logo

Ethical Issues of Security and Privacy of Health Information

   

Added on  2022-11-25

8 Pages7797 Words383 Views
ETHICAL ISSUES OF SECURITY AND PRIVACY OF HEALTH
INFORMATION
XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE

Abstract The following report on privacy of health
information deals with recording patient health which is a
growing model. It is generally outsourced for storage to third
party users. It mainly aims to address the issues in privacy like
hiding some of important data related to health of different
patient which can be accessed easily accessed by any user who
is have. The report aims to provide a new framework in the
domain of health which has been provided. In the provided
structure, all personal data of patient and proper access
control method with an improved method of encryption that is
being used. Both security and privacy of information on
personal health has been taken into consideration by making
use of digital signature along with the pseudo-identity patient.
The paper aims to highlight a better security model which is
needed for better authentication and functional authorization.
It aims to provide new technique which can be used for
providing better output in the e-health care system.
Keywords—e-health framework, security and privacy,
METEOR framework.
I. INTRODUCTION
Digital patient records, records on electronic platform,
managing risk, tool for security and big data requires certain
aspects which are required for enhanced data security. All
the information related to health are completely linked and
managed by some authorized person only. Proper protection
of information is not considered to be an easy job (Puppala et
al., 2016). Most of the healthcare organization are looking
for security issues and vulnerabilities by implementing
digitization of patient record system. Use of the outdated and
clinical application is not considered to be intended for safe
work in the present environment of organization. The main
focus of health care system is all about providing best kind of
health services for any people at instances. Privacy is found
to be as one of major aspect which has many sub-factors like
confidentiality. It is required for preventing any kind of
disclosure of sensitive information of patient. In the
healthcare domain, security of data plays a key role which is
needed for maintaining process access rights to data
(O’Connor, Rowan, Lynch, & Heavin, 2017). Providing
proper security in healthcare is all about maintaining
confidentiality and privacy of patient. This particular step
will help in preventing various kinds of threats related to
theft of patient data. The main notion of health information
system is all about meeting three information fundamental
goals like confidentiality, availability and integrity. It will
merely help in achieving overall security in the healthcare
domain.
In the coming pages of report, an investigation has been
done with respect to ethical issues with respect to security
and proper privacy of information related to healthcare. After
that a literature review has been provided on research
problem which helps in establishing a proper background. A
suitable method has been proposed which is required for
managing different kind of ethical issues in information
system.
II. LITERATURE REVIEW
According to Sankar and Parker (2017), cloud system is
found to be problematic considering the security. The
suggested framework has been designed so that there can be
improved way for sharing electronic. For this, a proper
model has been developed so that it can provide better
growth and integration. There has been large scale
deployment for different kind of e-health services. Cloud
computing based on attribute is mainly needed for storing
and sharing some of the personal health details. For having
this scalability, attribute based encryption is being used in
proper pattern. By using hierarchical identity based
encryption method and CP-ABE is required for achieving
proper control of access in cloud domain. In addition, the
author has proposed a secure patient centric access control
method that helps in permitting data requester. It aims to
provide various kind of access benefit which is completely
based on roles. The author has proposed a proper scheme
which is based on smart card for e-health system. It is based
on proper authentication scheme Ayday, De Cristofaro,
Hubaux, and Tsudik (2015). There is also a layer for the
proposed model in security and privacy for each of the
provided reference layer. It aims to provide proper security
and privacy for achieving proper flexibility and
performance. Vayena, Haeusermann, Adjekum, and
Blasimme (2018), has come up with a security model which
pseudorandom function for preserving privacy for multi-
authority CP-ABE scheme. The model aims to provide
support for proper access control. AboBakr and Azer (2017)
has stated that IoT is being widely used in the domain of
healthcare which results in lack of consequences and its
definition. There is a common denominator for defining IoT
which highlights the use of internet for establishing
interaction with different objects. Introduction of IoT is
from the perspective of health which has brought numerous
benefits in the domain of medical control and equipment’s.
As stated by Hollis et al. (2015), the bad impact of issues
related to secuity is seen in the healthcare system for
complete storage of data and system considering the
environment. It becomes very much hard to have the
provided much secure which ensures its availability in given
time. There has been significant number of development in
the domain of healthcare services. While the major concern
is all about integration of vital medical data which is still
taken into account. It has been seen that cloud storage is
very much vulnerable for storing huge amount of patient
health information. It is due to the fact that most of
information stays outside. Privacy of patient details is found
to be a vital aspect for complete access control in the
domain of cloud storage. This is found to be a fear of e-
health care in the system which requires the support of
human nature. Considering the security of HIT, issues with
respect to lack of patient access control is found. The
privacy of patient is found to be challenging with respect to
security of HIT in all the stages of communication. The
present system cannot have patient privacy along with the
resident for collision and its efficiency. It is the main issue
which makes the security of HIT much unsecured. In the
year 2018, general data protection regulation has come into
picture which effect the present data control and processors
Donahue and Rahman (2015). It merely emphasizes on
security, transparency and accountability considering the
standardization and strength of rights European Citizen.
Both data controllers and processor needs to have privacy
by design. It is a well-known concept for privacy which is
not new one. It merely acquires much more attention with
respect to practice and in academic for the forthcoming
GDPR. Privacy by design aims to promote and demand for
new controller and many processor are actively addressing
the privacy implication.

