Keywords

1 Introduction

Healthcare 4.0 industry standards promote a patient-centric healthcare service delivery at his doorsteps. Fog computing paradigm leverages us to deploy the power of cloud computing at the edge devices in IoT networks to leverage cost-effective communication, storage, and computations. “Fog computing is a term created by Cisco that refers to extending cloud computing to the edge of an enterprise’s network.”

“Fog Computing also is known as Edge Computing or fogging facilitates the operation of computing, storage, and networking services between end devices and cloud computing data centers.” Edge computing also enables security, mobility, privacy, network bandwidth, and low latency features in IoT networks. These features are essential to design a real-time healthcare management system. A biometric security system ensures secure and perfect access to a system compared to alphanumeric-based passwords in the digital world. Biometric security can be further strengthened by adopting multi-model authentication. In the IoT domain, every edge device will have a unique network address assigned by the IPV6 system. Only the authorized end-users can access and control these edge devices to access IoT-enabled services protecting their privacy. These edge devices provide secure access for authenticated users through a biometric mechanism by verifying their digital credentials in real time. This secure access mechanism can also be made context-aware to understand user-specific requirements. High-security systems can implement a combination of fingerprint, face recognition, and iris scanning to assure the highest safety and privacy for authentication of the end-users.

1.1 Evolution of Technological Shift from Healthcare 1.0 to Healthcare 4.0 Standards

The major focus of Healthcare 1.0 is to reduce the manual and paperwork to enhance productivity. Healthcare 2.0 focused on data processing and sharing with organizations. Healthcare 3.0 introduced patient-oriented IT solutions, while healthcare 4.0 objective was to provide real-time tracking of patient conditions and provide on-site medical assistance. Healthcare 1.0 has progressed from the computerization of healthcare data processing to real-time, on-site patient healthcare diagnostics and context-aware AI-based solutions. The healthcare data/information sharing is initiated within the hospitals and extended to the cluster of healthcare providers across the country. Healthcare 4.0 promotes healthcare data sharing across the globe conforming to technical and statutory standards. The technologies for Healthcare 1.0 were information technology solutions for hospital administration, extended to Electronic Data Interchange (EDI), cloud computing, big data, big data analytics, fog computing, IoT, Electronic Medical Records (EMR), wearable devices, block chain, and artificial intelligence technologies. Today the major challenges faced in Healthcare 4.0 are interoperability, conforming technical standards and ensuring privacy, security, and confidentiality of data as per prevailing statutory framework [38].

1.2 Fog Computing for Enhancing Biometric Security

The edge computing helps us to solve the difficulties connected with safety and confidentiality of biometric signatures by improving security and privacy of critical patient information. The intrinsic properties of fog computing permit additional advantages of computing features which are essential for ensuring the privacy and security-sensitive data access by computing important data at the fog nodes and transmitting the secure and encoded data to cloud after processing.

2 Review of Recent Related Literature

Researchers have carried out an extensive survey of research papers on healthcare 4.0, fog and cloud computing applications from Springier and Elsevier publications since the year 2007. The findings are revealed in the following discussion. A healthcare 4.0 architecture having three processing layers based on fog computing was presented [1]. This architecture is used to implement an analysis of patient-centric healthcare data. Two case studies were presented to confirm the effectiveness of this system. It is mandatory to assure the security and confidentiality of data on the health of a patient by law. In healthcare domain, providing secure access to information is the most critical aspect.

The biometric features are used for authentication of end-users of health data, since these personal features will not be forgotten, hired, purchased and also are very hard to duplicate [2]. Ensuring data security in pathology labs is most crucial in the design of smart medical systems [3]. The generation of a binary string of varying length of bits, corresponding to the range of patient heart beat rate to incorporate quality and security features in Wireless Body Sensor Networks (WBSN) using Random Binary Sequences (RBS) generation method is calledadaptive computing. A protocol based on the Squared Secure Biometric Authentication (SSBA) metric is used in a cloud platform. This protocol protects the confidentiality of the critical data and ensures a safe identity in the cloud computing infrastructure [4]. Governments are promoting unique biometrics-based identification for their citizens for authentication purposes to provides passport services, driving license, voter cards, and public and social applications.

