IoT Health Data in Electronic Health Records (EHR): Security and Privacy Issues in Era of 6G

Authors

  • Ana Koren University of Zagreb, Faculty of Electrical Engineering and Computing, Unska 3, 10000, Zagreb, Croatia
  • Ramjee Prasad CTIF GLOBAL CAPSULE, Department of Business Development and Technology, Aarhus University, Herning, Denmark

DOI:

https://doi.org/10.13052/jicts2245-800X.1014

Keywords:

wearable sensors; eHealth; healthcare; 6G; nternet of Things; Internet of Medical Things; Electronic Health Record; EHR

Abstract

Millions of wearable devices with embedded sensors (e.g., fitness trackers) are present in daily lives of its users, with the number growing continuously, especially with the approaching 6G communication technology. These devices are helping their users in monitoring daily activities and promoting positive health habits. Potential integration of such collected data into central medical system would lead to more personalized healthcare and an improved patient-physician experience. However, this process is met with several challenges, as medical data is of a highly sensitive nature. This paper focuses on the security and privacy issues for such a process. After providing a comprehensive list of security and privacy threats relevant to data collection and its handling within a Central Health Information system, the paper addresses the challenges of designing a secure system and offeres recommendations, solutions and guidelines for identified pre-6G and 6G security and privacy issues.

Downloads

Download data is not yet available.

Author Biographies

Ana Koren, University of Zagreb, Faculty of Electrical Engineering and Computing, Unska 3, 10000, Zagreb, Croatia

Ana Koren completed undergraduate studies in 2012, and graduate studies in 2014 at the Faculty of Electrical Engineering and Computing, University of Zagreb and is currently enrolled in a PhD programme at University of Zagreb. She has been a visiting researcher at TU Graz (Austria), Universidad de Zaragoza (Spain) and Universidad Nacional de Colombia (in Bogotá, Colombia). Main areas of interest include e-Health and wireless personal communications. She worked on implementing Croatia’s Central Health Information System.

Ramjee Prasad, CTIF GLOBAL CAPSULE, Department of Business Development and Technology, Aarhus University, Herning, Denmark

Ramjee Prasad, Fellow IEEE, IET, IETE, and WWRF, is a Professor of Future Technologies for Business Ecosystem Innovation (FT4BI) in the Department of Business Development and Technology, Aarhus University, Herning, Denmark. He is the Founder President of the CTIF Global Capsule (CGC). He is also the Founder Chairman of the Global ICT Standardization Forum for India, established in 2009. He has been honored by the University of Rome “Tor Vergata”, Italy as a Distinguished Professor of the Department of Clinical Sciences and Translational Medicine on March 15, 2016. He is an Honorary Professor of the University of Cape Town, South Africa, and the University of KwaZulu-Natal, South Africa. Dr. Prasad has received Ridderkorset of Dannebrogordenen (Knight of the Dannebrog) in 2010 from the Danish Queen for the internationalization of top-class telecommunication research and education. He has received several international awards such as IEEE Communications Society Wireless Communications Technical Committee Recognition Award in 2003 for making contribution in the field of “Personal, Wireless and Mobile Systems and Networks”, Telenor’s Research Award in 2005 for impressive merits, both academic and organizational within the field of wireless and personal communication, 2014 IEEE AESS Outstanding Organizational Leadership Award for: “Organizational Leadership in developing and globalizing the CTIF (Center for TeleInFrastruktur) Research Network”, and so on. He has been the Project Coordinator of several EC projects namely, MAGNET, MAGNET Beyond, eWALL. He has published more than 50 books, 1000 plus journal and conference publications, more than 15 patents, over 140 Ph.D. Graduates and a larger number of Masters (over 250). Several of his students are today worldwide telecommunication leaders themselves.

References

S. S. Kumar, “Emerging Technologies and Sensors That Can Be Used During the COVID-19 Pandemic,” 2020 International Conference on UK-China Emerging Technologies (UCET), 2020, pp. 1–4, doi: 10.1109/UCET51115.2020.9205424.

