SECURE AND EFFICIENT E-HEALTHCARE SYSTEM PROTECTING PATIENT DATA IN THE HEALTHCARE ORGANISATION
Abstract
As me move in the coming future then the cyber operations will be able to employ digital information so that it can compromise the integrity instead of disrupting the access or deleting it this can have impact over the lives as it is tempering the information. There has been emerging type of the cybercrime which is posing our gigantic threat and it needs to be addressed at the urgent basis so that we can handle the consequences done by the tempering of data. Hence it is important for the researchers and the security practitioners to abreast of the perils of data tampering. The data integrity is still one of the most critical concerns in the industry of health care that data integrity breach present in the health care institution can also result in multiple number of potentially serious consequences there has been cyber security incidents which have been perceived as the gravest threats to the hospitals. It has become a challenging problem for the security practitioners to preserve the data integrity in the healthcare industry as the organizational structure of these institutions have high end point complexity and the regulatory pressures. This error in information, or the data will be used by the attacker in different types of the further attacks. The main aim of this paper is to illustrate the current data integrity techniques which are currently used by the researchers for securing the health care data.
Acknowledgement
This is to acknowledge all those without whom this project would not have been possible. Firstly, I would like to thank our lecturer who provided us this opportunity to complete this research work. I got his immense support and he also dedicated time towards me to make me understand about this project. This project would not have been completed without his guidance I took help from Google scholars and the research papers were published online.
Contents
Abstract 2
Acknowledgement 3
Chapter 1: Proposal 5
Chapter 2: Literature Review 9
Chapter 3: Research Methodology 18
3.1 IoT Healthcare Applications 19
3.2 Methodology to conduct SLR 24
3.3 Scientometric analysis 25
3.4 Cloud Computing 27
3.5 Fog Computing 28
3.7 Elliptic Curve Diffie-Hellman 30
3.8 Radio Frequency Identification 31
3.9 Edge Computing 31
3.11 Grid computing 32
Chapter 4: Result and Discussion 33
4.1 Challenges associated with blockchain approach 34
4.2. Challenges associated with future of data integrity breaches in healthcare 34
4.3 Challenges associated with healthcare data risk 35
4.4 challenges associated with human awareness 36
4.4 Challenges associated with researchers 37
Chapter 5: Conclusion and Future Works 38
5.1 Conclusion 38
5.2 Suggestions 41
References 42
Chapter 1: Proposal
In today’s world, all leading organizations and businesses rely on data and therefore, it has become one of the most important assets in business success. Nowadays, every industry has slowly transitioned towards a digitalized platform and portfolio. As a result of this mass digitalization, a large amount of data is generated, every second. It is essential to manage this large amount of the data in a secure manner. But this task is becoming very complex and challenging for the security experts in the industry as each data-type have their unique usage patterns, algorithms and significance. The data importance completely depends on the data type. For example, the data generated in the healthcare organizations have their significance in context of feasibility of treatment [1]. The numbers and frequency of cyber-attacks on healthcare data bases have increased noticeably. The breached data are being used for monetary exploitation, which resulting in the fact that the care users are becoming hesitant to share their data with the healthcare data bases. It is also admitted by data experts that the detection of data breach is very difficult and is often left unnoticed.
In near future, all medical treatment will be provided, based on medical history of care users, so that accurate treatment can be provided. Therefore, collection and storing of data will increase with time. Hence, it is important to have safety and regulatory policies for data preservation. Developing and imposing such security would increase security against data hackers. As me move towards coming future then the cyber operations will be able to employ digital information so that it can compromise the integrity instead of disrupting the access or deleting it this can have impact over the lives as it is tempering the information. There has been emerging type of the cybercrime which is posing our gigantic threat and it needs to be addressed at the urgent basis so that we can handle the consequences done by the tempering of data [2]. Hence it is important for the researchers and the security practitioners to abreast of the perils of data tampering. It is important to have the rigorous and continuous data protection solution so that it can provide guarantee that information will be kept protected against any type of the manipulative breaches.
