Big Data Security and Privacy Issues in Healthcare
Big Data Security and Privacy Issues in Healthcare
Abstract—With the ever-increasing cost for healthcare and With the increasing cost for healthcare services and
increased health insurance premiums, there is a need for increased health insurance premiums, there is a need for
proactive healthcare and wellness. In addition, the new wave of proactive healthcare management and wellness. This shift
digitizing medical records has seen a paradigm shift in the from reactive to proactive healthcare can result in improved
healthcare industry. As a result, the healthcare industry is
quality of care, decrease in healthcare costs, and eventually
witnessing an increase in sheer volume of data in terms of
complexity, diversity and timeliness. As healthcare experts lead to economic growth. In recent times, technological
look for every possible way to lower costs while improving care breakthroughs have played a significant role in empowering
process, delivery and management, big data emerges as a proactive healthcare. For instance, real-time remote
plausible solution with the promise to transform the healthcare monitoring of vital signs through embedded sensors
industry. This paradigm shift from reactive to proactive (attached to patients) allows health care providers to be
healthcare can result in an overall decrease in healthcare costs alerted in case of an anomaly. Furthermore, healthcare
and eventually lead to economic growth. While the healthcare digitization with integrated analytics is one of the next big
industry harnesses the power of big data, security and privacy waves in healthcare Information Technology (IT) with
issues are at the focal point as emerging threats and
Electronic Health Records (EHRs) being a crucial building
vulnerabilities continue to grow. In this paper, we present the
state-of-the-art security and privacy issues in big data as block for this vision. With the introduction of EHR
applied to healthcare industry. incentive programs [2], healthcare organizations recognized
EHR’s value proposition to facilitate better access to
Keywords; healthcare; big data security; privacy; security complete, accurate and sharable healthcare data, that
analytics eventually lead to improved patient care.
As healthcare industry explores myriad ways of applying
I. INTRODUCTION
big data analysis from diagnosis, to treatment, to population
763
776
Clinical continue to grow more complex with the increase in the
Social Financial
number of IoT devices [14]. For instance, conventional
symmetric and asymmetric key distribution and revocation
schemes cannot be extended to a billion IoT devices. Hence,
new scalable key management solutions leading to seamless
inter-operability between disparate networks (e.g. IoT and
Big data legacy IP networks) is crucial for IoT’s integration of big
healthcare cloud data in a cloud environment.
As healthcare industry leverages on emerging big data
technologies to make better-informed decisions, security
analytics will be at the core of any design for the cloud
based SaaS solution hosting Protected Health Information
Psychological (PHI). Additionally, real-time security intelligence will steer
Physical Genomic new directions in risk management. Consequently,
healthcare IT providers can monitor risks in real-time and
Figure 2. Big data healthcare cloud. take preemptive measures before affecting the healthcare
business.
C. Privacy-preserving analytics
Traditional security solutions cannot be directly applied
Invasion of patient privacy is a growing concern in the
to large and inherently diverse data sets. With the increase
domain of big data analytics. An incident reported in the
in popularity of healthcare cloud solutions, complexity in
Forbes magazine raises an alarm over patient privacy [15].
securing massive distributed Software as a Service (SaaS)
In the report, it mentioned that Target Corporation sent baby
solutions increases with varying data sources and formats.
care coupons to a teen-age girl unbeknown to her parents.
Hence, big data governance is necessary prior to exposing
This incident impels big data to consider privacy for
data to analytics.
analytics. For instance, data anonymization prior to
A. Data governance analytics could protect patient identity. Furthermore,
As the healthcare industry moves towards a value-based privacy- preserving encryption schemes that allow running
business model leveraging healthcare analytics, data prediction algorithms on encrypted data while protecting the
governance will be the first step in regulating and managing identity of a patient is essential for driving healthcare
healthcare data. The goal is to have a common data analytics. As the industry leverages on IoT devices to
representation that encompasses industry standards (e.g. transmit vitals to healthcare clouds, there is a need for
LOINC, ICD, SNOMED, CPT, etc.) and local and regional processing and analyzing data in an ad-hoc decentralized
standards. Currently, data generated by BSN is diverse in manner. However, performing resource-exhausting
nature and would require normalization, standardization and operations (required for analytics) while preserving privacy
governance prior to analysis. is a challenge in a resource-constrained environment.
