Security of Cloud-Based Medical Internet of Things (MIoTs): A Survey

Security of Cloud-Based Medical Internet of Things (MIoTs): A Survey

Akshat Gaurav, Konstantinos Psannis, Dragan Peraković
DOI: 10.4018/IJSSCI.285593
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In this digital era expectations for medical quality have increased. As the number of patients continues to increase, conventional health care methods are having to deal with new complications. In light of these observations, researchers suggested a hybrid combination of conventional health care methods with IoT technology and develop MIoT. The goal of IoMT is to ensure that patients can respond more effectively and efficiently to their treatment. But preserving user privacy is a critical issue when it comes to collecting and handling highly sensitive personal health data. However, IoMTs have limited processing power; hence, they can only implement minimal security techniques. Consequently, throughout the health data transfer through MIoT, patient’s data is at risk of data leakage. This manuscript per the authors emphasizes the need of implementing suitable security measures to increase the IoMT's resilience to cyberattacks. Additionally, this manuscript per the authors discusses the main security and privacy issues associated with IoMT and provide an overview of existing techniques.
Article Preview
Top

Introduction

E-healthcare has developed as one of the most important service areas in the last decade, attracting the attention of the academic community worldwide (Habibzadeh et al., 2019). The healthcare industry is expanding at an exponential rate as a result of new data transmission and automation technologies; the Medical Internet of Things (MIoT) is the result of this development. MIoT evolved from the Internet of Things (IoT), which allows physicians and patients to communicate and collect, analyze, and distribute health-related data via wireless media (Hossain, 2015; Lin et al., 2020). MIoTs can monitor and improve a patient's health in real time, while also increasing their physical flexibility and mobility. MIoTs are capable of tracking a patient's overall health, as well as their physical mobility and flexibility, in real time, as represented in Figure 1. Patients can improve their health by using equipment such as heart monitoring sensors or remote sleep monitoring sensors. According to predictions, there will be about 50 billion MioT in circulation by 2025 (Kumar & Chouhan, 2021). MIoT used a number of technologies, including IoS, CPS, AI, and big data, to handle large amounts of data (Dourado et al., 2020; Li et al., 2018; Parah et al., 2020; C. Zhu et al., 2018).

There are many problems that will impede the broad implementation of MIoT, such as privacy and security concerns regarding patient data and personal information (AlZu’bi et al., 2019; Masud et al., 2020). Several malicious attacks are conceivable with MIoT devices, including eavesdropping, data leak, DDoS (Gaurav, Gupta, Hsu, Peraković, et al., 2021; Gaurav, Gupta, Hsu, Yamaguchi, et al., 2021; Gaurav & Singh, 2017), and denial of service (DoS) (Gaba et al., 2020; Y. Sun et al., 2019). At the same time, there is a security issue for the medical user and the manufacturer due to the inadequate use of security protocols (A. Rahman et al., 2020). Hackers are more interested in MIoT than most other systems since it has a significant amount of computing capacity. Because of this, electronic medical records of patients, home health data, and other types of data are the prime targets of data breach (Hossain & Muhammad, 2017; Muhammad et al., 2020). Data breaches are increasing at an alarming rate as a consequence of hacking. Due to the many flaws and vulnerabilities in the current healthcare sector software, in 2019, almost 41.4 million records were exposed (Parah et al., 2020). The number of breaches almost quadrupled between 2017 and 2018, with 15 million data exposed in 2018 compared to the previous year (Kira, 2020). In 2020, everything will be pretty much the same. The Florida Orthopedic Institute has reportedly said that it has discovered a data breach that affects approximately 640,000 patient information. In June 2020, “elite emergency physicians” discovered a similar security problem, which ultimately led to the theft of 550,000 patient records (Davis, 2020). Inadequate authentication or authorisation, lack of encryption of data transmission, unencrypted interfaces, insecure software, and privacy concerns were highlighted as security flaws in the 10 most popular smartwatches (at the time) in a 2015 HP Fortify study (Rawlinson, 2015; Y. Sun et al., 2019).

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing