Securing telemedicine

Telemedicine is slowly maturing allowing greater connectivity between patient and healthcare providers using information and communications technology (ICT). One issue that is yet to be addressed fully, however, is security and thence privacy. Researchers writing in the International Journal of Ad Hoc and Ubiquitous Computing, have turned to cloud computing to help them develop a new and strong authentication protocol for electronic healthcare systems.

Prerna Mohit of the Indian Institute of Information Technology Senapati in Manipur, Ruhul Amin of the Dr Shyama Prasad Mukherjee International Institute of Information Technology, in Naya Raipur, and G.P. Biswas of the Indian Institute of Technology (ISM) Dhanbad, in Jharkhand, India, point out how medical information is personal and sensitive and so it is important that it remains private and confidential.

The team’s approach uses the flexibility of a mobile device to authenticate so that a user can securely retrieve pertinent information without a third party having the opportunity to access that information at any point. In a proof of principle, the team has carried out a security analysis and demonstrated that the system can resist attacks where a malicious third party attempts to breach the security protocol. They add that the costs in terms of additional computation and communication resources are lower than those offered by other security systems reported in the existing research literature.

Mohit, P., Amin, R. and Biswas, G.P. (2021) ‘An e-healthcare authentication protocol employing cloud computing’, Int. J. Ad Hoc and Ubiquitous Computing, Vol. 36, No. 3, pp.155–168.