The integrity of data remains to be a major issue in the industry of health care that data integrity breach present in the health care institution can also create multiple data breach related issues of concern. There have been cyber security incidents which have been perceived as the gravest threats to the hospitals. It has become a challenging problem for the security practitioners to preserve the data integrity in the healthcare industry as the organizational structure of these institutions have complexity data processing systems and the authoritative pressures when it comes to data storing and information formulation [2]. The increasing number of data breaches and cybercrimes, indicate that the healthcare industry is yet to get onto the same levels as other industries, when it comes to data security and control. Therefore, this industry needs to put efforts in protecting the data integrity of the stakeholders.
The organizational data-integrity can be used to make sure that organization is able to hold the brand image and trust of the customers. If the healthcare organizations, who use have transitioned towards digitized data preservation, do not take proper measures in securing the collected data of the care users, it would create problem, not only for the revenue of the organization, but also for the development of confidence among the care users [1]. This type of threat is comparatively more concerning than the other data breaches faced by organizations. If the data breaches are not identified, then those breaches would result in future attacks on data.
The celebrated research paper aims at identifying the trends in data collection, processing and unethical breaches, in context of health care data. This literature review study also tried to compile the repository of the techniques used for data integrity which are further exploited by the attackers. Based on these findings, it aims to make data experts realize the necessity data security, integrity and regulatory interventions [3]. In the first phase of this research, previous data breaches and data hack attacks are discussed for context. Then these breaches and cyber-attacks are linked with the healthcare sector. It shows that we can get the overview of the rational criticism over current data integrity scenarios in the healthcare. The second phase of this literature review provides the systematic review about previous research initiatives which were related with the data integrity of healthcare departments.
The different perspectives of daily living have already observed a continuous growth in the usage of information technology, especially internet. As a result of increasing usage of the internet, a significant number of people are not bothered with the data collection being done and exploited on regular basis. Kevin Ashton named the term Internet of Things, and it is used to represent the Internet based information with the help of emerging Global Services architecture. The Internet of Things healthcare applications now have the capacity to track people, specimens, equipment, supplies accurately and it can also take care of the different types of the stack holders which includes diagnosis, community, hospitals and nursing homes for analyzing the capturing data we can use biometrics information or measure the important parameters with the help of the sensors to get better quality and also use the resources in efficient manner [3]. For detecting the misuse activation in the form of extreme cardio practice or accelerated exercising as analyzed for training at the medical movement then the aforementioned data will be used to collect relevant information in the system and also control the disease.
In our past decade the Internet of Things have become the mega trend in the 4th generation of revolution technologies, and it is able to offer excellent interconnection for every uniquely identifiable smart device or the object present in Internet infrastructure. The structure of the advanced connectivity for these services and their devices can proceed with the machine to machine scenarios the Internet of Things is the highly powerful distributed network which is created with the combination of multiple objects we can dominate the prospect of the Internet of Things which will be able to serve as the global policy for connecting physical objects, humans, substances and enable multiple new methods to work communicate, entertain, live and interact. The Internet of Things helps to transform the physical objects so that it can perform and receive the information [4].
It will be able to coordinate their decisions by utilizing the present technologies like pervasive computing, intelligence technologies, Internet protocols, sensor networks, domain specific applications and embedded devices the Internet of Things can be defined as the new fashioned paradigm which is present in every physical object which we are wearing, what we read or see, what we drive and anything which also includes the people we meet or the places we go. All these things are connected, controlling addressed remotely. There has been a number of such physical things which are connected with each other and finally with the Internet for sharing the data with cyberspace there has been millions of the new Internet of Things devices every year which are deployed to different applications domains with the help of research are anticipating in the Internet of Things technologies [5].
