Author:
Vithanwattana Nattaruedee,Karthick Gayathri,Mapp Glenford,George Carlisle,Samuels Ann
Abstract
AbstractThe deployment of Internet of Things platforms as well as the use of mobile and wireless technologies to support healthcare environments have enormous potential to transform healthcare. This has also led to a desire to make eHealth and mHealth part of national healthcare systems. The COVID-19 pandemic has accelerated the requirement to do this to reduce the number of patients needing to attend hospitals and General Practitioner surgeries. This direction, however, has resulted in a renewed need to look at security of future healthcare platforms including information and data security as well as network and cyber-physical security. There have been security frameworks that were developed to address such issues. However, it is necessary to develop a security framework with a combination of security mechanisms that can be used to provide all the essential security requirements for healthcare systems. In addition, there is now a need to move from frameworks to prototypes which is the focus of this paper. Several security frameworks for eHealth and mHealth are first examined. This leads to a new reference model from which an implementation framework is developed using new mechanisms such as Capabilities, Secure Remote Procedure Calls, and a Service Management Framework. The prototype is then evaluated against practical security requirements.
Publisher
Springer Science and Business Media LLC
Subject
Renewable Energy, Sustainability and the Environment,Artificial Intelligence,Computer Science Applications,Computer Networks and Communications
Reference30 articles.
1. NHS Digital (N/A) Transparency notice: how we use your personal data [online] Available at: https://digital.nhs.uk/about-nhs-digital/our-work/keeping-patient-data-safe/gdpr/gdpr-register (Accessed: 3 August 2021)
2. Tahir MN (2007) C-RBAC: contextual role-based access control model. Ubiquitous Comput Commun J 2(3):67–74
3. Barkley J (1995) Implementing role-based access control using object technology. In: Proceedings of the First ACM Workshop on Role-Based Access Control (RBAC), pp. 93–98. https://doi.org/10.1145/270152.270192
4. U.S. Department of Health and Human Services (2013) Summary of the HIPPA Privacy Rule [online] Available at: https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html (Accessed: 3 August 2021)
5. Aver H (2021) Ransomware attacks on healthcare [online] Available at: https://www.kaspersky.co.uk/blog/ransomware-vs-healthcare/22670/ (Accessed: 6 August 2021)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献