Additionally, as healthcare analytics gains popularity, new
B. Real-time security analytics privacy laws need to be drafted to protect patient privacy.
Analyzing security risks and predicting threat sources in For instance, “informed consent” from patients is required
real-time is of utmost need in the burgeoning healthcare prior to performing any analytics on patient data, and new
industry. At present, healthcare industry is witnessing a laws need to be drafted to clearly illustrate all processes
deluge of sophisticated attacks ranging from Distributed involved in performing big data analytics on patient data.
Denial of Service (DDoS) to stealthy malware. Furthermore,
social engineering attacks are on the rise and the risks
associated with such attacks are difficult to predict without III. CONCLUSION
considering human cognitive behavior. Cognitive bias, for As big data transforms healthcare, security and patient
example, can come into play, especially in the case of privacy is paramount in driving such technologies. As
elderly patients. “Cognitive bias is a pattern of deviation in healthcare clouds with big data become prominent, hosting
judgment, whereby influences about other people and companies will be more reluctant to share massive
situations may be drawn in an illogical manner” [13]. For healthcare data for centralized processing. Hence, we
example, a man-in-the-middle attack can be effected envision distributed processing across disparate clouds and
perhaps by coaxing an elderly patient to accept a digital leveraging on collective intelligence. Secure patient data
X.509 certificate. Such scenarios must be taken into account management is inevitable as healthcare clouds aggregate
when designing an end-to-end authentication solution. and link large amounts of data from disparate networks.
In the IoT environment, implementing security in Additionally, secure and privacy preserving real-time
resource-constrained networks has been a challenge and will analytics will propel proactive healthcare and wellness. In
764
777
this paper, we review some of the security and privacy [9] P. Institute, "Third Annual Benchmark Study on Patient
issues in healthcare and foresee a need for technological Privacy and Data Security," Ponemon Institute LLC,
breakthroughs in computational, storage and communication 2012.
capabilities to meet the growing demand of securing [10] "Public Law 111 - 148 - Patient Protection and
healthcare data. Affordable Care Act," U.S. Government Printing Office
(GPO) , 2013.
IV. REFERENCES
[11] "Health Insurance Portability and Accountability Act,"
U.S. Government Printing Office, 1996. [Online].
[1] P. Groves, B. Kayyali, D. Knott and S. V. Kuiken, "The
Available: http://www.gpo.gov/fdsys/pkg/PLAW-
'big data' revolution in healthcare," McKinsey &
104publ191/html/PLAW-104publ191.htm.
Company, 2013.
[12] "Health Information Technology for Economic and
[2] "EHR incentive programs," 2014. [Online]. Available:
Clinical Health Act," 2009. [Online]. Available:
https://www.cms.gov/Regulations-and-
http://www.gpo.gov/fdsys/pkg/BILLS-
Guidance/Legislation/EHRIncentivePrograms/index.html.
111hr1enr/pdf/BILLS-111hr1enr.pdf.
[3] M. M. Brown, G. C. Brown, S. Sharma and J. Landy,
[13] M. G. Haselton, D. Nettle and P. W. Andrews, "The
"Health Care Economic Analyses and Value-Based
evolution of cognitive bias," in The Handbook of
Medicine," Survey of Ophthalmology, vol. 48, no. 2, pp.
Evolutionary Psychology, John Wiley & Sons Inc, 2005,
204-223, 2003.
pp. 724-746.
[4] P. Middleton , P. Kjeldsen and J. Tully, "Forecast: The [14] H. Kupwade Patil and T. M. Chen, "Wireless Sensor
Internet of Things, Worldwide," Gartner, 2013. Network Security," in Computer and Information Security
[5] L. Atzori, A. Iera and G. Morabito, "The Internet of , Morgan Kaufmann - Imprint of Elsevier, 2013, pp. 301-
Things: A survey," Computer Networks, vol. 54, no. 15, 322.
pp. 2787-2805, 2010.
[15] K. Hill, "How Target Figured Out A Teen Girl Was
[6] M. Hanson, H. Powell, A. Barth, K. Ringgenberg, B. Pregnant Before Her Father Did," Forbes, Inc., 2012.
Calhoun, J. Aylor and J. Lach, "Body Area Sensor [Online]. Available:
Networks: Challenges and Opportunities," Computer, pp. http://www.forbes.com/sites/kashmirhill/2012/02/16/how-
58-65, 2009. target-figured-out-a-teen-girl-was-pregnant-before-her-
[7] E. McCann, "Kaiser reports second fall data breach," father-did/.
Healthcare IT News, 2013.
[8] Verizon, "Data breach investigation report," Verizon,
2013.
765
778