Internet of Things-Based Healthcare Systems: An Overview of Privacy-Preserving Mechanisms
Abstract
:1. Introduction
2. Background on Concepts and Requirements
2.1. Dimensions of Privacy and Privacy Protection
- Physical privacy: The capability of people to set boundaries regarding their belongings and actions and control access to their physical space.
- Informational privacy: The capability of people to control access to their sensitive information, including financial and medical records.
- Communication privacy: The capability of individuals to control access to their private and personal communications, such as phone calls, emails, and messages.
- Electronic privacy: Focuses on protecting electronic health records and any other health data so that they remain safe and protected from any unauthorized access or leakage. These records hold detailed information, including the patient’s medical history, diagnoses, determined treatments, vaccination dates, allergies, radiological images, and medical test results [9].
- Digital health-related data privacy: This term covers a broader range of digital health information, extending beyond traditional electronic health records. It includes data gathered from wearable devices, remote monitoring devices, genetic testing results, and a wealth of other digital health information that, while not always included in the electronic health record, plays an important role in facilitating a fuller picture of a patient’s health status.
2.2. Privacy Requirements in Healthcare
- Confidentiality Requirement: Healthcare data remain confidential (not disclosed to unauthorized parties) through access control and encryption techniques.
- Integrity Requirement: Solid data validation methods are implemented to provide data accuracy and consistency.
- Availability Requirement: The backup and disaster recovery policy guarantees that approved entities have access to the healthcare information.
- Accountability Requirement: Audit trails and monitoring mechanisms manage accountability, confirming that the use and disclosure of healthcare data are in compliance with laws and regulations.
- Access Control Requirement: Access control ensures that only authorized parties have access to patient medical information on a need-to-know basis.
- Data Minimization Requirement: The collection of patients’ personal information is limited only to that which is necessary for the provision of healthcare services.
2.3. HIPAA: Operationalizing Privacy Requirements
- Protected Health Information (PHI): The healthcare system’s main operating entities, like hospitals, financial institutions, insurance providers, and many others, transfer health data and refer to it as PHI.
- Acceptable Uses and Disclosures: The Privacy Rule governs how appropriate entities can use and disclose PHI. Most uses and disclosures are subject to individual consent under these rules.
- Minimum Necessary Standard: The participating entities in healthcare must request, use, and disclose the minimum amount of health information to achieve their goal and guarantee that only needed information is disclosed and used to fulfill this purpose.
- Individual Rights: When it comes to personal PHI, people have certain rights that include accessing it, asking for changes, obtaining an account of disclosures, and placing restrictions on its use.
- Notice of Privacy Procedures: The covered entity must be provided with a detailed notice of their legal responsibilities, privacy policies, the usage of PHI, the procedure of disclosure, and the mandatory rights for each individual.
- Safeguards: Protecting the privacy, accuracy, and accessibility of PHI requires covered organizations to establish administrative, technological, and physical protections designed to prevent unauthorized access, use, or disclosure.
- Business Associate Agreements: A formal agreement with third parties is a must for covered entities so they can handle the PHI on their behalf and make sure that other partners adhere to the HIPAA’s specified privacy and security rules.
- Breach Notification: In the U.S., if PHI is involved in a breach, the covered entities are responsible for notifying the Department of Health and Human Services (HHS), any impacted parties, and sometimes the media. The HHS is a federal agency tasked with protecting the health of Americans and ensuring the privacy and security of their health information. Within the HHS, the Office for Civil Rights (OCR) is responsible for enforcing the HIPAA rules, including breach notification requirements. Typically, the notification discloses the full situation and outlines the steps taken to mitigate the effects.
- Implementation: The responsibility of the HHS OCR is to implement privacy rules, along with programs of remedial action and civil financial penalties. Furthermore, noncompliance with privacy rules might lead to criminal consequences.
2.4. GDPR in Healthcare: Expanding Privacy Horizons
- Personal Data Protection: The GDPR broadens the scope of protection for information collected and processed by IoT devices in the healthcare industry, including health-related data.
- Legal Basis for Processing: To process personal information, including health information, there must be a clear legal basis that complies with the GDPR, which may include consent, contractual requirements, legal duties, vital interests, public interest, or legitimate interests.
- Data Minimization: Under the data minimization rule, companies can manage and gather only required information that serves a certain purpose related to healthcare.
- Individual Rights: Individuals have the right to access, update, and delete their data, as well as making the data portable and limiting its processing. Also, the responsibility of institutions is to manage these data and healthcare services to support these individuals’ rights.