The demand is to develop a robust, secure and cost-effective authorization system to protect privacy using multi-model biometric signatures [5]. After the successful implementation of One Time Passwords (OTP), the application of biometrics that is cancelable is highly recommended instead of conventional biometrics to promote secure and private data sharing. Today cancelable or revocable biometric methods are employed as these are more accurate and increase the privacy of data [5, 6]. Considering biometric signatures and stored specimen templates as public data in the authentication process leads to a weak security level, since the server stores the original template and can be tampered by malicious hackers. This biometrics sketch can be encoded as a binary string of constant size and saved in a tamper-proof smart card to ensure better authentication. The suggestions on implementation of Broadband Remote Access (BRA) systems to ensure a two-factor authentication system to store additional data in a tamper-proof smart card as a second factor were made by the authors [7].

A simple security protocol for securing the privacy of the data having cost-effective packet transmission with three stages was proposed [8]. In the first stage, the attacks are detected to eradicate the intruder attacks such as Wormhole, Sybil, and Sinkhole. In the second stage, data is classified and ranked using WPM based on its sensitivity and sends the nascent data to the MNS. In the last stage, an enhanced Elliptic Curve Cryptography (ECC) would provide secure authentication services between the interconnected end-users.

This method achieves the Packet Delivery Ratio (PDR) of 97%. The hardware implementation of biometric-based authentication is very secure and withstands regular attacks. This model was tested in real time and is applicable in many domains [9]. The evaluation of the effectiveness of security to counter the wolf attack was computed using WAP (Wolf Attack Probability). The attacker in the wolf attack tries to differentiate a user without knowing the user’s biometric signature. The WAP provides the least level of security for the biometric authentication system [10].

Ensuring the identity, privacy, and anonymity in a transaction using unique biometric signatures are critical challenges. This protocol assumes that a secure sketch and biometric signature template are publicly available entities. An end-user need not have to save their private information and record data at the user’s sensors level [11]. Designing of various models for integrating biometrics with smart cards like On-Card Biometric Comparison, Store-on-Card, System-on-Card, and Work-sharing procedure is experimented. These models are still in the design phase. Each of these models is designed with a specific objective having pros and cons.

The authors discussed e-passports and Electronic Spanish National ID Card [12]. The design of security systems is carried out using hardware and software co-design and it is also cost-effective [13]. This system identification is designed considering the mobility of smart interconnected devices in ad-hoc networks. Application of pi-calculus and the ProVerif verification tools are used in the design of biometric authentication using Chen, Pearson, and Vamvakas (CPV) 02 protocol [14]. The results have demonstrated that this protocol is effective, secure, and also correct [15].

The study is carried out on user’s behavioral patterns, keystroke dynamics, and texting of SMS messages, which are used as inputs for a multi-mode biometric method in cell phones. The experimental results have revealed that these multi-mode profiles can uniquely identify a user with high accuracy. A user authentication protocol was designed using IBE (Identity Based Encryption) mechanism which provides high security and improves WSNs authentication [16]. The proposal on sensor forge resilience: liveness sensors and age-dependent sensors were explored to check the feasibility of designing duplicate sensors to prevent forgeries of original sensors [17].

A random orthonormal biometric remote authentication model which is not susceptible to counter advanced attack in an open network was designed [18]. This model applies the user’s biometric signatures along with other authentication factors to attain higher security levels. A protocol that is not anonymous is to be designed to implement the services of anonymous and un-linkable for various types of intruders [19]. This protocol is efficient in processing, ensuring security and provides extended services. The bio-keys captured from different subjects are quite random and unique to secure the Internet of Medical Things (IoMT) [20]. These bio-keys are applied in medical data encryption to decrease resource requirements. The results showed that this mechanism reduces the economics of healthcare services and ensures safe medical data transfer between end-users and service providers. A new authentication scheme for a cloud server was proposed [21]. Experimental results of a security analysis performed on this model reveal that this proposed scheme performs computationally and economically better. The symmetric cryptography protocol shares end-to-end secret data between the nodes having restricted resources of any particular remote entity [22]. The evaluation of this protocol showed that it is safe, secure and saves the cost of energy.

