| Journal of Organizational and End User Computing (JOEUC) | Prof. Sang-Bing Tsai (University of Electronic Science and Technology of China Zhongshan Institute & Civil Aviation University of China, China) | - Full Gold Open Access
- Indexed in Web of Science SCI & Scopus
- Covers Privacy, Security, Healthcare, & Big Data
|
| |
|
|
Throughout 2021, multiple medical data hacks have been reported, including the New South Wales Ministry of Health, multiple vendors and hospitals in the United States, European Medicines Agency (EMA), and more. With the recent push for telehealth and applications coupled with the influx of patients internationally, the number of attacks is on the rise ranging from data leaks to locking up hospital’s computers and demanding a ransom.
|
Healthcare data breaches spiked 55% in 2020 (Bitglass)
|
|
|
More than 16 million patients
have been impacted by data breaches in 2021 (SC Magazine) |
|
| CVS leaked 1 billion records
for searches on their website (Forbes) |
|
| Security breaches cost $6 trillion
for healthcare companies (Tech Jury) |
|
|
|
According to
CBS This Morning, these hacks are occurring as hackers can profit up to US$ 500 per record that is obtained, as it contains personal information, including social security number, financial information, date of birth, medical record numbers, and insurance information. With this information, hackers can utilize information to create full “identity kits” that contain “counterfeit passports, ID cards, and social security cards. Once the full kit is completed, they can sell for up to $2,000 a pop.”
Additionally, many hospitals, medical vendors, and health organizations not only worry about their patient’s medical information being leaked and sold but their patient’s records being scrambled and incorrect in their system risking the wrong treatment for their patients. To help patients and institutions in protecting their data, Profs. Mengxia Shuai, from the University of Science and Technology of China, China, et al. propose an innovative lightweight three-factor anonymous authentication scheme to protect personalized healthcare applications, in their open access article “
A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications,” sourced from IGI Global’s full gold OA journal,
Journal of Organizational and End User Computing (JOEUC).
| View a Preview of the Open Access Article Below |
|
The Internet of Things (IoT) is an emerging mode of modern wireless telecommunications, which allows objects to be sensed or controlled remotely over existing network infrastructure. By combining with cloud computing and fog computing (Qi, Zhang, Dou, & Ni, 2017; Gill, Chana, & Buyya, 2017; Qi, Yu, & Zhou, 2017; Gong, Qi, & Xu, 2018; Qi et al., 2018a), IoT devices can be used to build many service-based applications, such as smart devices (Cui, Zhang, Cai, Liu, & Li, 2018; Cheng, Xu, Tang, Sheng, & Cai, 2018), smart home (Liu, et al., 2018) and security-related applications (Wang, Li, Shi, Lian, & Ye, 2016; Qi, Zhou, Yu, & Liu, 2017; Ma, Luo, Li, Bao, & Zhang, 2018; Zhang, Qin, Zhang, Liu, & Luo, 2018; Qi et al., 2018b). IoT devices can also be used to enable remote health monitoring, which is a new field known as wireless medical sensor networks (WMSNs). WMSNs have attracted lots of attention in both academia and industry because of the potential in improving the quality of medical services (Walczak & Mann, 2010; Lee, Ghapanchi, Talaei-Khoei, & Ray, 2015). Through WMSNs, healthcare professionals are able to access the patients’ sensitive data collected from the medical sensor nodes which are placed on/in patients’ bodies, and provide remote medical treatment, emergency medical assistance or give some constructive advice on the patients’ further treatment.
A typical structure of WMSNs for personalized healthcare applications is demonstrated in Figure 1. Although WMSNs bring a lot of convenience to people’s life (Siddesh et al., 2017), security and privacy issues in WMSNs are becoming great challenges due to the sensitiveness of medical system (Ameen, Liu, & Kwak, 2012; Xu, Qi, Dou, & Yu, 2017). The medical data collected from the medical sensor nodes is sensitive, and the privacy of these data is protected legally. Due to the open feature of wireless communication, an adversary can intercept and alter the transmitted messages easily. Once obtaining these sensitive data, an adversary may acquaint the disease what the patient has and profit financially by selling sensitive data, it is a serious violation of the patient’s privacy. Further, the adversary can even misreport or distort the patient’s physiological data to cause physical harm, it may result in improper diagnosis and treatment. Therefore, it is very important to design an effective authentication scheme to guarantee secure communication and protect patients’ privacy in WMSNs.
In the past decade, many authentication schemes are proposed to solve the security issues in WMSNs. In 2007, Hu et al. (2007) designed a telecardiology sensor network platform for real-time healthcare data collection using the symmetric cryptography. Two years later, Huang et al. (2009) presented a healthcare monitoring architecture for monitoring elderly or chronic patients in their residence, which used Advanced Encryption Standard (AES) algorithm to provide authentication and secret communication. Unfortunately, neither of them could achieve mutual authentication successfully. In 2009, Malasri et al. (2009) designed a secure WMSN system for healthcare based on symmetric cryptography and elliptic curve cryptography (ECC), they implemented their mechanisms on a wireless mote platform. Later, Das (2009) presented a two-factor user authentication protocol for WSN and claimed their protocol could provide strong authentication and resist various attacks. Unfortunately, Khan et al. (2010) pointed out that Das’s scheme (Das, 2009) was vulnerable to privileged-insider attack and Gateway node (GWN) bypass attack. In 2012, Kumar et al. (2012) presented an efficient and strong authentication protocol, named E-SAP, for healthcare application using WMSNs. They demonstrated that their protocol was more secure against many practical attacks. But later, He et al. (2015) in 2015 pointed out that the scheme proposed by Kumar et al. failed to resist some known attacks, liking off-line password guessing attack and privileged insider attack…
Complimentary Research Articles and Chapters on Cybersecurity & Healthcare | | Journal of Organizational and End User Computing (JOEUC) | Prof. Sang-Bing Tsai (University of Electronic Science and Technology of China Zhongshan Institute, China and Research Center for Environment and Sustainable Development, Civil Aviation University of China, China) | - Full Gold Open Access
- Indexed in Web of Science SCI & Scopus
- Covers Privacy, Security, Healthcare, & Big Data
|
|
| |
| |
|
| | | | | | | | View All Chapters and Articles on This Topic | | The “View All Chapters and Articles on This Topic” navigates to IGI Global’s Demo Account, which provides a sample of the IGI Global content available through IGI Global’s e-Book Collection (6,600+ e-books) and e-Journal Collection (140+ e-journals) databases. If interested in having full access to this peer-reviewed research content, Recommend These Valuable Research Tools to Your Library | | | | For Journalists Interested in Additional Trending Research:
Contact IGI Global’s Marketing Team at marketing@igi-global.com or 717-533-8845 ext. 100 to access additional peer-reviewed resources to integrate into your latest news stories. |
|
|
About IGI Global
Founded in 1988, IGI Global, an international academic publisher, is committed to producing the highest quality research (as an active full member of the Committee on Publication Ethics “COPE”) and ensuring the timely dissemination of innovative research findings through an expeditious and technologically advanced publishing process. Through their commitment to supporting the research community ahead of profitability, and taking a chance on virtually untapped topic coverage, IGI Global has been able to collaborate with over 100,000+ researchers from some of the most prominent research institutions around the world to publish the most emerging, peer-reviewed research across 350+ topics in 11 subject areas including business, computer science, education, engineering, social sciences, and more. To learn more about IGI Global, click here.
Newsroom Contact
Caroline Campbell
Assistant Director of Marketing and Sales
(717) 533-8845, ext. 144
ccampbell@igi-global.com
www.igi-global.com