- Data Security: Frequent security evaluations, encryption, and many other security measures are strictly enforced by the GDPR to preserve the security and privacy of individuals’ data.
- Data Breach Notification: In the event that a data breach occurs, the responsible authorities and individuals involved in the case must be notified, and it must be announced immediately. Moreover, the GDPR enforces the presentation of the protocols used to identify and handle a data breach event.
- Data Protection Impact Assessment (DPIA): The GDPR enforces enterprises to undertake a DPIA to specify and reduce processing operations with high risks.
- Appointment of a Data Protection Officer (DPO): Designating a DPO is a must for enterprises and organizations handling individuals’ data, such as health data, which guarantees their adherence to and compliance with the GDPR.
- GDPR Enforcement and Penalties: The value of the penalties that the data protection authorities can apply upon organizations’ failure to adhere to the GDPR is up to EUR 20 million or 4% of an organization’s global annual revenue.
2.5. Involved Parties in Healthcare Systems
2.5.1. Core Healthcare Players
- Healthcare Providers: This category consists of the persons (doctors, nurses, specialists) and locations (from general hospitals to private practices) which render necessary medical services to patients. Healthcare technology aids a provider’s capacity to provide appropriate treatment at the proper time and make diagnoses.
- Patients: The smart healthcare system revolves around the patients who interface with the system for care, questions regarding treatment, health status checks, and attempts at more personalized healthcare. When patients are involved regarding their information and communication, general health outcomes tend to be better.
- Paying Entities: They interface with healthcare systems by managing the responsibility for payment, reimbursement, and billing matters. Paying entities include insurance companies, employers, and other organizations or individuals responsible for ensuring proper billing for medical services.
2.5.2. Other Involved Parties
- Technology Providers: Their responsibility includes designing, developing, and deploying the required technological infrastructure to support smart healthcare systems which enable a seamless flow of data exchange and efficient healthcare services. They design and offer a range of tools and solutions, including electronic health record (EHR) platforms, telemedicine applications, wearable device manufacturing, and health applications.
- Regulators and Government Agencies: Entities like the Data Protection Officer (DPO) and OCR play a critical role in enforcing compliance with the GDPR in the EU and the HIPAA in the US and safeguarding patients’ data. These agencies are responsible for overseeing the application of standards and frameworks that control the healthcare sector.
- Researchers and Academia: Collaboration between researchers and academic institutions and smart healthcare systems opens the horizons for innovation in the healthcare sector through collecting and analyzing data to generate novel insights that enhance the quality of the healthcare services provided to patients.
- Caregivers and Family Members: Their responsibility is taking care of and assisting patients at home or in healthcare organizations. They must join the healthcare systems as they have to monitor the health state of the patient.
3. Stratifying Privacy-Preserving Solutions
3.1. Data Protection Mechanisms
- Data in Transit: Refers to data actively moving between systems, devices, or networks (e.g., during communication between IoT devices and cloud servers).
- Data at Rest: Refers to data stored in a static state, such as on databases, servers, or local devices.
- Data in Processing: Refers to data actively being used or manipulated by applications or systems, such as during computations or analytics.
- Encryption Techniques: The process of using encryption techniques involves preserving the privacy of patient data through data encryption, such as symmetric, asymmetric, and homomorphic encryption, to convert the patient’s Personally Identifiable Information (PII) and PHI to a format that cannot be read or understood by unauthorized parties [14]. The encrypted PII/PHI, including texts or images, can then be securely sent, stored, and accessed by individuals with access privileges.
- Anonymization Techniques: Anonymization techniques are used for modifying or concealing healthcare data attributes to safeguard patient privacy while preserving the feasibility of data analysis. These techniques, such as k-anonymity, l-diversity, and differential privacy, are used to ensure that sensitive data remain protected while still being useful for research and analysis [13].
3.2. Access Control and Authorization
- Role-Based Access Control (RBAC): RBAC assigns access permissions based on predefined roles and responsibilities. It ensures that users access data and system functionalities based on their assigned roles, reducing the risk of unauthorized access [15].
- Attribute-Based Access Control (ABAC): Taking into consideration many factors, such as the user’s characteristics, external elements, and environmental conditions, ABAC permits the user access based on their attributes and policy rules.
- Consent Management Systems: These provide mechanisms for patients to control their data, as they assist in collecting, acquiring, managing, using, and sharing data, delegating the responsibility to patients to make knowledgeable decisions [16].
3.3. Privacy-Preserving Data Sharing
- Blockchain and Distributed Ledger Technologies: A blockchain provides a platform for managing and storing encrypted patient data in a decentralized and inviolable manner, ensuring data integrity, controlled access, and auditability [14].
- Secure Multi-Party Computation (SMC): SMC allows for computations on distributed data while protecting individual privacy. It leverages cryptographic techniques to perform calculations across multiple parties without revealing sensitive information.
- Federated Learning (FL): FL facilitates collaborative machine learning (ML) without the need to share raw data between entities. Instead, ML models are trained locally on individual datasets, and only the model updates are shared. This approach preserves confidentiality and enables collective intelligence while maintaining individual data sanctuaries, making it an effective privacy-preserving mechanism in healthcare [14].
3.4. Privacy Policies and Governance
- Privacy by Design Principles: Considers privacy in the development process of IoT-based healthcare systems, encouraging in-advance privacy measures from the early stages and ensuring privacy is a basic component of the system’s architecture.
- Transparent Data Usage and Auditability Mechanisms: Mechanisms for transparent data usage and auditability provide visibility regarding how patient data are accessed, used, and processed. They enable individuals and regulatory bodies to monitor and enforce privacy compliance.
3.5. User Awareness and Empowerment
- User Education and Awareness Programs: These programs aim to establish knowledge and awareness among individuals regarding data processing practices, privacy risks, and their rights regarding PHI. Such programs can delegate the responsibility to the users to make knowledgeable decisions and apply proactive measures to assure privacy compliance [17].
- User-Controlled Privacy Settings: User-controlled privacy settings enable individuals to manage their privacy preferences and customize the level of data sharing and access permissions. Users can control how their personal health information is used and shared.
- Privacy-Enhancing Technologies: Such technologies comprise tools, techniques, and interfaces that enable users to protect their privacy while benefiting from IoT-based healthcare services. They allow individuals to preserve their privacy without compromising the functionality and utility of the system [17].
4. Methodology
- (“IoT” OR “Internet of Things”) AND (“Healthcare” OR “Medical”) AND (“Privacy” OR “Security” OR “Confidentiality”).
- (“Data Privacy” OR “Privacy-Preserving”) AND (“IoT Security” OR “Healthcare Data Security”).
- (“Federated Learning” OR “Homomorphic Encryption” OR “Blockchain”) AND (“Healthcare Applications”).
5. Literature Review
5.1. Comparison with Existing Review Papers
5.2. IoT and Healthcare Integration
5.3. Blockchain-Based Solutions
5.4. Security and Privacy Challenges in IoT-Based Healthcare
5.5. Privacy-Preserving Schemes
5.6. Encryption and Security Frameworks
5.7. Security Requirements in IoT-Based Healthcare Systems
Paper | A | B | C | D | E |
---|---|---|---|---|---|
[19] | - | - | - | D1-D2 | - |
[28] | A1 | - | C1 | D1 | - |
[32] | A1 | B1-B2-B3 | - | D1-D2 | - |
[29] | A1 | - | C1 | - | - |
[33] | A1 | - | - | D1-D2 | E1-E2 |
[30] | - | - | C1 | - | - |
[35] | A1 | - | - | D1-D2 | - |
[36] | A1 | - | - | - | - |
[20] | A1 | - | - | D1-D2 | - |
[31] | A1 | B1-B2 | C1 | - | - |
[23] | A1 | - | C1 | D1-D2 | - |
[34] | A1 | - | - | - | E1-E3 |
[22] | A1 | - | C2 | - | - |
[24] | A1 | - | C2 | - | - |
[25] | A1 | - | - | D1-D2 | E1-E2 |
[37] | - | - | C1 | - | - |
[21] | - | - | C1 | D1 | - |
[26] | A1 | B1-B2 | - | D1-D2 | - |
[39] | - | - | C2-C3 | - | - |
[40] | A2 | - | - | - | - |
[41] | A2 | - | - | - | - |
[27] | A1-A2 | - | - | D1-D2 | - |
[38] | A1 | B2 | C1 | - | - |
[42] | A1-A2 | B2 | C3 | D1 | E1 |
[18] | - | - | C3 | - | E3 |
6. Privacy-Preserving Architectures for Scalable IoT-Based Healthcare Systems
6.1. Centralized Privacy Management
- Efficient Data Management: Making the handling of data more streamlined by having consistent privacy policies and access controls in place.
- Enhanced Security Measures: Implementing robust security, including advanced encryption standards and access controls.