The proposal to permit an authenticated end-user to change the passwords and biometric signatures without consulting the authorized administrator was presented [23]. This proposal also gives a revocation policy to terminate the misbehaving nodes in a network. The analysis of security aspects of this policy is carried out using Burrows Abadi Needham (BAN) logic and random oracle model using the popular Real-Or-Random model. The results derived from the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool revealed that this model is tolerant to man in middle attacks. The proposal on the “Anonymous Privacy-Preserving scheme with Authentication (APPA)” to IoT fog enabled model is device-oriented [24]. Authors realized a multiple layered device authentication using certification by pseudonym and anonymity. This scheme enables independent update of certificate by SDs and pseudonym ensuring the confidentiality of data sensed.

Cloud-based biometric authentication system BAMHealthCloud was discussed [25]. A dedicated component of this system takes care of the security aspect. ALGO Health Security check was performed on this model and results were found satisfactory. The development of a secure healthcare framework is compatible with cloud and mobiles platforms [26]. This framework considers security at inter-sensor communication and patient’s data levels. This system employs multi-mode biometrics signatures for inter-sensor communication through public keys. Evaluation of this system showed that it is a feasible solution for future cellular healthcare systems. System architecture based on smart e-health gateways with distribution to verify the end-user’s authentication is proposed [27]. This method decreases the workload on the medical sensors ensuring good security. This architecture depends on Datagram Transport Layer Security (DTLS) handshake protocol which is certificate-based. Analysis of security of this architecture reveals that it is highly secure and also tolerant to Denial of Service Attack (DoS) attacks. A low weight protocol having many features for remote end-user authentication was proposed [28]. This protocol facilitates end-users to register using a gateway node in an IoT environment.

After registration users can interconnect to the required sensor nodes through IoT devices to avail every service directly. This protocol has less weight since it is unidirectional and perceptual hash mathematical and XOR functions. This protocol is less intensive in computing and hence very much suitable for the IoT environment, where the capacities of resources are limited. The authors have analyzed the security features using AVISPA tool to discover that it can tolerate various security breaches. This protocol mainly concentrates on providing features such as privacy, security, and integrity of the applications deployed in the cloud environment. These applications are typically implemented on virtual machines enabling trusted computing pools [29].

The Authenticated Key Agreement Protocol (AKAP) scheme for providing security to remote users ECC in mobile client and server environments was presented [30]. The authors discussed the security features of a random oracle model with Elliptic Curve Discrete Logarithm Problem (ECDLP) and Curve Decisional Diffie-Hellman Problem (CDHP). Analyzing security features showed that this scheme is tolerant of security threats.

The performance also revealed that this scheme is computationally less intensive and has less communication cost compared to other schemes. A secure protocol having a key establishment mechanism with mutual authentication in IoT-enabled WSNs with better performance was designed [31]. The cryptanalysis conducted on this protocol using the BAN logic model revealed that it tolerates various security threats. A biometric template model for generating a biometric certificate for user authentication was proposed [32]. This mechanism resists the users from generating or extracting the other user’s biometric digital key pairs legally. This model enables only the authenticated users to generate the keys. A quantitative analysis of security features of Context Aware Security by Hierarchical Multilevel Architectures (CASHMA), a multi-model biometric authentication system using ADversary VIew Security Evaluation (ADVISE) formalism was carried out [33].

Authors studied the human factors that become threats for the authentication of biometric systems [34]. FaceFirst is a tool to generate a completely automatic, easy to use, face recognition system. This tool sends a message whenever a captured face sample matches a face template stored in a database. The tool works in low-resolution environments and enables real-time operations [35].