There have been multiple distributed survey papers which are related with the different aspects of the applications and they are already published. If we talk about the standard paper then it includes the four most intelligence empowering technologies and they are the different components of wireless sensor networks wireless and variable there has been a lot of appropriate solutions which are collected from the broad spectrum of applications in IoT and they are embedded in the smart cities waste management, traffic congestion, security, structural health, health care, logistics, automated control, emergency services and retails.
We have already discussed about the security base which is present currently in the healthcare application on the Internet of Things and it also describes the level of the protection[5]. The Internet of Things applications have default security and they are required for protecting themselves any healthcare domain specification system needs to be addressed in terms of the trust, privacy and security with this paper we will try to analyze a variety of the research is done on the healthcare and also show different healthcare technologies, protocols, applications, services, late works, security challenges, security and IT requirements, different proposed and implemented security models, open issues which needs to be faced for the IoT and the market opportunity.
We will do the review work which will include the survey done on state of the art technologies used in the Internet of Things based healthcare, classify the current Internet of Things based healthcare networks and present a summary [6], Model the analysis of standard Internet of Things healthcare protocol and provided detailed discussion regarding it, provide broad survey over the applications and their services and model the extensive insights about the IoT healthcare security, it's requirements and privacy issues in this department.
The telemedicine is one of the most important and emerging fields of the E health search. If we talk about the telemedicine service then it includes the images, multimedia medical data and the MVD which is transmitted over the family with the help of insecure Internet connections as they are required by the remote doctors the healthcare cloud infrastructure can make it much easier to perform different healthcare information together for the patient when the patient is moving from one hospital to another this will result in easy management and tracking of the information about patient [6]. The healthcare cloud can be defined as the cloud computing infrastructure in which all the health care service providers and the stack holders will be able to communicate with each other through the cloud servers.
The healthcare cloud computing can offer multiple benefits of both hardware and software with the help of provision of the services over the Internet. The cloud computing can be defined as the model to enable convenient and on-demand network access over the shared pool of configurable computing resources which are networks, storage, services, application and servers and they can be rapidly provisioned and released with the minimal management effort or the interaction with the service provider the healthcare cloud computing is similar to the cloud computing and it has multiple issues related with the security and the most important issues are legal and policy issues, lack of transparency, privacy protection, data protection, software licensing, cyber security and absence of the security standards [7].
Chapter 2: Literature Review
It is very important to manage the large amount of the data in a secure manner. But this task is becoming very complex and challenging for the security experts in the industry as different types of data sets have their own significance and uses. The relevance of the data depends on the type of data we have in hand. For instance, data related to healthcare industry has its own significance in the everyday lives of individuals. Undoubtedly, cyber-attacks in the healthcare industry have increased significantly primarily for the purpose of unethically accessing the data so that monetary benefits can be drawn out of it. Drift in the data could not be identified easily owing to the present-day technological advancements, which are being used as a tool by the attackers [8]. Maintaining the integrity of the data to protect the data from breaches has turned out to be of great importance in the modern-day scenario. Furthermore, data, which has been breached is being used by the attackers to carry on more attacks. Continuous rise of internet and internet of things is inevitable in the healthcare industry. Kevin Ashton named the term Internet of Things, which is now used as a global service architecture and contains a lot of healthcare related information, which needs to be handled with great efficiency and effectiveness.
The data integrity issue is the most demanding concern present in the healthcare industry if we compare this across the world. If the health care organization is facing integrity breach, then it can have disastrous consequences. The data about the patient has been tampered and it can be provided wrong medications which can cause fatalities. There are many health care organizations currently which have weak and vulnerable data storage procedures and they also lack to have secure mechanism two foil malware attacks [8].
Such issues have been posing multiple challenges which are related with the integrity of data in healthcare organizations this work has been done to have the novel approach so that we can provide the overview about the current data integrity plot present in the healthcare by studying about attack statistics there has been numerous surveys done under increasing number of the data intrusions specifically which has target on the healthcare industry. HIPPA is an online survey, which is conducted to take on a study on data breaches or cyber-attacks between the year 2009 and 2019. The study has come up with a number of facts and figures, which highlights the fact that malware attacks have increased significantly in the healthcare industry and therefore, strict safeguard measures are required to protect the integrity and confidentiality of data.