- Streamlined Compliance: The centralized approach makes it easier to adhere to regulatory frameworks, simplifying the process of meeting compliance requirements with centralized data storage.
6.2. Decentralized Data Aggregation and Processing
6.3. Edge Computing for Real-Time Privacy Preservation
- Advancing Privacy Preservation Through Edge Computing: Edge computing preserves patient data confidentiality by processing data closer to their source, aligning with the need for Data Protection Mechanisms [44].
- Mitigating Latency and Real-Time Analysis: By addressing real-time requirements, edge computing reduces the latency in data analysis crucial for healthcare decision-making [45].
- Addressing Resource Constraints in Edge Devices: Innovative approaches have optimized algorithms on resource-constrained edge devices, maintaining privacy without compromising performance.
- Ensuring Data Consistency and Security in Edge Environments: Strategies for ensuring data integrity and security in edge computing are connected with challenges discussed regarding Privacy-Preserving IoT Data Analytics [45].
- Decentralized Data Ownership and Control: Edge computing empowers individuals and healthcare institutions by processing data locally, aligning with the need for user-controlled privacy settings.
- Collaborative Edge Learning for Privacy-Preserving Analysis: Delving into collaborative edge learning, this approach bridges collaborative techniques and the localized processing capabilities of edge devices [46].
6.4. Hybrid Cloud Architectures for Flexibility
6.5. Zero-Trust Architectures for Enhanced Security
7. Secure Data-Sharing Protocols
7.1. Secure Data-Sharing Gateways
7.2. Tokenization for Controlled Access
7.3. Secure APIs for Controlled Interaction
- Data Integrity and Authenticity: Applying cryptographic hash functions and digital signatures ensures the authentication and guarantees the integrity of healthcare data during transmission, as it prevents unauthorized tampering or modifications by verifying that the received data are derived from a legitimate source [48].
- Access Revocation: Enabling timely and effective access revocation is a challenge in secure data sharing. If a stakeholder’s access privileges change or if a breach is detected, revoking access should be immediate and irreversible. Implementing mechanisms for instant access revocation while preserving data consistency and minimizing disruptions requires careful planning [17].
- Minimizing Data Exposure: While sharing data is essential for collaborative healthcare efforts, minimizing the exposure of sensitive information is crucial. Techniques such as data anonymization and minimal data disclosure help strike a balance between sharing insights and preserving patient privacy. Ensuring that shared data are stripped of unnecessary details without losing their analytical value poses a technical challenge [17].
8. Privacy-Preserving Patient Monitoring
8.1. Encrypted Health Data Streams
8.2. Secure Data Aggregation Techniques
8.3. Anomaly Detection with Privacy Focus
8.4. Addressing Challenges: The Balancing Act
9. Integration of Privacy-Preserving IoT Devices
9.1. Secure Device Provisioning
9.2. Navigating Privacy-Preserving Updates
9.3. Addressing Challenges: The Symphony of Integration
10. Open Issues and Future Directions
10.1. Bridging the Gap Between Privacy and Utility
- Differential Privacy and Federated Learning:While these techniques offer promising avenues for secure data analysis, further research is crucial on practical challenges in deployment and exploring strategies for adapting differential privacy to smaller datasets. Addressing federated learning scalability issues with multiple healthcare providers and exploring advanced aggregation and encryption methods specifically tailored to sensitive health data [53] can unlock their full potential without compromising patient anonymity.
- Homomorphic Encryption and Secure Multi-Party Computation: Further, real-world use cases should be elaborated to illustrate the potential of these techniques. Future work should investigate how homomorphic encryption can be optimized for low-power healthcare IoT devices and consider hybrid approaches that balance computation between trusted and untrusted nodes to reduce bottlenecks [54].
10.2. Building a Robust and Interoperable Ecosystem
10.3. Blockchain-Based Solutions
10.4. Empowering Patients with Control and Transparency
- Context-Aware and Adaptive Privacy Mechanisms: Future research should highlight the need for continuous user education about privacy risks and protections. It should explore how AI could dynamically adjust privacy settings based on patient preferences, locations, and real-time conditions. This should be illustrated with real-world scenarios where such adjustments would be beneficial [57].
- User-Friendly Privacy Controls and Educational Tools: Complex interfaces hinder informed consent and effective data management. Research should prioritize developing intuitive privacy controls and engaging educational tools that clearly explain data usage, protection mechanisms, and user options. This will foster trust and cultivate a culture of privacy-conscious engagement [58].
