A Review-Based Taxonomy for Secure Health Care Monitoring: Wireless Smart Cameras
Health records data security is one of the main challenges in e-health systems. Authentication is one of the essential security services to support the stored data confidentiality, integrity, and availability. This research focuses on the secure storage of patient and medical records in the healthca...
Saved in:
Published in | Journal of applied security research Vol. 18; no. 1; pp. 16 - 48 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
Routledge
02.01.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Health records data security is one of the main challenges in e-health systems. Authentication is one of the essential security services to support the stored data confidentiality, integrity, and availability. This research focuses on the secure storage of patient and medical records in the healthcare sector where data security and unauthorized access is an ongoing issue. A potential solution comes from biometrics, although their use may be time-consuming and can slow down data retrieval. The aim of this research is to overcome these challenges and enhance data access control in the healthcare sector through the addition of biometrics in the form of fingerprints. The proposed model for application in the healthcare sector consists of Collection, Network communication, and Authentication (CNA) using biometrics which replaces an existing, password-based access control method. A sensor then collects data, and by using a network (wireless or Zig-bee), a connection is established, after connectivity analytics and data management work which processes and aggregate the data. Subsequently, access is granted to authenticated users of the application. This IoT-based biometric authentication system facilitates effective recognition and ensures confidentiality, integrity, and reliability of patients' records and other sensitive data. The proposed solution provides reliable access to healthcare data and enables secure access through the process of user and device authentication. The proposed model has been developed for access control to data through authentication of users in healthcare to reduce data manipulation or theft. |
---|---|
ISSN: | 1936-1610 1936-1629 |
DOI: | 10.1080/19361610.2021.1947112 |