A Framework for Privacy and Security Model Based on Agents in E-Health Care Systems

  • Mohammed Ateeq Alanezi
  • Z. Faizal KhanEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1073)


Usage of various systems for Electronic Healthcare Record (EHR) is increased in recent years. Majority of the hospitals and other laboratories requires health data sets during the treatment process. For enhancing the standard of the services provided by these health centers, the electronic health records should be shared so that it can be used by various users based on their requirements. Various researches have been done in the past for enhancing the security and privacy of these EHR data. Even though, it is not completely achieved. In this paper, a novel framework for maintaining the security and privacy of the EHR data based on agent based system is proposed. The agent based system consists of various intelligent agents such as the user interface agent, authentication agent, connection establishment agent and the connection management agent with distinct and expedient working features. These intelligent agents make ease of use, effective communication between patients/users and the E-service providers. This system monitors the data flow and focuses on various security and privacy concerns that the e-healthcare environment is facing.


Information Technology Electronic health records Agent based systems Agents Privacy and security 


  1. 1.
    Barua, M., et al.: Peace: an efficient and secure patient-centric access control scheme for eHealth care system. In: 2011 IEEE Conference Computer Communications Workshops (INFOCOM WKSHPS) (2011)Google Scholar
  2. 2.
    Fernández-Alemán, J.L., et al.: Security and privacy in electronic health records: a systematic literature review. J. Biomed. Inform. 46(3), 541–562 (2013)CrossRefGoogle Scholar
  3. 3.
    Kahani, N., Elgazzar, K., Cordy, J.R.: Authentication and access control in e-Health systems in the cloud. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp. 13–23 (2016)Google Scholar
  4. 4.
    Shinde, S.S., Patil, D.: Review on security and privacy for mobile healthcare networks: from a quality of protection perspective. Int. J. Eng. Res.-Online Peer Reviewed Int. J. 3(6) (2015)Google Scholar
  5. 5.
    Habib, K., Torjusen, A., Leister, W.: Security analysis of a patient monitoring system for the Internet of Things in eHealth. In: Proceedings of the International Conference on eHealth, Telemedicine, and Social Medicine (eTELEMED 2015) (2015)Google Scholar
  6. 6.
    Sankaranarayanan, S., Ganesan, S.: Applications of intelligent agents in health sector-a review. Int. J. E-Health Med. Commun. 7(1), 1–30 (2016)CrossRefGoogle Scholar
  7. 7.
    Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., Wang, G.: Security and privacy in the medical Internet of Things: a review. Secur. Commun. Netw.-Hindawi 28 (2018)Google Scholar
  8. 8.
    Manirabona, A., Fourati, L.C., Boudjit, S.: Investigation on healthcare monitoring systems: innovative services and applications. Int. J. E-Health Med. Commun. 8(1) (2017)Google Scholar
  9. 9.
    Han, S., Zhao, S., Li, Q., Ju, C.-H., Zhou, W.: PPM-HDA: privacy-preserving and multifunctional health data aggregation with fault tolerance. IEEE Trans. Inf. Forensics Secur. 11(9), 1940–1955 (2016)CrossRefGoogle Scholar
  10. 10.
    Tang, J., Liu, A., Zhao, M., Wang, T.: An aggregate signature based trust routing for data gathering in sensor networks. Secur. Commun. Netw. 2018(6328504), 30 (2018)Google Scholar
  11. 11.
    Sun, W., Cai, Z., Liu, F., et al.: A survey of data mining technology on electronic medical records. In: Proceedings of the International Conference on E-Health Networking, Application and Services, pp. 1–6 (2017)Google Scholar
  12. 12.
    Shin, M., Jeon, H., Ju, Y., Lee, B., Jeong, S.: Constructing RBAC based security model in u-healthcare service platform. Sci. World J. 2005, 1–13 (2014)Google Scholar
  13. 13.
    Chandrasekhar, S., Ibrahim, A., Singhal, M.: A novel access control protocol using proxy signatures for cloud-based health information exchange. Comput. Secur. 67, 73–88 (2017)CrossRefGoogle Scholar
  14. 14.
    Bonab, T.H., Masdari, M.: Security attacks in wireless body area networks: challenges and issues. Acad. R. Des Sci. D OutreMer Bull. Des Seances 4(4), 100–107 (2015)Google Scholar
  15. 15.
    Santos-Pereira, C., et al.: A secure RBAC mobile agent access control model for healthcare institutions. In: Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems. IEEE (2013)Google Scholar
  16. 16.
    Azeez, N., Ademolu, O.: CyberProtector: identifying compromised URLs in electronic mails with Bayesian classification. In: International Conference Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, pp. 959–965 (2016)Google Scholar
  17. 17.
    Gajanayake, R., Iannella, R., Sahama, T.: Privacy oriented access control for electronic health records. e-Journal Health Inform. 8(2), 175–186 (2014)Google Scholar
  18. 18.
    MuthamilSelvan, T., Balamurugan, B.: Comparative performance analysis of various classifiers for cloud e-health users. Int. J. E-Health Med. Commun. 10(2), 86–101 (2019)CrossRefGoogle Scholar
  19. 19.
    Wellington, K.: Cyberattacks on medical devices and hospital networks: legal gaps and regulatory solutions. Santa Clara High Tech. LJ 30, 139 (2013)Google Scholar
  20. 20.
    Khennou, F., Chaoui, N.E.H., Khamlichi, Y.I.: A mogration methodology from legacy to new electronic health record based open EHR. Int. J. E-Health Med. Commun. 10(1), 55–75 (2019)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.College of Computing and Information TechnologyShaqra UniversityShaqraaKingdom of Saudi Arabia

Personalised recommendations