10.5. Fostering a Culture of Privacy Awareness
11. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Chamola, V.; Hassija, V.; Gupta, V.; Guizani, M. A Comprehensive Review of the COVID-19 Pandemic and the Role of IoT, Drones, AI, Blockchain, and 5G in Managing Its Impact. IEEE Access 2020, 8, 90225–90265. [Google Scholar]
- Kumar, A.; Bhushan, B.; Shristi, S.; Kalita, S.; Chaganti, R.; Obaid, A.J. Blockchain Embedded Security and Privacy Preserving in Healthcare Systems. In Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems; Academic Press: Cambridge, MA, USA, 2023; pp. 241–261. [Google Scholar]
- Stoumpos, A.I.; Kitsios, F.; Talias, M.A. Digital Transformation in Healthcare: Technology Acceptance and Its Applications. Int. J. Environ. Res. Public Health 2023, 20, 3407. [Google Scholar] [CrossRef] [PubMed]
- Patra, R.; Bhattacharya, M.; Mukherjee, S. IoT-Based Computational Frameworks in Disease Prediction and Healthcare Management: Strategies, Challenges, and Potential. In IoT in Healthcare and Ambient Assisted Living; Springer: Berlin/Heidelberg, Germany, 2021; pp. 17–41. [Google Scholar]
- Karale, A. The Challenges of IoT Addressing Security, Ethics, Privacy, and Laws. Internet Things 2021, 15, 100420. [Google Scholar]
- Shahid, J.; Ahmad, R.; Kiani, A.K.; Ahmad, T.; Saeed, S.; Almuhaideb, A.M. Data Protection and Privacy of the Internet of Healthcare Things (IoHTs). Appl. Sci. 2022, 12, 1927. [Google Scholar] [CrossRef]
- Atlam, H.F.; Wills, G.B. IoT Security, Privacy, Safety, and Ethics. In Digital Twin Technologies and Smart Cities; Springer: Berlin/Heidelberg, Germany, 2020; pp. 123–149. [Google Scholar]
- Motti, V.G.; Berkovsky, S. Healthcare Privacy. In Modern Socio-Technical Perspectives on Privacy; Springer International Publishing: Cham, Switzerland, 2022; pp. 203–231. [Google Scholar]
- Kashyap, A.; Callison-Burch, C.; Boland, M.R. A Deep Learning Method to Detect Opioid Prescription and Opioid Use Disorder from Electronic Health Records. Int. J. Med. Inform. 2023, 171, 104979. [Google Scholar]
- ETSI EN 303 645 Standard; Cybersecurity Standard for Consumer IoT Devices. Intertek: London, UK. Available online: https://www.intertek.com/iot/cybersecurity/etsi-en-303-645/ (accessed on 18 March 2025).
- U.S. Department of Health and Human Services. HIPAA for Professionals-Privacy Laws and Regulations. 2024. Available online: https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html (accessed on 22 November 2024).
- Yuan, B.; Li, J. The Policy Effect of the General Data Protection Regulation (GDPR) on the Digital Public Health Sector in the European Union: An Empirical Investigation. Int. J. Environ. Res. Public Health 2019, 16, 1070. [Google Scholar] [CrossRef]
- El Majdoubi, D.; El Bakkali, H.; Sadki, S.; Maqour, Z.; Leghmid, A. The Systematic Literature Review of Privacy-Preserving Solutions in Smart Healthcare Environment. Secur. Commun. Netw. 2022, 2022, 5642026. [Google Scholar]
- Singh, S.; Rathore, S.; Alfarraj, O.; Tolba, A.; Yoon, B. A Framework for Privacy-Preservation of IoT Healthcare Data Using Federated Learning and Blockchain Technology. Future Gener. Comput. Syst. 2022, 129, 380–388. [Google Scholar]
- Obaid, O.I.; Salman, S.A.B. Security and Privacy in IoT-Based Healthcare Systems: A Review. Mesopotamian J. Comput. Sci. 2022, 2022, 29–39. [Google Scholar]
- Padinjappurathu Gopalan, S.; Chowdhary, C.L.; Iwendi, C.; Farid, M.A.; Ramasamy, L.K. An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare Systems. Sensors 2022, 22, 5574. [Google Scholar] [CrossRef]