2.1 Literature on Iris Recognition based Biometric Security

The colored circular section in the human eye is called iris and this can be seen with the normal eye. Iris is comprised of muscles that modify the pupil’s size and also controls the quantity of light coming into the eye. Quantity of melatonin pigment contributes to various colors in the formation of iris of humans. The iris muscle foldings covering the ring generate a structure giving a greater level of detail. The creation process of muscle structure is stochastic and it will not follow any specific rules to govern the formation of structure in a human’s eye. This muscle structure once created remains permanent throughout the life of the person. Each person’s iris is unique and has a distinct pattern for each eye. These properties are considered for individual recognition. A high-quality digital camera can scan the details of iris muscle structures. The iris recognition system uses near-infrared (NIR: 700–900 nm) radiation to capture iris structure. The iris recognition software is installed in a dedicated system to get efficiency and security purposes. A camera captures the image of this structure of iris muscles and its quality is improved by the image enhancement procedures. Every iris formation is unique even the two iris of a person are not identical and there are variations in iris of twins also [36, 37].

This improved image is processed by the recognition system to identify the distinct features to create a biometric template. Matching the sample current iris data with this stored iris template confirms the identity of the person under consideration. Iris recognition offers minimum cost of implementation with high security and user-friendliness. Iris recognition has been implemented by border control agencies of the United Arab Emirates at border security checkpoints. All the foreign travelers with visitor visas have to undergo an iris recognition system for entry into UAE. CANPASS Air program based on iris recognition is operational in several Canadian airports.

Aadhaar, a citizen identification system from the government of India’s program is the unique method, where the biometric signatures are extensively used for citizen identification and linked to all public services. Iris identification of a person using iris is very effective in many applications.

2.2 Literature on Retina Recognition based Biometric Security

The neural cells constitute a tissue of a thin layer in the eye called the retina. The retina is situated inside of the human eye. The system of blood vessels carrying blood to this thin layered tissue is represented by a specific structure, which serves as a unique identification of a person. The structure of blood vessels is considered distinct for every person. A special device is needed to capture this structure.

The high cost of usage and highly invasive nature of retina recognition makes its less popular personal identification method and is only applied in highly secure implementations such as defense and war fields. The infrared light having low energy is used to capture the retinal patterns. The blood capillaries pass infrared light and other tissues reflect this light. This reflected light is sensed and the image is formed by the retina recognition system. This image is processed to create a retina template representing the person’s retina signature. This retina image capturing process is called biometric enrollment. The person’s identification may be proved by capturing a new retinal sample and comparing it against the enrolled retina template. Many government agencies like NASA, CIA, FBI, etc. are using retinal recognition for personal identification purposes. Ensuring the privacy of data, precise authentication, and anonymity of end-users identity is very critical in healthcare domain. A framework for providing data abstraction with anonymity of end-user is proposed using a paradigm named anonymous credentials. This framework is implemented using blind signatures [39]. The survey on methods of processing and storage of data in fog environment was carried out. This survey revealed the various challenges and complications in carrying out fog data analytics. Authors have designed a prototype to manage various parameters like ease of access, scaling, communications and collaboration among the nodes, and non-homogeneity. The functioning of this prototype has been explained using two cases [40].

2.3 Statutory Requirements for Protecting the Patient Data

2.3.1 International Statutory Requirements

“Health Insurance Portability and Accountability ACT (HIPAA)” Standards are developed by US. Department of Health and Human Services (HHS) to assure the security and privacy of data and securing specific health information. The HIPAA privacy rules and national regulations are designed to protect patient data and other personal health data privacy of health programs, healthcare providers and healthcare clearing centers. These entities share medical data to offer online healthcare facilities. The objective of these standards is to establish mandatory precautions to secure patient medical health data privacy.

They define terms for usage, sharing, and disclosing of patient data after taking patient approval. These national regulations enable the patient to exercise their rights over their health data records. The HIPPA security rule enforces proper administration, infrastructural and technological precautions to guarantee the privacy, unity, and safety of digitally secured health data [38].

