Big Data Security and Privacy Issues in Healthcare

  title={Big Data Security and Privacy Issues in Healthcare},
  author={Harsh Kupwade Patil and R. Seshadri},
  journal={2014 IEEE International Congress on Big Data},
  • H. Patil, R. Seshadri
  • Published 2014
  • Computer Science
  • 2014 IEEE International Congress on Big Data
With the ever-increasing cost for healthcare and increased health insurance premiums, there is a need for proactive healthcare and wellness. In addition, the new wave of digitizing medical records has seen a paradigm shift in the healthcare industry. As a result, the healthcare industry is witnessing an increase in sheer volume of data in terms of complexity, diversity and timeliness. As healthcare experts look for every possible way to lower costs while improving care process, delivery and… Expand
Big data security and privacy in healthcare: A Review
This paper aims to present the state-of-the-art security and privacy issues in big data as applied to healthcare industry and discuss some available data privacy, data security, users’ accessing mechanisms and strategies. Expand
Big healthcare data: preserving security and privacy
The state-of-the-art security and privacy challenges in big data as applied to healthcare industry are surveyed, howSecurity and privacy issues occur in case of big healthcare data are assessed and ways in which they may be addressed are discussed. Expand
Big Data Security in Healthcare: Survey on Frameworks and Algorithms
The current healthcare security scenario in big data environments has been summarized along with challenges faced and security issues that need attention. Expand
Medical (Healthcare) Big Data Security and Privacy Issues
Big data is one the most promising, essential and modern computing era around the world. Big data is most commonly described as huge amount of un-structured data or we can say semi-structured data.Expand
An exhaustive survey on security and privacy issues in Healthcare 4.0
An extensive literature review and analysis of state-of-the-art proposals to maintain security and privacy in Healthcare 4.0 are presented and the blockchain-based solution is explored to give insights to both researchers and practitioners communities. Expand
A Review on Big Data Security and Privacy in Healthcare Applications
In this chapter the term Big Data and its usage in healthcare applications is discussed and the questions and issues are highlighted and discussed in the last section of the chapter to emphasize on the broad and pre-deployment issues. Expand
Data Security and Privacy Challenges in Adopting Solutions for IOT
  • S. Supriya, Sagar Padaki
  • Business, Computer Science
  • 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
  • 2016
In this paper, certain healthcare security lapses are seen and what it means to stakeholders in the healthcare industry and an attempt to discuss few proven operational strategies, risk management methodologies and what the industry can do mitigate such security risks and privacy threats. Expand
A Survey on Security and Privacy Issues in Modern Healthcare Systems
This article explores various security and privacy threats to healthcare systems and discusses the consequences of these threats, including a detailed survey of different potential attacks and their impacts. Expand
A Framework for Data Sharing between Healthcare Providers using Blockchain
A framework based on the blockchain technology has been proposed to achieve the goals of the present research on secure sharing and exchange of healthcare information between different healthcare providers in the KSA. Expand
Privacy preservation for medical dataset using Hadoop
  • Balaji K. Bodkhe, S. Sood
  • Computer Science
  • 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS)
  • 2017
This project implements privacy preservation on a healthcare dataset hence preserving the identity of a person and their related diseases (sensitive attribute) and using techniques and algorithms such as generalization, bucketization and suppression and slicing to ensure Privacy preservation and maintain the data utility. Expand


The 'big data' revolution in healthcare: Accelerating value and innovation
"An era of open information in healthcare is now under way. We have already experienced a decade of progress in digitizing medical records, as pharmaceutical companies and other organizationsExpand
The Health Insurance Portability and Accountability Act.
  • A. Meyer
  • Business, Medicine
  • Tennessee medicine : journal of the Tennessee Medical Association
  • 1997
The Health Insurance Portability and Accountability Act, also known as HIPAA, was designed to protect health insurance coverage for workers and their families while between jobs and establishes standards for electronic health care transactions. Expand
Health Information Technology for Economic and Clinical Health Act
ion • Transfer of data in paper chart to structured data elements in the electronic chart Abstraction (keys to success)ion (keys to success) • Focus on high value data to make chart effective •Expand
Wireless Sensor Network Security
Wireless sensor networks (WSN) are quickly gaining popularity in both military and civilian applications. However, WSN is especially vulnerable against external and internal attacks due to itsExpand
Health care economic analyses and value-based medicine.
It is anticipated that cost-utility analysis will play a major role in health care within the coming decade and be the most sophisticated form of economic analysis and typically incorporates utility values. Expand
The internet of things: a survey
The definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed and the major challenges which need addressing by the research community and corresponding potential solutions are investigated. Expand
Wireless Sensor Network Security
Durant ces dernieres annees, l’utilisation des reseaux de capteurs sans fils (RCSF), est devenu tres repandue, ainsi que le controle d’acces au RCSF are traitons trois points fondamentaux de the securite des RCSFs. Expand
Body Area Sensor Networks: Challenges and Opportunities
Body area sensors can enable novel applications in and beyond healthcare, but research must address obstacles such as size, cost, compatibility, and perceived value before networks that use suchExpand
The Evolution of Cognitive Bias
On the surface, cognitive biases appear to be puzzling when viewed through an evolutionary lens. Because they depart from standards of logic and accuracy, they appear to be design flaws instead ofExpand
EHR incentive programs Available: Guidance/Legislation/EHRIncentivePrograms/index
  • EHR incentive programs Available: Guidance/Legislation/EHRIncentivePrograms/index
  • 2014