Abstract
Smart home solutions enable access to health-care services to patients by the use of ubiquitous, smart devices or sensors, at the convenience of their home. As in any health-care IT infrastructure, sensitive health information of a patient is processed and transmitted to third parties, increasing the risk of a privacy breach. The smart home environment, due to its pervasive nature, augments such privacy challenges and poses requirements for the devices and software designed. In this chapter, we identify privacy requirements for this environment, and we map requirements to existing solutions. The chapter concludes with identified priorities and challenges for future work.
Similar content being viewed by others
References
Ahamed SI, Talukder N, Kameas AD (2007) Towards privacy protection in pervasive healthcare. Paper presented at the 3rd international conference on intelligent environments, Ulm, Sept 2007
AMA (2006) Checklist for HIPAA privacy. In: HIPAA insider. Alabama Medicaid Agency. Available via MEDICAID. http://www.medicaid.state.al.us/old_site/hipaa/Checklist%20for%20HIPAA%20Privacy.pdf. Accessed 9 Sept 2013
Amaya I, Favela J, Rodriguez M (2005) Componentes de software para el desarrollo de ambientes de cómputo ubicuo. Paper presented at the in the international ubiquitous computing and ambient intelligence conference, Granada, Sept 2005
ARRA (2009) American recovery and reinvestment act. US Government Printing Office. Available via GPO. http://www.gpo.gov/fdsys/pkg/PLAW-111publ5/pdf/PLAW-111publ5.pdf. Accessed 9 Sept 2013
Athavale Y (2011) Potential applications of smart healthcare technologies. SAR-NexJ NSERC Engage Collaboration. Available via SAR-NexJ. http://sarnexj.wikispaces.com/file/view/Potential+applications+of+smart+healthcare+technologies.pdf. Accessed 22 Sept 2013
Avancha S, Baxi A, Kotz D (2012) Privacy in mobile technology for personal healthcare. ACM Comput Surv 45:1–54
Bhatti R, Grandison T (2007) Towards improved privacy policy coverage in healthcare using policy refinement. Paper presented at the 4th VLDB conference on secure data management, Springer, Vienna, Sept 2007
CCHIT (2008) Consumer’s guide to certification of personal health records. Certification Commission for Healthcare Information Technology. Available via CCHIT. http://cchit.org/files/CCHITPHRConsumerGuide08.pdf. Accessed 9 Sept 2013
CDT (2009) Summary of health privacy provisions in the 2009 economic stimulus legislation. Centre for Democracy and Technology. Available via CDT. https://www.cdt.org/healthprivacy/20090324_ARRAPrivacy.pdf. Accessed 9 Sept 2013
Deng M, Petkovic M, Nalin M, Baroni I (2011) A home healthcare system in the cloud – addressing security and privacy challenges. Paper presented at the 4th international conference on cloud computing, IEEE, USA, July 2011
Dritsas S, Gritzalis D, Lambrinoudakis C (2006) Protecting privacy and anonymity in pervasive computing trends and perspectives. Telemat Inform J 23(3):196–210, Special Issue on Privacy and Anonymity in the Global Village
Fang SJY, Zhu X (2010) Privacy and emergency response in e-healthcare leveraging wireless body sensor networks. IEEE Wirel Commun 17(1):66–73
Gates C, Bishop M (2010) The security and privacy implications of using social networks to deliver healthcare. Paper presented at the 3rd international conference on pervasive technologies related to assistive environments, University of Texas at Arlington, USA
Giannetsos T, Dimitriou T, Prasad NR (2011) People-centric sensing in assistive healthcare: privacy challenges and directions. Secur Commun Netw 4(11):1295–1307
Gritzalis D (1997) A baseline security policy for distributed healthcare information systems. Comput Secur 16(8):709–719
Gritzalis D (1998) Enhancing security and improving interoperability in healthcare information systems. Med Inform 23(4):309–324
Gritzalis D (2004) Embedding privacy in IT applications development. Inform Manag Comput Secur J 12(1):8–26
Gritzalis D, Lambrinoudakis C (2004) A security architecture for interconnecting health information systems. Int J Med Inform 73:305–309