HIPAA standards compliant business companies which are consuming delicate and secured health data should enforce these standards in infrastructure, networks, safety, regulations and operations [41, 42]. China has also enforced many laws and regulations for protecting healthcare data. The written consent of the patient is mandatory for collecting, using, and sharing the medical and personal data. The recent Cybersecurity Law enacted on May 1, 2017 prohibits the people of China from using digital technologies to breach the privacy of patients and collect personal information unlawfully. European Union (EU) has enacted General Data Protection Regulation (GDPR) from 25th May 2018. This act prohibits any company from gathering and processing medical data from EU or non-EU residents. Japan has established Protection of Personal Information (APPI) act from 30th May 2017 [41].

2.3.2 Statutory Requirements for Healthcare Data Security in India

Govt. of India, Ministry of Health and Family Welfare is working on Digital Information Security in Healthcare Act (DISHA). DISHA provides security, privacy, standardization, and confidentiality for electronic health data. The aim is to set up a National Digital Health Authority to exchange information related to health. National Health Policy leverages National Health Information Network to share Aadhaar mapped health records electronically. At present, Indian data privacy laws are not planned for protecting the medical data. The section 43A of the Information Technology Act, 2000 enforces general reasonable security practices, procedures for sharing personal data which is sensitive [43, 44].

2.4 Consolidated Summary of Review of Literature

Authors have carried out the comparative study of all surveyed research papers and highlighted the various methods, results, and applications of biometric-based authentication systems as shown in Table 15.1.

Table 15.1 Consolidated Summary of Review Papers

2.5 Statutory Requirements for Protecting the Patient Data

▪▪▪

2.6 Findings from Review of Literature

Authors after a survey of recent literature have discovered that many diverse methods and protocols are used for authentication using multi-model biometric techniques. The implementation using software, hardware using IoT microprocessor boards in real time and experimentation was discussed in very few instances of multi-model biometric signatures concerning Healthcare 4.0 standards. This research gap has motivated researchers to research this area of authentication in the healthcare 4.0 domain.

Authors found that biometric security systems have been successfully implemented in banks, passports, visa offices, and many organizations. The collaboration with KSHEMA Medical Colleges of Nitte Deemed to be University was planned for successful implementation of this prototype. The authors have carried out the experiments in labs and involving their staff and students for biometric signatures.

3 Proposed User Authentication System

The main objective of this chapter is to design a patient unique identification system for secure access to patient healthcare data. Authors aimed at developing a hybrid security mechanism at the edge devices to protect healthcare data from intruders. Online home-based healthcare services are provided by smart hospitals to patients at their homes. Patients shall enroll in accessing online healthcare solutions from hospitals. The patients can avail of healthcare monitoring and consultancy services from their smart home. The health conditions of the patient are recorded and monitored by these smart wearable medical healthcare devices.

The wearable medical devices will sense abnormal patient’s health conditions and send mobile notifications to the patient caregiver’s mobiles and hospital authorities instantly. The patient’s healthcare data is private and sensitive, so furnishing security and ensuring the confidentiality of this healthcare data is very critical. Patient’s data needs to be accessed only by authenticated doctors and hospitals securely, to the extent permitted by law.

Any violations in securing the privacy of healthcare data lead to breaching of statutory obligations. This paper proposed a biometric authentication model to verify that only authenticated users are accessing the data.

Authorized doctors can access these patient wearable devices for accessing recorded healthcare data. After carrying out remote diagnosis, the doctors can also interact and advise patients in real time.

3.1 Proposed Methodology

Authors proposed a fog computing based biometric solution for authentication of end-users to access patient’s healthcare data. This healthcare data is managed in a database mounted on the smart home server. Only authenticated end-users can access this data. The healthcare data is multimedia data, and the patient’s details such as name, address, and contacts comprise text data. The x-rays, ECG, and scan reports are the image data. The patient’s and doctors’ interactions and speech theory progress of patients are audio data. The video data consists of a recording of the operations, the progress of physiotherapy exercises, etc. The health data types and examples are shown in Fig. 15.1.