As per Benton, Coppersmith, and Dredze (2017),
security in healthcare aims to improve the health quality
followed by reduction of cost associated with healthcare.
The author has come up with proposal for a framework
which give security to health care domain. It aims to address
complete privacy in the healthcare system. Complete
security of information technology in the healthcare helps in
addressing the personal health information at the cloud
platform. It is helpful in mitigating the overall involved risk.
There is need for managing firewall and some of the other
important network-based resources. This ultimately helps in
blocking any access which is unauthorized that helps in
providing positive effect for health information system.
Also, it aims in proper monitoring from leakage in data and
proper dealing of some security incidents Gray and Thorpe
(2015). This ultimately helps in having positive impact for
the health information system. The author merely focus on
securing healthcare for any kind of attack by an
unauthorized user. In addition, it aims in securing the
healthcare from any kind of attack by an unauthorized user.
It also aims in analyzing any threat and vulnerabilities in the
domain of healthcare. Data comes up with certain
information like integrity and confidentiality which is
completely persevered for the health information technology
(HIT). Introduction of Internet of things from the
perspective of health has brought huge number of
advantages in the domain of medical aspects and proper
medical control. One of the method which can be used for
safeguarding personal data is analyzing the data
transmission in overhead which is increasing at an
exponential rate. It mainly results in increasingly large
number of health sensitive data from different devices
Berman and Cerf (2017). User aims to upload the different
parameter record for health data centre which is achieved
through social spots that is deployed in the community by
making use of short-range communication technique.
According to Salerno, Knoppers, Lee, Hlaing, and
Goodman (2017), the main reason for user experience and
security is all about understanding the service requirement
where QoP (Quality of protection) is found to be a vital
security aspect for various level of security protection for
users along with diversification in demand. Mobile health
network in QoP can easily have privileges which are shared
by authentication for assuring integrity and confidentiality
by making use of cryptographic techniques. Privacy is
defined as a critical issue in mobile health network can be
defined as sensitive health data that requires collection,
processing, transmission and sharing of provided
information. Without the use of appropriate privacy
protection, most of user are not willing to expose the
provided data to list of persons. It merely aims to hindering
the method and sharing its user experience (Meyer, 2018).
Various general privacy threats in the domain of healthcare
system like privacy and leakage of information at the time
of transmission and understanding privacy. General privacy
threats in the domain of healthcare like identity of privacy
and leakage at the instance of transmission. In addition, it
focus on analyzing location of privacy which is
investigation. Privacy protection is being applied to various
sensor and smartphones, which is required for protecting
against disclosure of sensitive data. There is a need for
investigating the security services for different levels which
is needed for providing balance in between the security
requirements and analysis of performance. Multihop relay is
generally adopted for aggregation of data along with
tolerable delay. Various kind of health data and transmission
delay needs to be much different (Masrom & Rahimly,
2015). In addition, there is privacy protection at the time of
data transmission which is required for mobile health data.
Privacy depended privacy data aggregation method is
mainly proposed for mobile health data which helps in
aggregation different kind of health data in the delay
requirements. On contrary, it helps in protecting both data
and identity privacy at the time of transmission.
As stated by van Staa, Goldacre, Buchan, and Smeeth
(2016), in mobile health network (MHN) is required for
achieving highest level of data and its user profile where
privacy protection needs to be robust and strong. It should
be enough for preventing potential attacks and any kind of
leakage that increases the overall computational overheads.
There is need for QoP which requires to be used in MHN
for analyzing privacy protection at different stages. MHN
takes up full benefit of powerful storage and its
computational capabilities which is outsourced to cloud
servers and security. It is very much associated with the
cloud server which is not trusted and raised in MHN. Policy
for accessing health details needs to be defined clearly and
take into account for authenticating user identity for access
control. The patient daily data of health is completely stored
on cloud server which is accessed by doctor (Fhom, 2015).
The stored data needs to be completely protected from any
access by any insurance organization. The general access
security policy is also examined for ensuring the access with
respect to user attributes. Considering MHN, there is need
for dynamic access management which is needed for
analyzing the issues of user attributes. The overheads for
various access level needs to be balanced for releasing the
computation of burden for users. User aims to select various
forwarding techniques which does not forward data in the
given time delay but also aims to forward within the
provided delay. It aims to consume the different network
resources which is required for reducing delay. Doctor can
request for important health data from patient in case of
emergency which is required for continuous monitoring.
Regular health data is not taken into account for emergency
use so there is delay of requirement (Wachter, 2018). Both
kind of data that is vital and regular is labelled for small and
big data.
According to Kaplan (2016), MHN are vulnerable to
different kind of attacks along with misbehavior from
different mobile users that can damage the disruption the
overall effectiveness of this MHN. It merely aims in
degrading the overall level of performance. Considering the
health related social application like fitness and social
gaming where attackers can forge the social attributes for
snatching each legitimating health information of user. This
ultimately leads to pushing spam recommendation and
violation of user privacy. In addition, the attacker can even
misbehave where the network protocol is launching denial
of service attack (Haluza, Naszay, Stockinger, & Jungwirth,
2016). It aims in assuming a large portion of network-based
resource. Some of the misbehaviour scheme for detection
can even resist some of the individual attacks. This is found
to be bit challenging for adjusting with the security
protection for any powerful attack. Overall cost of
misbehaviour detection can be increased as a result of
attacking capabilities from these kind of attack. Processing
and analysis of healthcare data is considered to be important

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Utilization of Information Technology in Healthcare Systems
|12
|1803
|220

The Security and Confidentiality of Health Records
|4
|553
|22

Privacy: Patient right, privacy and confidentiality
|9
|704
|83

eHealth and mHealth PPT Presentation
|11
|2479
|388

Developing a Better Database and Management System at Guneypark Hastanesi Hatay
|16
|1999
|432

Case Study Of My Health Record
|16
|3468
|25