Fig1: Graph for data breach attacks
This report also cites 25 largest data breaches done in the health care industry over a period of 10 years. Through these records we can easily characterize the percentage ratio of this type of attack which was implemented mostly in the health care organization. As per the available data, it is evident that 62% of the healthcare cyberattacks have taken place through information technology means and methods. Critical analysis can be done for this type of the categorization, and it shows that there is requirement of systematic and foolproof package to manage the smart hospital security and data integrity as per the study 94% of the health care organizations have reported cyberattacks over their system [9].
In an annual analysis report, it has been clearly highlighted that number of data breaches in the healthcare industry has tripled in the year 2018 as compared to 2017. There has been an online article which shows that average cost of the healthcare record present on the dark web can cost from one dollar $2000. It is the second largest cost for any of the assets present on the dark web in 2019 there were around 16,890 records about the cancer patients which were disclosed at the cancer treatment centers of America, and they were getting targeted by their emails. As per the online news website in early 2019 the American Medical collection agency was hacked for 8 months and around 25 million patients where are tagged. The data of about 25 million patients were compromised during this. This data was sensitive as the billing record and the prescription of the patients was compromised during this attack [9].
Fig2: Pie chart for types of attacks
In a report of the research done by global market insights, it is evident that cybersecurity market might surpass 27 billion humans by the year 2085. Another data breach case, which shook the world in the year 2019 was related with $10,000 in the American homes of the Midwest as they were compromised by their email and network servers. The statistics was discussed in this section to clearly explain about the attack trends and it also provides the review about the attacks done on the health care services in the recent years [10].
A critical study about these attacks can be used to provide clear status of the data integrity and the cyberattacks there in the health care services. The data manipulation can result in uncertainty if we talk about the current data driven world then there are consequences of the uncertainty, and they are frightening. The data integrity breach can also undermine the basics of health, commerce, political systems and infrastructure national security the manipulation of the data is more insidious. This has been questioning the integrity of the data in the industry. For instance, the consequences if the terrorist manipulate all the healthcare sensitive information.
Attack on highly confidential medical data can result in some serious consequences. Such scenarios make it extremely vital to understand the importance of data integrity in the healthcare industry. Systematic literature review on previous methods deployed to maintain integrity of data can help to eliminate such extreme situations. The authors were also able to identify most effective technique which needs more deeper research, and it should be the priority of the security experts to preserve the data integrity.
As per the authors in 2014 there have been different security issues which are present in the mobile cloud computing these issues can be further divided into five major categories which are [11]:
· physical threats and it includes mobile possession, stolen or lost devices
· application based threads which includes the malware, valuable applications, privacy and spyware
· network based mobile security threats which includes address impersonation, Wi-Fi sniffing and denial of service
· that based threats like drive by downloads, jailbroken devices and browser exploits
· other active attacks which include vulnerabilities, information recovery vulnerability, Internet Protocol and unauthorized access of the management interface.
One such usage scenario involves usage of the decoy present in the local computer and it means that we can place the decoy document in the same environment in which it was initially created in the other scenario we can't locate the decoy over the network level in these both scenarios the decoy can be used for protecting the documents on different levels however the decoy can also be used for protecting the software as it is being made to look like the legitimate source code the decoy software will be able to protect the real software from any type of the unauthorized usage another decoy usage scenario can be applied over the voicemail [12] decoy for detecting the malicious activity in this case the decoy is the legitimate voice message but it will have false information.