Fig. 15.1
figure 1

Patient data types

3.2 Stakeholders of Healthcare Data

The patient healthcare data would be used by different stakeholders as shown in Fig. 15.2 for various purposes.

  • The patient keeps track of his/her healthcare data for personal information and monitoring purposes.

  • Doctors would like to access the patient data for diagnosis, intervention, and progress tracking purposes.

  • Clinical or pathology labs would like to access the health data for analysis and reporting to doctors and patients.

  • Hospital administration also accesses the patient’s data for billing.

  • Govt. authorities also access the patient’s healthcare data for planning and reporting purposes.

  • The insurance company also accesses the healthcare data for processing the insurance claims.

Fig. 15.2
figure 2

Stakeholders of healthcare data

3.3 Architecture of Proposed User Authentication System

The authors have designed a layered architecture for providing authentication to access the patient healthcare data securely as shown in Fig. 15.3.

Fig. 15.3
figure 3

Layered architecture

3.3.1 Patient Data Layer

The patient is residing in his smart home or lying on smart bed when she/he is not feel well. This patient health condition data is the innermost core layer in the architecture (Fig. 15.3), where data is captured by the wearable medical devices attached to the patient’s body or smart bed.

3.3.2 Edge Device Layer

The various health data capturing wearable medical devices are attached to the patient body. These devices monitor the patient body conditions and record health data continuously. Wearable medical devices are configured to send notifications to patients, caregiver’s mobiles, and hospitals where a patient has enrolled in case of a medical emergency.

3.3.3 Patient Cloudlet Layer

The health data captured is stored securely either in the patient’s mobile that plays the role of secure storage edge space or cloudlet. This proposed system can also be configured in such a way that the healthcare data can also be stored in the cloudlet space dedicated to the smart home server of the patient.

3.3.4 Authentication Layer

The patient healthcare data needs to be shared by different end-users for different purposes. Ensuring that only authorized users will access patient data to the extent required and permitted by law is most important. In this context, authentication of healthcare data plays a very important role.

The authors have designed a multi-mode biometric authentication system prototype for protecting this data.

The user’s authentication is provided by capturing text based on username and password, a biometric image of the fingerprint, face recognition, and iris recognition depending on the data type and significance of data that needs to be accessed.

3.3.5 End-User Layers

The end-users of data are discussed and shown in Fig. 15.2 who can access the healthcare data of the patient by proving their identity. The authentication requirements for accessing the data varies on the criticality and type of data. The text data is least critical and hence less secure, while image data and video data have increasing levels of criticality and security.

3.4 The Block Diagram for End-User Authentication

The biometric authentication system block diagram is organized and nested blocks as shown in Fig. 15.4.

Fig. 15.4
figure 4

Block diagram of an authentication

3.4.1 Patient Smart Home Block

The innermost block is the patient smart home block which has four sub-blocks. The patient sub-block comprises a patient with wearable medical devices. The edge devices sub-block is to pre-process the captured data. The authentication sub-block is to verify the identity of users and authenticate the user’s access.

3.4.2 Hospital Online Services Block

The patients and old age people of smart homes have to enroll in accessing online services with smart hospitals. The enrolled patients are provided with online healthcare and consultancy services. The patients are connected to the hospital through their medical wearable devices. Only authenticated doctors can monitor and diagnose the patients online. The access to patient’s data and interactions with health professionals is secured by the proper authentication mechanism. Hospitals have to identify themselves with user code to sign in to patient data account. The authorized doctors and medical professionals can retrieve the patient data to the extent they are allowed to access after verification of their authentication.

3.4.3 Healthcare Services Providers

The insurance authorities, consultants, and Govt. authorities would also require to access the patient healthcare data. These bodies can access patient data after providing proper authentication online.

3.5 Safety and Privacy Levels of Data

The privacy and security of health data can be ensured by proper authentication using biometric signatures. The authors proposed distinct levels of security for various types of data as shown in Figs. 15.5, 15.6, and 15.7. Text passwords and user names represent the lowest level of security. Images and video recordings require the highest level of security features.

