skip to main content
opinion
Free Access

Security for mobile and cloud frontiers in healthcare

Published:23 July 2015Publication History
Skip Abstract Section

Abstract

Designers and developers of healthcare information technologies must address preexisting security vulnerabilities and undiagnosed future threats.

References

  1. Eastwood, B. Premera says data breach may affect 11 million consumers. FierceMobileHealthcare (Mar. 18, 2015); http://www.fiercehealthit.com/story/premera-says-data-breach-may-affect-11-million-consumers/2015-03-18.Google ScholarGoogle Scholar
  2. Fu, K. Trustworthy medical device software. In Public Health Effectiveness of the FDA 510(k) Clearance Process: Measuring Postmarket Performance and Other Select Topics. IOM (Institute of Medicine) Workshop Report, National Academies Press, Washington, D.C., July 2011; https://spqr.eecs.umich.edu/papers/futrustworthy-medical-device-software-IOM11.pdf.Google ScholarGoogle Scholar
  3. Gagliord, N. Healthcare cybersecurity worse than retail: BitSight. (May 28, 2014); http://www.zdnet.com/article/healthcare-cybersecurity-worse-than-retail-bitsight/.Google ScholarGoogle Scholar
  4. Gunter, C.A., Liebovitz, D.M., and Malin, B. Experience-based access management: A life-cycle framework for identity and access management systems. IEEE Security & Privacy 9, 5 (Sept./Oct. 2011); DOI 10.1109/MSP.2011.72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Halperin, D. et al. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the IEEE Symposium on Security and Privacy (S&P). IEEE Press (May 2008), 129--142; DOI: 10.1109/SP.2008.31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ponemon Institute. Third annual benchmark study on patient privacy and data security (Dec. 2012); http://www.ponemon.org/local/upload/file/Third_Annual_Study_Patient_Privacy_FINAL5.pdf.Google ScholarGoogle Scholar
  7. Millions of Anthem customers targeted in cyberattack. New York Times (Feb. 5, 2015); http://www.nytimes.com/2015/02/05/business/hackers-breached-data-of-millions-insurer-says.html.Google ScholarGoogle Scholar
  8. Naveed, M. et al. Privacy in the genomic era. ACM Comput. Surv. 48, 1, Article 6 (July 2015); DOI: http://dx.doi.org/10.1145.2767007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. O'Harrow, Jr., R. Health-care sector vulnerable to hackers, researchers say. Washington Post (Dec. 2012); http://articles.washingtonpost.com/2012-12-25/news/36015727_1_health-care-medical-devices-patient-care.Google ScholarGoogle Scholar
  10. Sametinger, J., Rozenblit, J., Lysecky, R., and Ott, P. Security challenges for medical devices. Commun. ACM 58, 4 (Apr. 2015), 74--82; DOI 10.1145/2667218. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. White House. FACT SHEET: President Obama's Precision Medicine Initiative (Jan. 30, 2015); https://www.whitehouse.gov/the-press-office/2015/01/30/fact-sheet-president-obama-s-precision-medicine-initiative.Google ScholarGoogle Scholar
  12. Whittaker, R. Issues in mHealth: Findings from key informant interviews. Journal of Medical Internet Research 14, 5 (May 2012); DOI 10.2196/jmir.1989.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Security for mobile and cloud frontiers in healthcare

          Recommendations

          Reviews

          Amos O Olagunju

          Healthcare organizations need secure clinical information systems to provide better quality medical services, increase access to medical records, and reduce the operative costs of business. What technologies do healthcare providers need__?__ What roles should information technology (IT) specialists play in the design and implementation of secure medical information systems__?__ Kotz et al. address these questions in this article. The authors advocate constructive viewpoints: (1) healthcare providers ought to capitalize on the use of mobile devices, cloud services, and electronic health records (EHRs) for monitoring the conditions of patients; (2) IT specialists should take more responsibility in the design of secure systems that provide privacy and safe access to EHRs from different computers and medical and smart devices; (3) medical health technology inventors should develop robust security policies for collecting, storing, accessing, and sharing the medical records of patients; and (4) healthcare organizations require steadfast and reliable medical information systems for the diagnosis, the cure, and decisions about patients. Indisputably, medical IT developers are confronted with many real-world challenges today. It is not easy to design and implement systems for handling all current, surfacing, and unknown future security vulnerabilities and threats. To help build trust in patients, managers of medical systems should be logging and auditing all legal and illegal access to patient medical records. Doctors, health caregivers, and systems administrators of medical information systems should read about the inspiring security issues discussed in this paper. Together, patients, healthcare organizations, and IT experts can help to develop effective solutions to security problems. Online Computing Reviews Service

          Access critical reviews of Computing literature here

          Become a reviewer for Computing Reviews.

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image Communications of the ACM
            Communications of the ACM  Volume 58, Issue 8
            August 2015
            88 pages
            ISSN:0001-0782
            EISSN:1557-7317
            DOI:10.1145/2808213
            • Editor:
            • Moshe Y. Vardi
            Issue’s Table of Contents

            Copyright © 2015 Owner/Author

            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 23 July 2015

            Check for updates

            Qualifiers

            • opinion
            • Popular
            • Un-reviewed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format