2021 Report the Largest Healthcare Data Breaches in History

What Do Hackers Do with Stolen Medical Information?

By Caroline Campbell on Jul 9, 2021
Journal of Organizational and End User Computing (JOEUC)
Prof. Sang-Bing Tsai (University of Electronic Science and Technology of
China Zhongshan Institute & Civil Aviation University of China, China)
  • Full Gold Open Access
  • Indexed in Web of Science SCI & Scopus
  • Covers Privacy, Security, Healthcare, & Big Data
Quick Links
Bibliographic Information
Pricing & Purchase Options
Table of Contents
Recommend to Library
Access Full Text
Throughout 2021, multiple medical data hacks have been reported, including the New South Wales Ministry of Health, multiple vendors and hospitals in the United States, European Medicines Agency (EMA), and more. With the recent push for telehealth and applications coupled with the influx of patients internationally, the number of attacks is on the rise ranging from data leaks to locking up hospital’s computers and demanding a ransom.

Healthcare data
breaches spiked
55% in 2020
(Bitglass)
More than
16 million patients
have been
impacted by data
breaches in 2021
(SC Magazine)
CVS leaked
1 billion records
for searches on
their website
(Forbes)
Security breaches cost
$6 trillion
for healthcare
companies
(Tech Jury)

According to CBS This Morning, these hacks are occurring as hackers can profit up to US$ 500 per record that is obtained, as it contains personal information, including social security number, financial information, date of birth, medical record numbers, and insurance information. With this information, hackers can utilize information to create full “identity kits” that contain “counterfeit passports, ID cards, and social security cards. Once the full kit is completed, they can sell for up to $2,000 a pop.”
Additionally, many hospitals, medical vendors, and health organizations not only worry about their patient’s medical information being leaked and sold but their patient’s records being scrambled and incorrect in their system risking the wrong treatment for their patients. To help patients and institutions in protecting their data, Profs. Mengxia Shuai, from the University of Science and Technology of China, China, et al. propose an innovative lightweight three-factor anonymous authentication scheme to protect personalized healthcare applications, in their open access article “A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications,” sourced from IGI Global’s full gold OA journal, Journal of Organizational and End User Computing (JOEUC).
Journal of Organizational and End User
Computing (JOEUC)
International Journal of Intelligent Information Technologies (IJIIT)
International Journal of Cyber Warfare and
Terrorism (IJCWT)
International Journal of Applied Research on Public Health Management (IJARPHM)