Fig. 15.5
figure 5

Security levels and data types

Fig. 15.6
figure 6

Security levels, biometric signatures

Fig. 15.7
figure 7

Integrated security levels, biometric signatures and end-users

3.6 End-Users Enrollment Procedure for Authentication Purposes

3.6.1 Patient Enrollment

The hospital would broadcast the information on available online services through their website. Patients shall register/enroll for accessing online healthcare services on the website of the hospital. The patient’s fingerprint, face recognition, and retina signatures are captured during patient registration.

3.6.2 Hospital Authentication

Hospitals will assign a unique identification code for patients who have enrolled in online healthcare services. The hospital staff authentication codes and biometric signatures are securely stored in patient smart spaces also. These authentication codes are cross-checked and confirmed at the patient’s location before providing access to the patient’s health data.

Fog computing has a very significant role in authenticating end-user identity to ensure that authorized users are accessing the data. End-user’s biosignatures are captured by fingerprint readers, face recognition and iris reader devices during the enrollment process. These are images pre-processed and transformed into a standard template with unique identification code and stored in the signature database in edge devices after encryption and compression as shown in Fig. 15.8.

Fig. 15.8
figure 8

Users biometric enrollment

3.6.3 End-User Authentication Procedure

The end-users who would like to access patient data need to identify themselves by providing their bioauthentication depending on the type and extent of data to be accessed. These biosignatures captured from end-users are pre-processed. The extracted features of the biosignature are matched with that of enrolled end-user stored signatures. The system compares all the features of user specimen signature with a stored template; if the exact match is found, then only the end-user is allowed to proceed; otherwise, user’s data access request will be rejected. If authentication is successful, the user will be able to proceed with data access. The entire process is depicted in Fig. 15.9. The fog and cloud architecture for securing the patient data is shown in Fig. 15.10.

Fig. 15.9
figure 9

Authentication verification process flow

Fig. 15.10
figure 10

Fog and cloud architecture diagram for securing patient data

3.6.4 Summary of Step-by-Step Procedure for Authentication

  1. 1.

    Hospitals publishing their smart healthcare online services

  2. 2.

    Patients subscribing for online smart healthcare services

  3. 3.

    Patient biometric enrollment process (finger, face, and iris signatures registration) for authentication purposes

  4. 4.

    Doctors and medical staff authentication for accessing the patient data

  5. 5.

    Patient registering their medical insurance company representatives and their authentication

  6. 6.

    Hospital admin registration and authentication to access the patient data

  7. 7.

    Govt. Public health representatives registration with hospitals for accessing the patient data

  8. 8.

    Patient’s registration with networked smart hospitals to share patient healthcare data

  9. 9.

    Registration of patient’s IoT smart home service providers for secure healthcare data transmission

  10. 10.

    Registration and authentication of diagnostic labs for patient’s medical test data

4 Implementation of Proposed Methodology

The authors have designed an experimental prototype setup for verifying the authentication of users using a face recognition technique shown in Fig. 15.11. A web portal is designed to enroll users. Users use this portal for enrollment to services as shown in Fig. 15.12. Raspberry Pi-3 and Pi camera are interfaced with this web portal. The portal is developed in PHP and implemented Haar-cascade face recognition for security purposes. The user’s face is exposed to Pi cameras during the enrollment process. This system is trained to recognize the end-user’s face. The face recognition algorithms extract the features of the end-user’s face and prepare a specimen template.

Fig. 15.11
figure 11

The experimental setup for face recognition

Fig. 15.12
figure 12

User registration into portal

During the testing phase when users are exposed to Pi camera the sample face features are compared with stored sample face features. If the correct match is found, then user face recognition is successful and the user is permitted to access the patient health data, otherwise, the user is denied access to the data. The screenshots of registered user recognition and display of user names are shown in Fig. 15.13.