Fitness Tracker Market Size, Share & COVID-19 Impact Analysis (2020–2027), Fortune Business Insights, Oct 2020.

P. Huang, C. Lin, Y. Wang and H. Hsieh, “Development of Health Care System Based on Wearable Devices,” 2019 Prognostics and System Health Management Conference (PHM-Paris), 2019, pp. 249–252, doi: 10.1109/PHM-Paris.2019.00049.

R. Qian, “Healthcare on Consumer-grade Wearable Devices,” 2020 IEEE 3rd International Conference of Safe Production and Informatization (IICSPI), 2020, pp. 298–303, doi: 10.1109/IICSPI51290.2020.9332400.

G. Assenza, C. Fioravanti, S. Guarino and V. Petrassi, “New Perspectives on Wearable Devices and Electronic Health Record Systems,” 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT, 2020, pp. 740–745, doi: 10.1109/MetroInd4.0IoT48571.2020.9138170.

X. Ding et al., “Wearable Sensing and Telehealth Technology with Potential Applications in the Coronavirus Pandemic,” in IEEE Reviews in Biomedical Engineering, vol. 14, pp. 48–70, 2021, doi: 10.1109/RBME.2020.2992838.

K. Ueafuea et al., “Potential Applications of Mobile and Wearable Devices for Psychological Support During the COVID-19 Pandemic: A Review,” in IEEE Sensors Journal, vol. 21, no. 6, pp. 7162–7178, 15 March 15, 2021, doi: 10.1109/JSEN.2020.3046259.

F. A. A. Naqiyuddin, W. Mansor, N. M. Sallehuddin, M. N. S. Mohd Johari, M. A. S. Shazlan and A. N. Bakar, “Wearable Social Distancing Detection System,” 2020 IEEE International RF and Microwave Conference (RFM), 2020, pp. 1–4, doi: 10.1109/RFM50841.2020.9344786.

K. Grifantini, “Tracking Sleep to Optimize Health,” in IEEE Pulse, vol. 11, no. 5, pp. 12–16, Sept.–Oct. 2020, doi: 10.1109/MPULS.2020.3022142.

N. Khiadani, “Vision, Requirements and Challenges of Sixth Generation (6G) Networks,” 2020 6th Iranian Conference on Signal Processing and Intelligent Systems (ICSPIS), 2020, pp. 1–4, doi: 10.1109/ICSPIS51611.2020.9349580.

C. Yizhan, W. Zhong, H. Da and L. Ruosen, “6G Is Coming : Discussion on Key Candidate Technologies and Application Scenarios,” 2020 International Conference on Computer Communication and Network Security (CCNS), 2020, pp. 59–62, doi: 10.1109/CCNS50731.2020.00022.

F. Guo, F. R. Yu, H. Zhang, X. Li, H. Ji and V. C. M. Leung, “Enabling Massive IoT Toward 6G: A Comprehensive Survey,” in IEEE Internet of Things Journal, vol. 8, no. 15, pp. 11891–11915, 1 Aug.1, 2021, doi: 10.1109/JIOT.2021.3063686.

D. C. Nguyen et al., “6G Internet of Things: A Comprehensive Survey,” in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2021.3103320.

Evenson KR, Goto MM, Furberg RD. Systematic review of the validity and reliability of consumer-wearable activity trackers. Int J Behav Nutr Phys Act. Dec 2015. doi: 10.1186/s12966-015-0314-1.

Feehan LM, Geldman J, Sayre EC, Park C, Ezzat AM, Yoo JY, Hamilton CB, Li LC. “Accuracy of Fitbit Devices: Systematic Review and Narrative Syntheses of Quantitative Data. JMIR Mhealth Uhealth”, Aug 2018. doi: 10.2196/10527.

M. G. Rahman, M. Z. Islam, T. Bossomaier and Junbin Gao, “CAIRAD: A co-appearance-based analysis for Incorrect Records and Attribute-values Detection,” The 2012 International Joint Conference on Neural Networks (IJCNN), Brisbane, QLD, 2012, pp. 1–10.