View a Preview of the Open Access Article Below
The Internet of Things (IoT) is an emerging mode of modern wireless telecommunications, which allows objects to be sensed or controlled remotely over existing network infrastructure. By combining with cloud computing and fog computing (Qi, Zhang, Dou, & Ni, 2017; Gill, Chana, & Buyya, 2017; Qi, Yu, & Zhou, 2017; Gong, Qi, & Xu, 2018; Qi et al., 2018a), IoT devices can be used to build many service-based applications, such as smart devices (Cui, Zhang, Cai, Liu, & Li, 2018; Cheng, Xu, Tang, Sheng, & Cai, 2018), smart home (Liu, et al., 2018) and security-related applications (Wang, Li, Shi, Lian, & Ye, 2016; Qi, Zhou, Yu, & Liu, 2017; Ma, Luo, Li, Bao, & Zhang, 2018; Zhang, Qin, Zhang, Liu, & Luo, 2018; Qi et al., 2018b). IoT devices can also be used to enable remote health monitoring, which is a new field known as wireless medical sensor networks (WMSNs). WMSNs have attracted lots of attention in both academia and industry because of the potential in improving the quality of medical services (Walczak & Mann, 2010; Lee, Ghapanchi, Talaei-Khoei, & Ray, 2015). Through WMSNs, healthcare professionals are able to access the patients’ sensitive data collected from the medical sensor nodes which are placed on/in patients’ bodies, and provide remote medical treatment, emergency medical assistance or give some constructive advice on the patients’ further treatment.
A typical structure of WMSNs for personalized healthcare applications is demonstrated in Figure 1. Although WMSNs bring a lot of convenience to people’s life (Siddesh et al., 2017), security and privacy issues in WMSNs are becoming great challenges due to the sensitiveness of medical system (Ameen, Liu, & Kwak, 2012; Xu, Qi, Dou, & Yu, 2017). The medical data collected from the medical sensor nodes is sensitive, and the privacy of these data is protected legally. Due to the open feature of wireless communication, an adversary can intercept and alter the transmitted messages easily. Once obtaining these sensitive data, an adversary may acquaint the disease what the patient has and profit financially by selling sensitive data, it is a serious violation of the patient’s privacy. Further, the adversary can even misreport or distort the patient’s physiological data to cause physical harm, it may result in improper diagnosis and treatment. Therefore, it is very important to design an effective authentication scheme to guarantee secure communication and protect patients’ privacy in WMSNs.
Benefits of Publishing Open Access with IGI Global
  • Rigorous & Expediate Publishing
  • Networking & Collaboration
  • Acceleration of Citation Impact
  • Increased Discoverability
Quick Links
Open Access Publishing
Submit an OA Journal Proposal
Submit an OA Manuscript
View all OA Journals
Read and Publish Model
In the past decade, many authentication schemes are proposed to solve the security issues in WMSNs. In 2007, Hu et al. (2007) designed a telecardiology sensor network platform for real-time healthcare data collection using the symmetric cryptography. Two years later, Huang et al. (2009) presented a healthcare monitoring architecture for monitoring elderly or chronic patients in their residence, which used Advanced Encryption Standard (AES) algorithm to provide authentication and secret communication. Unfortunately, neither of them could achieve mutual authentication successfully. In 2009, Malasri et al. (2009) designed a secure WMSN system for healthcare based on symmetric cryptography and elliptic curve cryptography (ECC), they implemented their mechanisms on a wireless mote platform. Later, Das (2009) presented a two-factor user authentication protocol for WSN and claimed their protocol could provide strong authentication and resist various attacks. Unfortunately, Khan et al. (2010) pointed out that Das’s scheme (Das, 2009) was vulnerable to privileged-insider attack and Gateway node (GWN) bypass attack. In 2012, Kumar et al. (2012) presented an efficient and strong authentication protocol, named E-SAP, for healthcare application using WMSNs. They demonstrated that their protocol was more secure against many practical attacks. But later, He et al. (2015) in 2015 pointed out that the scheme proposed by Kumar et al. failed to resist some known attacks, liking off-line password guessing attack and privileged insider attack…
Interested in Reading the Rest of this Article (Full Text)?
Click Here to Freely Access Through IGI Global’s InfoSci Platform

Complimentary Research Articles and Chapters on
Cybersecurity & Healthcare
Journal of Organizational and End User Computing (JOEUC)
Prof. Sang-Bing Tsai (University of Electronic Science and Technology of China Zhongshan Institute, China and Research Center for Environment and Sustainable Development, Civil Aviation University of China, China)
  • Full Gold Open Access
  • Indexed in Web of Science SCI & Scopus
  • Covers Privacy, Security, Healthcare, & Big Data
Quick Links
Bibliographic Information
Pricing & Purchase Options
Table of Contents
Recommend to Library
Access Full Text
"Factors Influencing Security Incidents on Personal Computing Devices"
Profs. Barbara Hewitt (Texas State University, San Marcos, USA) et al.
International Journal of Intelligent Information
Technologies (IJIIT)
Prof. Vijayan Sugumaran (Oakland University, USA)
  • Hybrid Open Access
  • Indexed in Web of Science, Scopus, & Ei Compendex
  • Covers Intelligent Systems, E-Commerce, & Privacy
Quick Links
Bibliographic Information
Pricing & Purchase Options
Table of Contents
Recommend to Library
Access Full Text
DeTER Framework: A Novel Paradigm for Addressing Cybersecurity Concerns in
Mobile Healthcare