Health & Human Services U.S. Department (1996) The Health Insurance Portability and Accountability Act. http://www.hhs.gov/ocr/privacy/index.html. Accessed 9 Sept 2013
HPP (2007) Best practices for employers offering personal health records (PHRs). In: Health privacy project. Employers’ working group on personal health records. Available via CDT. https://www.cdt.org/files/pdfs/2007Best_Practices.pdf. Accessed 9 Sept 2013
Katzenbeisser S, Petkovic M (2008) Privacy-preserving recommendation systems for consumer healthcare services. Paper presented at the 3rd international conference on reliability and security, technical University of Catalonia, Spain, Mar 2008
Kotz D, Sasikanth A, Amit B (2009) A privacy framework for mobile health and home-care systems. Paper presented at the 1st ACM workshop on security and privacy in medical and home-care systems, ACM, Chicago, Nov 2009
Langheinrich M (2001) Privacy by design – principles of privacy – aware ubiquitous systems. In: Proceedings of the 3rd international conference on ubiquitous computing, September 2001. Lecture notes in computer science, vol 2201. Springer, Heidelberg, pp 273–229
Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. Ubiquitous Comput 206:237–245
Lekkas D, Gritzalis D (2006) Long-term verifiability of healthcare records authenticity. Int J Med Inform 76(5–6):442–448
Liang X, Lu R, Chen L, Lin X, Shen X (2011) PEC: a privacy-preserving emergency call scheme for mobile healthcare social networks. J Commun Netw 13(2):102–112
Markle (2008) Common framework for networked personal health information: overview and principles. In: Connecting for health. Markle common framework. Available via MARKLE. http://www.markle.org/sites/default/files/CF-Consumers-Full.pdf. Accessed 9 Sept 2013
Mohammed N, Fung BCM, Hung PCK, Lee C (2009) Anonymizing healthcare data: a case study on the blood transfusion service. Paper presented at the 15th ACM international conference on knowledge discovery and data mining, ACM, France, June 2009
Oladimeji EA, Chung L, Jung HT, Kim J (2011) Managing security and privacy in ubiquitous health information interchange. Paper presented at the 5th international conference on ubiquitous information management and communication, ACM, Korea, Feb 2011
ONCHIT (2008), Nationwide Privacy and Security Framework For Electronic Exchange of Individually Identifiable Health Information. Office of the National Coordinator for Health Information Technology, U.S. Department of Health and Human Service. Available via Healthit. http://www.healthit.gov/sites/default/files/nationwide-ps-framework-5.pdf. Accessed 22 May 2014
Park N (2011) Customized healthcare infrastructure using privacy weight level based on smart device. Converg Hybrid Inf Technol 206:467–474
Rodriguez M, Favela J, Preciado A, Vizcaino A (2005) Agent-based ambient intelligence for healthcare. AI Commun 18(3):10–16
Rui Z, Liu L (2010) Security models and requirements for healthcare application clouds. Paper presented at the 33rd international conference on cloud computing, USA, July 2010
Stajano F (2010) Security issues in ubiquitous computing. In: Nakashima H, Aghajan H, Augusto JC (eds) Handbook of ambient intelligence and smart environments, vol 3. Springer, New York, pp 281–314
Tentori M, Favela J, González VM (2006) Quality of privacy (QoP) for the design of ubiquitous healthcare applications. J Univ Comput Sci 12(3):252–269
Venkatasubramanian K, Gupta SKS (2006) Security solutions for pervasive healthcare. Paper presented at the 3rd international conference on security in pervasive computing, UK, Apr 2006
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this entry
Cite this entry
Theoharidou, M., Tsalis, N., Gritzalis, D. (2014). Smart Home Solutions: Privacy Issues. In: van Hoof, J., Demiris, G., Wouters, E. (eds) Handbook of Smart Homes, Health Care and Well-Being. Springer, Cham. https://doi.org/10.1007/978-3-319-01904-8_5-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-01904-8_5-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Online ISBN: 978-3-319-01904-8
eBook Packages: Springer Reference EngineeringReference Module Computer Science and Engineering