Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Biometrics Applications in e-Health Security: A Preliminary Survey

  • Conference paper
  • First Online:
Health Information Science (HIS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9085))

Included in the following conference series:

Abstract

Driven by the desires of healthcare authorities to offer better healthcare services at a low cost, electronic Health (e-Health) has revolutionized the healthcare industry. However, while e-Health comes with numerous advantages that improve health services, it still suffers from security and privacy issues in handling health information. E-Health security issues are mainly centered around user authentication, data integrity, data confidentiality, and patient privacy protection. Biometrics technology addresses the above security problems by providing reliable and secure user authentication compared to the traditional approaches. This study explores the security and privacy issues in e-Health, and offers a comprehensive overview of biometrics technology applications in addressing the e-Health security challenges. The paper concludes that biometrics technology has considerable opportunities for application in e-Health due to its ability to provide reliable security solutions. Although, additional issues like system complexity, processing time, and patient privacy related to the use of biometrics should be taken into consideration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Sharma, S.K., Xu, H., Wickramasinghe, N., Ahmed, N.: Electronic healthcare: issues and challenges. International Journal of Electronic Healthcare 2(1), 50–65 (2006)

    Article  Google Scholar 

  2. Katsikas, S., Lopez, J., Pernul, G.: The challenge for security and privacy services in distributed health settings. Studies in health technology and informatics 134, 113–125 (2007)

    Google Scholar 

  3. Jain, A., Hong, L., Pankanti, S.: Biometric identification. Communications of the ACM 43(2), 90–98 (2000)

    Article  Google Scholar 

  4. Pratama, S.F., Pratiwi, L., Abraham, A., Muda, A.K.: Computational intelligence in digital forensics. In: Muda, A.K., Choo, Y.-H., Abraham, A., N. Srihari, S. (eds.) Computational Intelligence in Digital Forensics. SCI, vol. 555, pp. 1–16. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  5. Jain, A., Ross, A., Pankanti, S.: Biometrics: A tool for information security. IEEE Transactions on Information Forensics and Security 1(2), 125–143 (2006)

    Article  Google Scholar 

  6. Jain, A.K., Flynn, P.J., Ross, A.A.: Handbook of biometrics. Springer (2007)

    Google Scholar 

  7. Jain, A.K., Ross, A.A.A., Nandakumar, K.: Introduction to biometrics. Springer (2011)

    Google Scholar 

  8. Egawa, S., Awad, A.I., Baba, K.: Evaluation of acceleration algorithm for biometric identification. In: Benlamri, R. (ed.) NDT 2012, Part II. CCIS, vol. 294, pp. 231–242. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  9. Jain, A.K., Bolle, R., Pankanti, S.: Biometrics: Personal Identification in Networked Society. Springer (1999)

    Google Scholar 

  10. Sadr, S.M.H.: Consideration the relationship between ICT and ehealth. Journal of Biology, Agriculture and Healthcare 2(8), 49–59 (2012)

    Google Scholar 

  11. Eysenbach, G.: What is e-health. Journal of Medical Internet Research 3(2) (2001)

    Google Scholar 

  12. Bai, G., Guo, Y.: A general architecture for developing a sustainable elderly care e-health system. In: 8th International Conference on Service Systems and Service Management (ICSSSM), pp. 1–6. IEEE (2011)

    Google Scholar 

  13. Ahmed, S., Raja, M.: Integration of wireless sensor network with medical service provider for ubiquitous e-healthcare. In: 9th International Conference on High Capacity Optical Networks and Enabling Technologies (HONET), pp. 120–126 (2012)

    Google Scholar 

  14. Mukherjee, S., Dolui, K., Datta, S.K.: Patient health management system using e-health monitoring architecture. In: IEEE International Advance Computing Conference (IACC), pp. 400–405. IEEE (2014)

    Google Scholar 

  15. Adibi, S., Agnew, G.B.: On the diversity of ehealth security systems and mechanisms. In: Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society, vol. 2008, pp. 1478–1481 (2007)

    Google Scholar 

  16. Cherukuri, S., Venkatasubramanian, K., Gupta, S.K.S.: Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In: International Conference on Parallel Processing Workshops, pp. 432–439 (2003)

    Google Scholar 

  17. Marohn, D.: Biometrics in healthcare. Biometric Technology Today 14(9), 9–11 (2006)

    Article  Google Scholar 

  18. Chandra, A., Durand, R., Weaver, S.: The uses and potential of biometrics in health care. International Journal of Pharmaceutical and Healthcare Marketing 2(1), 22–34 (2008)

