3.8 Article

A Review-Based Taxonomy for Secure Health Care Monitoring: Wireless Smart Cameras

期刊

JOURNAL OF APPLIED SECURITY RESEARCH
卷 18, 期 1, 页码 16-48

出版社

TAYLOR & FRANCIS INC
DOI: 10.1080/19361610.2021.1947112

关键词

Healthcare sector; biometric technique; access control

向作者/读者索取更多资源

Health records data security is a major challenge in e-health systems. The aim of this research is to enhance data access control in the healthcare sector through the addition of biometrics, specifically fingerprints.
Health records data security is one of the main challenges in e-health systems. Authentication is one of the essential security services to support the stored data confidentiality, integrity, and availability. This research focuses on the secure storage of patient and medical records in the healthcare sector where data security and unauthorized access is an ongoing issue. A potential solution comes from biometrics, although their use may be time-consuming and can slow down data retrieval. The aim of this research is to overcome these challenges and enhance data access control in the healthcare sector through the addition of biometrics in the form of fingerprints. The proposed model for application in the healthcare sector consists of Collection, Network communication, and Authentication (CNA) using biometrics which replaces an existing, password-based access control method. A sensor then collects data, and by using a network (wireless or Zig-bee), a connection is established, after connectivity analytics and data management work which processes and aggregate the data. Subsequently, access is granted to authenticated users of the application. This IoT-based biometric authentication system facilitates effective recognition and ensures confidentiality, integrity, and reliability of patients' records and other sensitive data. The proposed solution provides reliable access to healthcare data and enables secure access through the process of user and device authentication. The proposed model has been developed for access control to data through authentication of users in healthcare to reduce data manipulation or theft.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

3.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据