- Butpheng, C.; Yeh, K.H.; Xiong, H. Security and Privacy in IoT-Cloud-Based E-Health Systems—A Comprehensive Review. Symmetry 2020, 12, 1191. [Google Scholar] [CrossRef]
- Dhinakaran, D.; Sankar, S.M.; Selvaraj, D.; Raja, S.E. Privacy-Preserving Data in IoT-Based Cloud Systems: A Comprehensive Survey with AI Integration. arXiv 2024, arXiv:2401.00794. [Google Scholar]
- Nasiri, S.; Sadoughi, F.; Tadayon, M.H.; Dehnad, A. Security Requirements of Internet of Things-Based Healthcare System: A Survey Study. Acta Inform. Medica 2019, 27, 253–258. [Google Scholar] [CrossRef] [PubMed]
- Hathaliya, J.J.; Tanwar, S. An Exhaustive Survey on Security and Privacy Issues in Healthcare 4.0. Comput. Commun. 2020, 153, 311–335. [Google Scholar] [CrossRef]
- Bhuiyan, M.N.; Rahman, M.M.; Billah, M.M.; Saha, D. Internet of Things (IoT): A Review of Its Enabling Technologies in Healthcare Applications, Standards Protocols, Security, and Market Opportunities. IEEE Internet Things J. 2021, 8, 10474–10498. [Google Scholar] [CrossRef]
- Kumar, A.V.; Sujith, M.S.; Sai, K.T.; Rajesh, G.; Yashwanth, D.J.S. Secure Multiparty Computation Enabled E-Healthcare System with Homomorphic Encryption. In Proceedings of the IOP Conference Series: Materials Science and Engineering, Warangal, India, 9–10 October 2020; IOP Publishing: Bristol, UK, 2020; Volume 981, p. 022079. [Google Scholar]
- Agbo, C.C.; Mahmoud, Q.H. Blockchain in Healthcare: Opportunities, Challenges, and Possible Solutions. Int. J. Healthc. Inf. Syst. Inform. (IJHISI) 2020, 15, 82–97. [Google Scholar] [CrossRef]
- Bhalaji, N.; Abilashkumar, P.C.; Aboorva, S. A Blockchain-Based Approach for Privacy Preservation in Healthcare IoT. In Proceedings of the ICICCT 2019–System Reliability, Quality Control, Safety, Maintenance and Management: Applications to Electrical, Electronics and Computer Science and Engineering, Hyderabad, India, 9–11 January 2019; Springer: Singapore, 2020; pp. 465–473. [Google Scholar]
- Jeong, S.; Shen, J.H.; Ahn, B. A Study on Smart Healthcare Monitoring Using IoT Based on Blockchain. Wirel. Commun. Mob. Comput. 2021, 2021, 9932091. [Google Scholar] [CrossRef]
- Ratta, P.; Kaur, A.; Sharma, S.; Shabaz, M.; Dhiman, G. Application of Blockchain and Internet of Things in Healthcare and Medical Sector: Applications, Challenges, and Future Perspectives. J. Food Qual. 2021, 2021, 7608296. [Google Scholar] [CrossRef]
- Alzoubi, Y.I.; Al-Ahmad, A.; Kahtan, H.; Jaradat, A. Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges. Future Internet 2022, 14, 216. [Google Scholar] [CrossRef]
- Husnain, G.; Ullah, Z.; Mohmand, M.I.; Qadir, M.; Alzahrani, K.J.; Ghadi, Y.Y.; Alkahtani, H.K. HealthChain: A Blockchain-Based Framework for Secure and Interoperable Electronic Health Records (EHRs). IET Commun. 2024, 18, 1451–1473. [Google Scholar] [CrossRef]
- Patel, C. IoT Privacy Preservation Using Blockchain. Inf. Secur. J. Glob. Perspect. 2022, 31, 566–581. [Google Scholar]
- Namasudra, S.; Sharma, P.; Crespo, R.G.; Shanmuganathan, V. Blockchain-Based Medical Certificate Generation and Verification for IoT-Based Healthcare Systems. IEEE Consum. Electron. Mag. 2022, 12, 83–93. [Google Scholar] [CrossRef]
- Saini, A.; Zhu, Q.; Singh, N.; Xiang, Y.; Gao, L.; Zhang, Y. A Smart-Contract-Based Access Control Framework for Cloud Smart Healthcare System. IEEE Internet Things J. 2020, 8, 5914–5925. [Google Scholar] [CrossRef]
- Karunarathne, S.M.; Saxena, N.; Khan, M.K. Security and Privacy in IoT Smart Healthcare. IEEE Internet Comput. 2021, 25, 37–48. [Google Scholar] [CrossRef]
- Sadek, I.; Rehman, S.U.; Codjo, J.; Abdulrazak, B. Privacy and Security of IoT-Based Healthcare Systems: Concerns, Solutions, and Recommendations. In How AI Impacts Urban Living and Public Health, Proceedings of the 17th International Conference, ICOST 2019, New York City, NY, USA, 14–16 October 2019; Springer International Publishing: Berlin/Heidelberg, Germany, 2019; pp. 3–17. [Google Scholar]
- Chukwu, N.P.; Edeagu, S.; Chijindu, V.; Nnenna, E.; Ndu, I.O.; Ahaneku, M.; Iloanusi, O. Challenges of Security and Privacy with IoT in Healthcare: An Overview. In Proceedings of the International Conference on Technological Innovation for Holistic Sustainable Development 2020, Nsukka, Nigeria, 21–22 September 2020. [Google Scholar]
- Salim, M.M.; Kim, I.; Doniyor, U.; Lee, C.; Park, J.H. Homomorphic Encryption-Based Privacy-Preservation for IoMT. Appl. Sci. 2021, 11, 8757. [Google Scholar] [CrossRef]
- Guo, X.; Lin, H.; Wu, Y.; Peng, M. A New Data Clustering Strategy for Enhancing Mutual Privacy in Healthcare IoT Systems. Future Gener. Comput. Syst. 2020, 113, 407–417. [Google Scholar] [CrossRef]
- Li, J.; Meng, Y.; Ma, L.; Du, S.; Zhu, H.; Pei, Q.; Shen, X. A Federated Learning-Based Privacy-Preserving Smart Healthcare System. IEEE Trans. Ind. Inform. 2021, 18, 2021–2031. [Google Scholar]
- Şahinbaş, K.; Çatak, F.Ö. Secure Multi-Party Computation-Based Privacy-Preserving Data Analysis in Healthcare IoT Systems. arXiv 2021, arXiv:2109.14334. [Google Scholar]
- Onesimu, J.A.; Karthikeyan, J.; Sei, Y. An Efficient Clustering-Based Anonymization Scheme for Privacy-Preserving Data Collection in IoT-Based Healthcare Services. Peer -Peer Netw. Appl. 2021, 14, 1629–1649. [Google Scholar]
- Nasr, M.; Shahgholi Ghahfarokhi, B.; Etemadi Borujeni, S. End-to-End Privacy-Preserving Scheme for IoT-Based Healthcare Systems. Wirel. Netw. 2021, 27, 4009–4037. [Google Scholar] [CrossRef]
- Ren, W.; Tong, X.; Du, J.; Wang, N.; Li, S.; Min, G.; Zhao, Z. Privacy Enhancing Techniques in the Internet of Things Using Data Anonymisation. Inf. Syst. Front. 2021, 26, 2227–2238. [Google Scholar] [CrossRef]
- Thummisetti, B.S.P.; Atluri, H. Advancing Healthcare Informatics for Empowering Privacy and Security Through Federated Learning Paradigms. Int. J. Sustain. Dev. Comput. Sci. 2024, 6, 1–16. [Google Scholar]
- Yang, Y.; Zheng, X.; Guo, W.; Liu, X.; Chang, V. Privacy-Preserving Smart IoT-Based Healthcare Big Data Storage and Self-Adaptive Access Control System. Inf. Sci. 2019, 479, 567–592. [Google Scholar]
- Khan, W.Z.; Ahmed, E.; Hakak, S.; Yaqoob, I.; Ahmed, A. Edge Computing: A Survey. Future Gener. Comput. Syst. 2019, 97, 219–235. [Google Scholar]
- Meng, L.; Li, D. Novel Edge Computing-Based Privacy-Preserving Approach for Smart Healthcare Systems in the Internet of Medical Things. J. Grid Comput. 2023, 21, 66. [Google Scholar]
- Wang, R.; Lai, J.; Zhang, Z.; Li, X.; Vijayakumar, P.; Karuppiah, M. Privacy-Preserving Federated Learning for Internet of Medical Things Under Edge Computing. IEEE J. Biomed. Health Inform. 2022, 27, 854–865. [Google Scholar]
- Ali, A.; Al-Rimy, B.A.S.; Alsubaei, F.S.; Almazroi, A.A.; Almazroi, A.A. HealthLock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Internet of Things Healthcare Applications. Sensors 2023, 23, 6762. [Google Scholar] [CrossRef]