The cloud-based decoy can also be used for protecting the documents present in the cloud against any type of insider attack there has been few studies which have focused to secure the cloud data with the help of decoy documents. Daughters first carried out the user behavior profiling for determining the unauthorized access end the attacker accesses the cloud then the decoy document is returned so that the information about the real user will be kept secure every decoy document header will have hidden hash-based message authentication code. The verification will be done whether the document is a decoy or not by calculating this value on the basis of the content present in the document if two of these values match then the document is a decoy, and the alert will be issued.
In this case the decor document will be used for two purposes. The first one is to validate whether or not that data access is authorized when abnormal information access is detected and another one is to confuse the attacker by providing false document it is important to note down that only decoy documents will be used in this study, and they are selected manually and added into the file system by the user.
For conducting the systematic literature review we did survey on different healthcare related literature reviews. Some of the authors have also discussed about the administrative qualities and the requirements. Some of them have discussed about the different approaches for privacy and security of the data [13]. It was found that though the data integrity management is crucial in healthcare, and it is the most challenging topic for the current security experts, but it does not have much literature work available on the data integrity issues in the healthcare. It is proved that most of the researchers have focused over the available data integrated techniques or the methods for the healthcare. The references related with this study are based on the research work done by the different researchers.
P. Asma et al. has come up with a review regarding the data handling mechanism. In their paper it provides the comprehensive and brief knowledge related with the big data handling mechanism in healthcare through different aspects. The study further categorizes the mechanism into multiple fields to have easy and comparative analysis. P. P. Biancone et al. discussed about the data quality of healthcare in this paper [14]. Their study shows the different types of the data quality assurance methodologies of the multiple research work done and they are published from the current state of data quality methods available in the healthcare.
These methods can be helpful for the future researchers. In another paper it provides the brilliant review about the current situation of health care to develop road map of the blockchain technology in their paper they discuss about multiple issues like accountability, interoperability and the law related with the implications of health care so that they can analyze the blockchain technology properly. This study also describes the road map for allowing the healthcare industry to use blockchain technology and prepare the taxonomy. This paper has contribution for significant and effective information in the healthcare industry. P.Behrouz et al. Provides the review over the Internet of Things the Internet of Things is the most significant part of the smart hospitals currently the author discuss about the mechanism used for data integration of I OT to have better communication and effective usage.
This study also contributes over different aspects as it is able to provide comprehensive study over multiple mechanisms of data aggregation. All the research work initiatives can be used to provide knowledge regarding healthcare industry the authors also found that there is requirement of having systematic literature review which will have focus over the multiple data integrity techniques, and it will provide the road map to help the future researchers so that they can show their research initiatives. To achieve this goal in this paper we will discuss about the different data integrity management techniques as they were initially discussed in the top quartile research articles. Before creating a solution, it is important to understand the problem in detail and then select the best method for solving it [14].
In one of the research paper the author introduced about anonymous authentication for the network with the help of provable security. Another paper discussed about the role of the big data analysis and mobile cloud computing in the network healthcare. It also includes the capabilities of big data analysis and mobile cloud computing there are many health care methods, applications and tools of the big data analytics which are discussed in this paper. Ho-Gun Ha et al. represents the summary related with augmented reality. It discusses about the current applications of the medication. Initially it discusses about the concept and provide the brief features of the three elements which are software, hardware and the application. It also includes the basic concept about augmented reality [15]. The authors were involved in reviewing multiple applications which are applied in the laboratory. In another paper the author reviews the applications, existing technologies and the concepts present in the health care system.
They were involved in reviewing and noting down the differences between those techniques. They also provided the brief explanation in the personalized IoT healthcare. The major focus was over the ubiquitous wearable devices which are able to collect data from the body of the patient. Khan et el. Proposed and designed the effective monitoring system for the health care with the help of io T and RFID tags. The experiment performed in this paper shows the output against multiple medical emergencies. As per the proposed system it has combination of the microcontrollers which are attached with the sensors and they are used for obtaining the results of an adult rated assessments, get the health status of the patient and monitor it.
This system is also able to increase the power...