    Article  Google Scholar 

  19. Krawczyk, S., Jain, A.K.: Securing electronic medical records using biometric authentication. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 1110–1119. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  20. Silva, H., Lourenço, A., Fred, A., Filipe, J.: Clinical data privacy and customization via biometrics based on ECG signals. In: Holzinger, A., Simonic, K.-M. (eds.) USAB 2011. LNCS, vol. 7058, pp. 121–132. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  21. Awad, A.I., Baba, K.: Evaluation of a fingerprint identification algorithm with SIFT features. In: The \(3^{rd}\) 2012 IIAI International Conference on Advanced Applied Informatics. Fukuoka, Japan

    Google Scholar 

  22. Baig, M.M., Gholamhosseini, H., Connolly, M.J.: A comprehensive survey of wearable and wireless ECG monitoring systems for older adults. Medical & Biological Engineering & Computing 51(5), 485–495 (2013)

    Article  Google Scholar 

  23. Paranjape, R., Mahovsky, J., Benedicenti, L., Koles’, Z.: The electroencephalogram as a biometric. In: Canadian Conference on Electrical and Computer Engineering, vol. 2, pp. 1363–1366. IEEE (2001)

    Google Scholar 

  24. Allen, J.: Photoplethysmography and its application in clinical physiological measurement. Physiological Measurement 28(3), R1–R39 (2007)

    Article  Google Scholar 

  25. Zhang, G.H., Poon, C.C., Zhang, Y.T.: Analysis of using interpulse intervals to generate 128-bit biometric random binary sequences for securing wireless body sensor networks. IEEE Transactions on Information Technology in Biomedicine 16(1), 176–182 (2012)

    Article  Google Scholar 

  26. Zhang, G., Poon, C.C.Y., Zhang, Y.: A fast key generation method based on dynamic biometrics to secure wireless body sensor networks for p-health. In: 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 2034–2036 (2010)

    Google Scholar 

  27. Hu, C., Cheng, X., Zhang, F., Wu, D., Liao, X., Chen, D.: OPFKA: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In: Proceedings of IEEE INFOCOM, pp. 2274–2282. IEEE (2013)

    Google Scholar 

  28. Zhou, J., Cao, Z., Dong, X.: BDK: secure and efficient biometric based deterministic key agreement in wireless body area networks. In: Proceedings of the 8th International Conference on Body Area Networks, pp. 488–494. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2013)

    Google Scholar 

  29. Zhang, G., Poon, C.C.Y., Zhang, Y.: A biometrics based security solution for encryption and authentication in tele-healthcare systems. In: 2nd International Symposium on Applied Sciences in Biomedical and Communication Technologies ISABEL, pp. 1–4 (2009)

    Google Scholar 

  30. Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K., et al.: Ekg-based key agreement in body sensor networks. In: INFOCOM Workshops, pp. 1–6. IEEE (2008)

    Google Scholar 

  31. Venkatasubramanian, K., Banerjee, A., Gupta, S.K.S.: Plethysmogram-based secure inter-sensor communication in body area networks. In: IEEE Military Communications Conference, MILCOM 2008, pp. 1–7 (2008)

    Google Scholar 

  32. Darwish, A., Hassanien, A.E.: Wearable and implantable wireless sensor network solutions for healthcare monitoring. Sensors 11(6), 5561–5595 (2011)

    Article  Google Scholar 

  33. Poon, C.C.Y., Zhang, Y.T., Bao, S.D.: A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Communications Magazine 44(4), 73–81 (2006)

    Article  Google Scholar 

  34. Modi, S.K.: Biometrics in identity management: Concepts to applications. Artech House (2011)

    Google Scholar 

  35. Awad, A.I., Baba, K.: Fingerprint singularity detection: a comparative study. In: Mohamad Zain, J., Wan Mohd, W.M., El-Qawasmeh, E. (eds.) ICSECS 2011, Part I. CCIS, vol. 179, pp. 122–132. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  36. Awad, A.I., Baba, K.: Toward an efficient fingerprint classification. In: Biometrics - Unique and Diverse Applications in Nature, Science, and Technology, pp. 23–40. InTech (2011)

    Google Scholar 

  37. Awad, A.I., Baba, K.: Singular point detection for efficient fingerprint classification. International Journal on New Computer Architectures and Their Applications 2(1), 1–7 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Ismail Awad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Okoh, E., Awad, A.I. (2015). Biometrics Applications in e-Health Security: A Preliminary Survey. In: Yin, X., Ho, K., Zeng, D., Aickelin, U., Zhou, R., Wang, H. (eds) Health Information Science. HIS 2015. Lecture Notes in Computer Science(), vol 9085. Springer, Cham. https://doi.org/10.1007/978-3-319-19156-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19156-0_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19155-3

  • Online ISBN: 978-3-319-19156-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics