Security and Privacy in the Medical Internet of Things: A Review

被引:155
作者
Sun, Wencheng [1 ]
Cai, Zhiping [1 ]
Li, Yangyang [2 ]
Liu, Fang [3 ]
Fang, Shengqun [1 ]
Wang, Guoyan [4 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
[2] China Acad Elect & Informat Technol, Innovat Ctr, Beijing 100041, Peoples R China
[3] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[4] SysCan Biotechnol Co Ltd, Suzhou 215000, Peoples R China
基金
中国国家自然科学基金;
关键词
KEYWORD SEARCH; HEALTH; ACCESS;
D O I
10.1155/2018/5978636
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Medical Internet of Things, also well known as MIoT, is playing a more and more important role in improving the health, safety, and care of billions of people after its showing up. Instead of going to the hospital for help, patients' health-related parameters can be monitored remotely, continuously, and in real time, then processed, and transferred to medical data center, such as cloud storage, which greatly increases the efficiency, convenience, and cost performance of healthcare. The amount of data handled by MIoT devices grows exponentially, which means higher exposure of sensitive data. The security and privacy of the data collected from MIoT devices, either during their transmission to a cloud or while stored in a cloud, are major unsolved concerns. This paper focuses on the security and privacy requirements related to data flow in MIoT. In addition, we make in-depth study on the existing solutions to security and privacy issues, together with the open challenges and research issues for future work.
引用
收藏
页数:9
相关论文
共 31 条
[1]  
Abdmeziem M. R., 2014, INT C AD HOC NETWORK, P35
[2]  
Bacis E., 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, P217
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]   Privacy Preserving String Matching for Cloud Computing [J].
Bezawada, Bruhadeshwar ;
Liu, Alex X. ;
Jayaraman, Bargav ;
Wang, Ann L. ;
Li, Rui .
2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 2015, :609-618
[5]   Using statistical and machine learning to help institutions detect suspicious access to electronic health records [J].
Boxwala, Aziz A. ;
Kim, Jihoon ;
Grillo, Janice M. ;
Ohno-Machado, Lucila .
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2011, 18 (04) :498-505
[6]  
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[7]   A novel access control protocol using proxy signatures for cloud-based health information exchange [J].
Chandrasekhar, Santosh ;
Ibrahim, Ahmed ;
Singhal, Mukesh .
COMPUTERS & SECURITY, 2017, 67 :73-88
[8]  
Chen You, 2012, AMIA Annu Symp Proc, V2012, P93
[9]   A medical healthcare system for privacy protection based on IoT [J].
Gong, Tianhe ;
Huang, Haiping ;
Li, Pengfei ;
Zhang, Kai ;
Jiang, Hao .
2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2015, :217-222
[10]   Reducing Healthcare Costs Facilitated by Surgical Auditing: A Systematic Review [J].
Govaert, Johannes Arthuur ;
van Bommel, Anne Charlotte Madeline ;
van Dijk, Wouter Antonie ;
van Leersum, Nicoline Johanneke ;
Tollenaar, Robertus Alexandre Eduard Mattheus ;
Wouters, Michael Wilhemus Jacobus Maria .
WORLD JOURNAL OF SURGERY, 2015, 39 (07) :1672-1680