Profs. Rangarajan (Ray) Parthasarathy (University of Illinois at Urbana-Champaign, USA) et al.
International Journal of Cyber Warfare and Terrorism (IJCWT)
Profs. Graeme Pye (Deakin University, Australia) et al.
  • Hybrid Open Access
  • Indexed in Web of Science, Scopus, & INSPEC
  • Covers Censorship, Hacking, & Homeland Security
Quick Links
Bibliographic Information
Pricing & Purchase Options
Table of Contents
Recommend to Library
Access Full Text
COVID-19 and Biocybersecurity's Increasing Role on Defending Forward
Profs. Xavier Palmer (Old Dominion University, USA) et al.
International Journal of Applied Research on Public Health Management (IJARPHM)
Profs. Qiang (Shawn) Cheng (University of Kentucky, USA) et al.
  • Hybrid Open Access
  • Insights from 50+ Countries
  • Covers Health Information Security, Public Health Legislation, & Hospital Management
Quick Links
Bibliographic Information
Pricing & Purchase Options
Table of Contents
Recommend to Library
Access Full Text
Exploring the Complex Nature of Ethical Cultures in Health Care Organizations
Profs. Darrell Norman Burrell (The Florida Institute of Technology, Melbourne, USA & The Chicago School of Professional Psychology, Chicago, USA) et al.
View All Chapters and Articles on This Topic
The “View All Chapters and Articles on This Topic” navigates to IGI Global’s Demo Account, which provides a sample of the IGI Global content available through IGI Global’s e-Book Collection (6,600+ e-books) and e-Journal Collection (140+ e-journals) databases. If interested in having full access to this peer-reviewed research content,
Recommend These Valuable Research Tools to Your Library
For Journalists Interested in Additional Trending Research:
Contact IGI Global’s Marketing Team at marketing@igi-global.com or 717-533-8845 ext. 100 to access additional peer-reviewed resources to integrate into your latest news stories.

About IGI Global

Founded in 1988, IGI Global, an international academic publisher, is committed to producing the highest quality research (as an active full member of the Committee on Publication Ethics “COPE”) and ensuring the timely dissemination of innovative research findings through an expeditious and technologically advanced publishing process. Through their commitment to supporting the research community ahead of profitability, and taking a chance on virtually untapped topic coverage, IGI Global has been able to collaborate with over 100,000+ researchers from some of the most prominent research institutions around the world to publish the most emerging, peer-reviewed research across 350+ topics in 11 subject areas including business, computer science, education, engineering, social sciences, and more. To learn more about IGI Global, click here.

Newsroom Contact

Caroline Campbell
Assistant Director of Marketing and Sales
(717) 533-8845, ext. 144
ccampbell@igi-global.com
www.igi-global.com

Browse for more posts in:
Research TrendsJournals

No comments Comments

Log in or sign up to comment.
Be the first to comment!

More from IGI Global

The World Health Organization (WHO) has reported a surge in Lassa fever cases in Nigeria, emphasizing the urgent need for containment measures.
IGI GlobalRead More
Medical, Healthcare, and Life SciencesHealthcare Information SystemsBooks & E-BooksResearch Trends
IGI Global congratulates the winners of this year's Journal Reviewer Award
IGI GlobalRead More
JournalsAwards & RecognitionOpen Access
For decades, academic publishing has been plagued with discrepancies surrounding authorship of scholarly research...
IGI GlobalRead More
Books & E-BooksAcquisitions
Two IGI Global publications have been recognized by Doody's for their excellence and niche topic focus.
IGI GlobalRead More
Medical, Healthcare, and Life SciencesMedia and CommunicationsBooks & E-BooksAwards & Recognition
Digital Inclusion Week underscored the urgent need for a national digital equity plan in the US due to disparities in internet access and digital skills.
IGI GlobalRead More
The majority of IGI Global's books Frontlist is now indexed by Scopus. Learn what this prestigious recognition means for the publisher and the experts behind these books.
IGI GlobalRead More
Books & E-BooksAwards & RecognitionReviews & Indexing
IGI Global is excited to introduce a new initiative to provide detailed insights into various fascinating subjects. Our brochures offer a comprehensive overview of timely publications covering the latest research topics...
IGI GlobalRead More
EducationBusiness and ManagementComputer Science and Information TechnologySocial Sciences and HumanitiesBooks & E-Books
Hear from Dr. Velliaris, who was voted as a Top 30 Global Guru in Education.
EducationBooks & E-BooksInterviewAuthor News
Cocoa prices surging to $10,000 per metric ton challenge chocolate manufacturers and consumers, risking supply chain stability and higher retail prices...
IGI GlobalRead More
Business and ManagementEnvironmental, Agricultural, and Physical SciencesSustainable DevelopmentBooks & E-BooksResearch Trends
First Previous 1 2 3 4 5 6 7 8 9 10  ... Next Last