M. G. Rahman, M. Z. Islam, “FIMUS: A decision tree-based missing value imputation technique for data pre-processing,” Volume 56 Issue C, January 2014, pp. 311–327.

O. Salem, A. Guerassimov, A. Mehaoua, A. Marcus and B. Furht, “Sensor fault and patient anomaly detection and clas-sification in medical wireless sensor networks,” 2013 IEEE International Conference on Communications (ICC), Budapest, 2013, pp. 4373–4378.

D. Yang et al., “A Novel Adaptive Spectrum Noise Cancellation Approach for Enhancing Heartbeat Rate Monitoring in a Wearable Device,” in IEEE Access, vol. 6, pp. 8364–8375, 2018.

Koren, A., Jurèević, M. & Prasad, R. “Comparison of Data-Driven Models for Cleaning eHealth Sensor Data: Use Case on ECG Signal”. Wireless Personal Communications 114, 1501–1517 (2020). doi.org/10.1007/s11277-020-07435-7.

A. Koren, M. Jurèević, R. Prasad, “Semantic Constraints Specification and Schematron-based Validation for Internet of Medical Things’ Data”

H. Fereidooni, T. Frassetto, M. Miettinen, A. Sadeghi and M. Conti, “Fitness Trackers: Fit for Health but Unfit for Security and Privacy,” 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017, pp. 19–24, doi: 10.1109/CHASE.2017.54.

K. Lotfy and M. L. Hale, “Assessing Pairing and Data Exchange Mechanism Security in the Wearable Internet of Things,” 2016 IEEE International Conference on Mobile Services (MS), 2016, pp. 25–32, doi: 10.1109/MobServ.2016.15.

M. L. Hale, D. Ellis, R. Gamble, C. Waler and J. Lin, “Secu Wear: An Open Source, Multi-component Hardware/Software Platform for Exploring Wearable Security,” 2015 IEEE International Conference on Mobile Services, 2015, pp. 97–104, doi: 10.1109/MobServ.2015.23.

S. Anwar, D. Anwar and S. Abdulla, “Security Evaluation of Android Mobile Healthcare and Fitness Applications,” 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), 2020, pp. 1–6, doi: 10.1109/ICECCE49384.2020.9179431.

R. Saha, S. Sarkar and S. K. Datta, “Balancing security & sharing of fitness trackers’ data,” 2017 1st International Conference on Electronics, Materials Engineering and Nanotechnology (IEMENTech), 2017, pp. 1–6, doi: 10.1109/IEMENTECH.2017.8076942.

M. Rahman, B. Carbunar and U. Topkara, “SensCrypt: A Secure Protocol for Managing Low Power Fitness Trackers,” 2014 IEEE 22nd International Conference on Network Protocols, Raleigh, NC, 2014, pp. 191–196.

A. R. Shekar, “Preventing Data Manipulation and Enhancing the Security of data in Fitness Mobile Application,” 2019 International Conference on Smart Systems and Inventive Technology (ICSSIT), 2019, pp. 740–745, doi: 10.1109/ICSSIT46314.2019.8987892.

A. Kazlouski, T. Marchioro, H. Manifavas and E. Markatos, “Do partner apps offer the same level of privacy protection? The case of wearable applications,” 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 2021, pp. 648–653, doi: 10.1109/PerComWorkshops51409.2021.9431018.

D. B. Meinert, D. K. Peterson, J. R. Criswell, M. D. Crossland, Privacy policy statements and consumer willingness to provide personal information, Journal of Electronic Commerce in Organizations (JECO) 4(1) (2006) 1–17.

E. Schomakers, C. Lidynia and M. Ziefle, “Listen to My Heart? How Privacy Concerns Shape Users’ Acceptance of e-Health Technologies,” 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2019, pp. 306–311, doi: 10.1109/WiMOB.2019.8923448.

M. S. Rahman, “Does Privacy Matters When We are Sick? An Extended Privacy Calculus Model for Healthcare Technology Adoption Behavior,” 2019 10th International Conference on Information and Communication Systems (ICICS), 2019, pp. 41–46, doi: 10.1109/IACS.2019.8809175.

