A systematic and comprehensive review of security and privacy-preserving challenges in e-health solutions indicates various privacy preserving approaches to ensure privacy and security of electronic health records (EHRs) in the cloud. This paper highlights the research challenges and directions concerning cyber security to build a comprehensive security model for EHR. We carry an intensive study in the IEEE, Science Direct, Google Scholar, PubMed, and ACM for papers on EHR approach published between 2000 and 2018 and summarized them in terms of the architecture types as well as evaluation strategies. We surveyed, investigated, and reviewed various aspects of several articles and identified the following tasks: 1) EHR security and privacy; 2) security and privacy requirements of e-health data in the cloud; 3) EHR cloud architecture, and; 4) diverse EHR cryptographic and non-cryptographic approaches. We also discuss some crucial issues and the ample opportunities for advanced research related to security and privacy of EHRs. Since big data provide a great mine of information and knowledge in e-Health applications, serious privacy and security challenges that require immediate attention exist. Studies must focus on efficient comprehensive security mechanisms for EHR and also explore techniques to maintain the integrity and confidentiality of patients' information. INDEX TERMS e-health, electronic health record, EHR cryptographic and non-cryptographic, security and privacy, systematic review. The associate editor coordinating the review of this manuscript and approving it for publication was Kaiping Xue. comprised of a wide variety of data, such as medical histories, demographics, medication, immunization status, laboratory test reports and other sensitive patient information. EHD systems have remarkable benefits over conventional paper based records. Unlike paper-based records, EHR incurs less manpower, time and physical storage [3]. The advantages of EHRs include easier and swift clinical data access, ability to maintain effective clinical workflows, mitigation of medical errors, enhanced patient safety, reduced medical costs and better and stronger support for clinical decision-making. Realizing the benefits offered by EHD systems more than 90% of healthcare institutions in Australia have adopted this system to facilitate effective medical resource allocation and efficient healthcare [3]. The ability of EHDs to provide better management of healthcare has been ascertained and testified by various users. However the transition from conventional healthcare systems to e-health care throws unique challenges with respect to privacy, confidentiality, and security of medical information. Cloud computing is a recent paradigm in digital technology and is being extensively used in the healthcare industry [4]. It not only provides convenient storage of
Recent development and advancement of information and communication technologies facilitate people in different dimensions of life. Most importantly, in the healthcare industry, this has become more and more involved with the information and communication technology-based services. One of the most important services is monitoring of remote patients, that enables the healthcare providers to observe, diagnose and prescribe the patients without being physically present. The advantage of miniaturization of sensor technologies gives the flexibility of installing in, on or off the body of patients, which is capable of forwarding physiological data wirelessly to remote servers. Such technology is named as Wireless Body Area Network (WBAN). In this paper, WBAN architecture, communication technologies for WBAN, challenges and different aspects of WBAN are illustrated. This paper also describes the architectural limitations of existing WBAN communication frameworks. blueFurthermore, implementation requirements are presented based on IEEE 802.15.6 standard. Finally, as a source of motivation towards future development of research incorporating Software Defined Networking (SDN), Energy Harvesting (EH) and Blockchain technology into WBAN are also provided.
The privacy of Electronic Health Records (EHRs) is facing a major hurdle with outsourcing private health data in the cloud as there exists danger of leaking health information to unauthorized parties. In fact, EHRs are stored on centralized databases that increases the security risk footprint and requires trust in a single authority which cannot effectively protect data from internal attacks. This research focuses on ensuring the patient privacy and data security while sharing the sensitive data across same or different organisations as well as healthcare providers in a distributed environment. This research develops a privacy-preserving framework viz Healthchain based on Blockchain technology that maintains security, privacy, scalability and integrity of the e-health data. The Blockchain is built on Hyperledger fabric, a permissioned distributed ledger solutions by using Hyperledger composer and stores EHRs by utilizing InterPlanetary File System (IPFS) to build this healthchain framework. Moreover, the data stored in the IPFS is encrypted by using a unique cryptographic public key encryption algorithm to create a robust blockchain solution for electronic health data. The objective of the research is to provide a foundation for developing security solutions against cyber-attacks by exploiting the inherent features of the blockchain, and thus contribute to the robustness of healthcare information sharing environments. Through the results, the proposed model shows that the healthcare records are not traceable to unauthorized access as the model stores only the encrypted hash of the records that proves effectiveness in terms of data security, enhanced data privacy, improved data scalability, interoperability and data integrity while sharing and accessing medical records among stakeholders across the healthchain network.
The successful transformation of conventional power grids into Smart Grids (SG) will require robust and scalable communication network infrastructure. The SGs will facilitate bidirectional electricity flow, advanced load management, a self-healing protection mechanism and advanced monitoring capabilities to make the power system more energy efficient and reliable. In this paper SG communication network architectures, standardization efforts and details of potential SG applications are identified. The future deployment of real-time or near-real-time SG applications is dependent on the introduction of a SG compatible communication system that includes a communication protocol for cross-domain traffic flows within the SG. This paper identifies the challenges within the cross-functional domains of the power and communication systems that current research aims to overcome. The status of SG related machine to machine communication system design is described and recommendations are provided for diverse new and innovative traffic features.
Software-defined networking (SDN) offers a novel paradigm for effective network management by decoupling the control plane from the data plane thereby allowing a high level of manageability and programmability. However, the notion of a centralized controller becomes a bottleneck by opening up a host of vulnerabilities to various types of attacks. One of the most harmful, stealthy, and easy to launch attacks against networked systems is the link flooding attack (LFA). In this paper, we demonstrate the vulnerability of the SDN control layer to LFA and how the attack strategy differs when targeting traditional networks which primarily involves attacking the links directly. In LFA, the attacker employs bots to surreptitiously send low rate legitimate traffic on the control channel which ultimately results in disconnecting control plane from the data plane. Mitigating LFA on the control channel remains a challenge in the network security paradigm with the use of network traffic filtering only. To address this challenge, we propose CyberPulse, a novel effective countermeasure, underpinning a machine learning-based classifier to alleviate LFA in SDN. CyberPulse performs network surveillance by classifying network traffic using deep learning techniques and is implemented as an extension module in the Floodlight controller. CyberPulse was evaluated for its accuracy, false positive rate, and effectiveness as compared to competing approaches on realistic networks generated using Mininet. The results show that CyberPulse can classify malicious flows with high accuracy and mitigate them effectively. INDEX TERMS Link flooding attacks, SDN security, OpenFlow, deep learning.
Diabetes Mellitus, or Diabetes, is a disease in which a person's body fails to respond to insulin released by their pancreas, or it does not produce sufficient insulin. People suffering from diabetes are at high risk of developing various eye diseases over time. As a result of advances in machine learning techniques, early detection of diabetic eye disease using an automated system brings substantial benefits over manual detection. A variety of advanced studies relating to the detection of diabetic eye disease have recently been published. This paper presents a systematic survey of automated approaches to diabetic eye disease detection from several aspects, namely: i) available datasets, ii) image preprocessing techniques, iii) deep learning models and iv) performance evaluation metrics. The survey provides a comprehensive synopsis of diabetic eye disease detection approaches, including state of the art field approaches, which aim to provide valuable insight into research communities, healthcare professionals and patients with diabetes.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
334 Leonard St
Brooklyn, NY 11211
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.