Fig. 15.13
figure 13

User recognition

The unregistered users not recognized are shown in Fig. 15.14. An alert message and image of the unrecognized user are sent to the administrator as shown in Fig. 15.15. To improve the accuracy of the recognition, maximum three testing attempts are provided for the users for authentication. If more than three attempts are made, then the notification is sent to system administration along with the sample of the captured image and other details. Researchers are working on the user authentication process using fingerprint and iris signature recognition on similar lines of face recognition.

Fig. 15.14
figure 14

Unknown user recognition

Fig. 15.15
figure 15

Alert to system administer

4.1 Conducting Experiments and Result Discussion

This authentication prototype is tested using the staff and students in our department as users. The authors used a Raspberry Pi camera for capturing the face images of end-users. Authors have selected end-users with different age groups, gender, and categories. Ninety end-user’s biometric signatures were captured in this training process. For each end-user, five face sample images with slightly different postures are captured and stored in the edge device. At the testing phase randomly users are called for face recognition. This system could recognize their faces accurately. The face recognition accuracy achieved is about 95% and above. Authors are experimenting with fingerprint and iris recognition modules and would like to integrate all biometric signatures into one system. The details of the sample data set and results in correct recognition are shown in Table 15.2.

Table 15.2 Data set samples and results recorded

Authors have experimented with a set of users in the department and found that the system gives satisfactory recognition results of about 95% accuracy.

4.2 Case Study and Challenges Faced in Fog Computing Implementations in Healthcare 4.0

The patient is residing in his smart home or lying in the smart bed. The wearable medical devices attached to his/her body will sense and transmit data about the health conditions of the patient to edge device. The edge devices may be the smart phone or any edge device with fog computing capability in the patient vicinity. This edge device will process the data received from wearable devices and if any heath data values are abnormal and critical then notifications will be sent to smart hospitals authorities where patient has enrolled for smart services.

The doctors of smart hospitals can access the patient’s wearable devices data after verifying their proper authentication. The edge will transmit the data to smart hospitals. The hospital authorities will call the patient/caregiver and explain the conditions of health and advice course of actions to be followed by the patient. This patient heath data is also shared with clinical laboratories for further investigation and accessing the patient data remotely with proper authentication.

Healthcare 4.0 facilitates remote monitoring of heath conditions of the patient with human interventions. Patient can be altered and advised about medication by the medical professional remotely through smart technologies.

The challenges in implementation are the following:

  1. 1.

    Optimizing the cost of healthcare

  2. 2.

    Infrastructure limitations to support real-time operations

  3. 3.

    Building trust in patients on smart healthcare services

  4. 4.

    Managing the interoperability of devices in fog and IoT network domains

  5. 5.

    Compliance with healthcare regulatory standards

  6. 6.

    Providing fool proof authentication mechanisms

  7. 7.

    Managing and sharing healthcare big data with high security and flexibility

5 Conclusions

Healthcare 4.0 standards leverage online health data sharing across the globe conforming to technical and statutory standards. Healthcare 4.0 paradigm promotes a patient-centric healthcare service delivery at his doorstep. The foolproof authentication mechanism is essential to prevent any intrusions into the healthcare systems. Authors have carried out the comparative study of all surveyed research papers and highlighted the various methods, results, and applications of biometric-based authentications systems. A biometric security system is adopted to ensure secure access to a system. Biometric security can be further strengthened by adopting multi-model authentication. This paper discussed national and international status of healthcare data protection acts and tools used for biometric authentication. Authors have discussed the prototype design for authentication of end-users of healthcare data and carried out a face recognition experiment for authentication. The authors have designed a layered architecture for providing authentication to access the patient healthcare data securely. Authors have experimented with a set of users and demonstrated satisfactory recognition results.

Future Scope

Authors are collaborating with Nitte (Deemed to be) University and KS Hegde Medical Academy, Mangalore, Karnataka for real-time patient data management and data analytics. Authors are planning to implement this system in the AB Shetty Dental College since authors have developed a web portal to capture patient data which is being implemented in this hospital.