Y. Siriwardhana, P. Porambage, M. Liyanage and M. Ylianttila, “AI and 6G Security: Opportunities and Challenges,” 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 2021, pp. 616–621, doi: 10.1109/EuCNC/6GSummit51104.2021.9482503.

M. Zuhair, F. Patel, D. Navapara, P. Bhattacharya and D. Saraswat, “BloCoV6: A blockchain-based 6G-assisted UAV contact tracing scheme for COVID-19 pandemic,” 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), 2021, pp. 271–276, doi: 10.1109/ICIEM51511.2021.9445332.

Rodrigues, J. J., De la Torre, I., Fernández, G., and López-Coronado M., (2013), “Analysis of the security and privacy requirements of cloud-based Electronic Health Records Systems,” Journal of Medical Internet Research, vol. 15, no. 8, 2013.

J. Mnjama, G. Foster and B. Irwin, “A privacy and security threat assessment framework for consumer health wearables,” 2017 Information Security for South Africa (ISSA), 2017, pp. 66–73, doi: 10.1109/ISSA.2017.8251776.

I. L. Pribadi and M. Suryanegara, “Regulatory recommendations for IoT smart-health care services by using privacy impact assessment (PIA),” 2017 15th International Conference on Quality in Research (QiR), International Symposium on Electrical and Computer Engineering, 2017, pp. 491–496, doi: 10.1109/QIR.2017.8168535.

N. Wang, P. Wang, A. Alipour-Fanid, L. Jiao, and K. Zeng, “PhysicalLayer Security of 5G Wireless Networks for IoT: Challenges and Opportunities,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8169–8181, 2019.

Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A Survey on Security and Privacy Issues in Internet-of-Things,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1250–1258, 2017.

I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila, and A. Gurtov, “Overview of 5G Security Challenges and Solutions,” IEEE Communications Standards Magazine, vol. 2, no. 1, pp. 36–43, 2018.

R. Khan, P. Kumar, D. N. K. Jayakody, and M. Liyanage, “A survey on security and privacy of 5g technologies: Potential solutions, recent advancements, and future directions,” IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 196–248, 2019.

P. Ranaweera, A. D. Jurcut, and M. Liyanage, “Survey on Multi-Access Edge Computing Security and Privacy,” IEEE Communications Surveys Tutorials, pp. 1–1, 2021.

S. Wijethilaka and M. Liyanage, “Survey on network slicing for internet of things realization in 5g networks,” IEEE Communications Surveys & Tutorials, 2021.

K. M. S. Huq, J. Rodriguez and I. E. Otung, “3D Network Modeling for THz-Enabled Ultra-Fast Dense Networks: A 6G Perspective,” in IEEE Communications Standards Magazine, vol. 5, no. 2, pp. 84–90, June 2021, doi: 10.1109/MCOMSTD.001.2000048.

C. Benzaid and T. Taleb, “AI for Beyond 5G Networks: A CyberSecurity Defense or Offense Enabler?” IEEE Network, vol. 34, no. 6, pp. 140–147, 2020.

I. H. Abdulqadder, S. Zhou, D. Zou, I. T. Aziz, and S. M. A. Akber, “Multi-layered Intrusion Detection and Prevention in the SDN/NFV enabled Cloud of 5G Networks using AI-based Defense Mechanisms,” Computer Networks, vol. 179, p. 107364, 2020.

J.-H. Cho, D. P. Sharma, H. Alavizadeh, S. Yoon, N. Ben-Asher, T. J. Moore, D. S. Kim, H. Lim, and F. F. Nelson, “Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense,” IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 709–745, 2020.

J. Biamonte, P. Wittek, N. Pancotti, P. Rebentrost, N. Wiebe, and S. Lloyd, “Quantum Machine Learning,” Nature, vol. 549, no. 7671, pp. 195–202, 2017.

Downloads

Published

2022-02-14

Issue

Section

6G Enabling Technologies – Innovation 6G