- Refaee, E.; Parveen, S.; Begum, K.M.J.; Parveen, F.; Raja, M.C.; Gupta, S.K.; Krishnan, S. Secure and Scalable Healthcare Data Transmission in IoT Based on Optimized Routing Protocols for Mobile Computing Applications. Wirel. Commun. Mob. Comput. 2022, 2022, 5665408. [Google Scholar]
- Robles, T.; Bordel, B.; Alcarria, R.; Sánchez-de Rivera, D. Enabling Trustworthy Personal Data Protection in eHealth and Well-Being Services Through Privacy-by-Design. Int. J. Distrib. Sens. Netw. 2020, 16, 1550147720912110. [Google Scholar] [CrossRef]
- Ahmed, M.I.; Kannan, G. Secure and Lightweight Privacy-Preserving Internet of Things Integration for Remote Patient Monitoring. J. King Saud-Univ.-Comput. Inf. Sci. 2022, 34, 6895–6908. [Google Scholar]
- Seliem, M.; Elgazzar, K.; Khalil, K. Towards Privacy-Preserving IoT Environments: A Survey. Wirel. Commun. Mob. Comput. 2018, 2018, 1032761. [Google Scholar] [CrossRef]
- Tawalbeh, L.; Muheidat, F.; Tawalbeh, M.; Quwaider, M. IoT Privacy and Security: Challenges and Solutions. Appl. Sci. 2020, 10, 4102. [Google Scholar] [CrossRef]
- Wu, X.; Zhang, Y.; Shi, M.; Li, P.; Li, R.; Xiong, N.N. An Adaptive Federated Learning Scheme with Differential Privacy Preserving. Future Gener. Comput. Syst. 2022, 127, 362–372. [Google Scholar] [CrossRef]
- Zhang, P.; Huang, T.; Sun, X.; Zhao, W.; Liu, H.; Lai, S.; Liu, J.K. Privacy-Preserving and Outsourced Multi-Party k-Means Clustering Based on Multi-Key Fully Homomorphic Encryption. IEEE Trans. Dependable Secur. Comput. 2022, 20, 2348–2359. [Google Scholar] [CrossRef]
- Anand, G.; Sadhna, D. Electronic Health Record Interoperability Using FHIR and Blockchain: A Bibliometric Analysis and Future Perspective. Perspect. Clin. Res. 2023, 14, 161–166. [Google Scholar] [CrossRef]
- Saranya, R.; Murugan, A. A Systematic Review of Enabling Blockchain in Healthcare System: Analysis, Current Status, Challenges, and Future Direction. Mater. Today Proc. 2023, 80, 3010–3015. [Google Scholar] [CrossRef]
- Cao, T.D.; Truong-Huu, T.; Tran, H.; Tran, K. A Federated Deep Learning Framework for Privacy Preservation and Communication Efficiency. J. Syst. Archit. 2022, 124, 102413. [Google Scholar] [CrossRef]
- Kounoudes, A.D.; Kapitsaki, G.M. A Mapping of IoT User-Centric Privacy-Preserving Approaches to the GDPR. Internet Things 2020, 11, 100179. [Google Scholar] [CrossRef]
- Alraja, M.N.; Farooque, M.M.J.; Khashab, B. The Effect of Security, Privacy, Familiarity, and Trust on Users’ Attitudes Toward the Use of IoT-Based Healthcare: The Mediation Role of Risk Perception. IEEE Access 2019, 7, 111341–111354. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Nabha, R.; Laouiti, A.; Samhat, A.E. Internet of Things-Based Healthcare Systems: An Overview of Privacy-Preserving Mechanisms. Appl. Sci. 2025, 15, 3629. https://doi.org/10.3390/app15073629
Nabha R, Laouiti A, Samhat AE. Internet of Things-Based Healthcare Systems: An Overview of Privacy-Preserving Mechanisms. Applied Sciences. 2025; 15(7):3629. https://doi.org/10.3390/app15073629
Chicago/Turabian StyleNabha, Reem, Anis Laouiti, and Abed Ellatif Samhat. 2025. "Internet of Things-Based Healthcare Systems: An Overview of Privacy-Preserving Mechanisms" Applied Sciences 15, no. 7: 3629. https://doi.org/10.3390/app15073629
APA StyleNabha, R., Laouiti, A., & Samhat, A. E. (2025). Internet of Things-Based Healthcare Systems: An Overview of Privacy-Preserving Mechanisms. Applied Sciences, 15(7), 3629. https://doi.org/10.3390/app15073629