Cargando…
Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems
Secure identification is a critical system requirement for patients seeking health-related services. In the event of critical, aged, or disabled patients who require frequent health treatments, quick and easy identification is vital. Researchers describe the notion of the unprotected environment in...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8970854/ https://www.ncbi.nlm.nih.gov/pubmed/35368929 http://dx.doi.org/10.1155/2022/1789996 |
_version_ | 1784679523167502336 |
---|---|
author | Nigam, Dhananjay Patel, Shilp Nirajbhai Raj Vincent, P. M. Durai Srinivasan, Kathiravan Arunmozhi, Sinouvassane |
author_facet | Nigam, Dhananjay Patel, Shilp Nirajbhai Raj Vincent, P. M. Durai Srinivasan, Kathiravan Arunmozhi, Sinouvassane |
author_sort | Nigam, Dhananjay |
collection | PubMed |
description | Secure identification is a critical system requirement for patients seeking health-related services. In the event of critical, aged, or disabled patients who require frequent health treatments, quick and easy identification is vital. Researchers describe the notion of the unprotected environment in this study, in which patients can receive health services from the hospital's smart and intelligent surroundings without the use of explicit equipment. Patients would interact directly with the environment and be identified through it. We suggest a biometric-based authentication technique for the unprotected hospital environment that also safeguards the patient's identity privacy. Furthermore, we demonstrate that this authentication technique is resistant to many well-known assaults, including insider attacks, replay attacks, and identity privacy. Doctors and other staff members showed enthusiastic responses after installing 2-factor authentications, as it makes their workflow efficient and makes things easier for patients. It also lets them focus on other factors rather than worrying about data security; hence, we need biometric authentication in intelligent and privacy-preserving healthcare systems. The paper deals with two-factor biometric authentication, and despite the added security, two-factor authentication adoption is said to be poor. It is due to a lack of awareness and difficulty to use and configure two-factor authentication (2FA) into a particular application by some individuals who struggle with the concept of authentication and its technology. Also, many 2FA methods in widespread use today have not been subjected to adequate usability testing. Research focuses on the point that there is still a large section of people unaware of the use of biometric systems to protect their online data. Researchers collected quantitative and qualitative data from 96 individuals during a two-week between-subjects usability survey of some common and rarely used 2FA approaches. The survey allowed the researcher to investigate which authentication methods are given higher priority and why, along with the relationship between different usage patterns and perceived usability, and identify user misconceptions and insecure habits to determine ease of use. It was observed that the biometric-based method was given the utmost preferability. |
format | Online Article Text |
id | pubmed-8970854 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Hindawi |
record_format | MEDLINE/PubMed |
spelling | pubmed-89708542022-04-01 Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems Nigam, Dhananjay Patel, Shilp Nirajbhai Raj Vincent, P. M. Durai Srinivasan, Kathiravan Arunmozhi, Sinouvassane J Healthc Eng Review Article Secure identification is a critical system requirement for patients seeking health-related services. In the event of critical, aged, or disabled patients who require frequent health treatments, quick and easy identification is vital. Researchers describe the notion of the unprotected environment in this study, in which patients can receive health services from the hospital's smart and intelligent surroundings without the use of explicit equipment. Patients would interact directly with the environment and be identified through it. We suggest a biometric-based authentication technique for the unprotected hospital environment that also safeguards the patient's identity privacy. Furthermore, we demonstrate that this authentication technique is resistant to many well-known assaults, including insider attacks, replay attacks, and identity privacy. Doctors and other staff members showed enthusiastic responses after installing 2-factor authentications, as it makes their workflow efficient and makes things easier for patients. It also lets them focus on other factors rather than worrying about data security; hence, we need biometric authentication in intelligent and privacy-preserving healthcare systems. The paper deals with two-factor biometric authentication, and despite the added security, two-factor authentication adoption is said to be poor. It is due to a lack of awareness and difficulty to use and configure two-factor authentication (2FA) into a particular application by some individuals who struggle with the concept of authentication and its technology. Also, many 2FA methods in widespread use today have not been subjected to adequate usability testing. Research focuses on the point that there is still a large section of people unaware of the use of biometric systems to protect their online data. Researchers collected quantitative and qualitative data from 96 individuals during a two-week between-subjects usability survey of some common and rarely used 2FA approaches. The survey allowed the researcher to investigate which authentication methods are given higher priority and why, along with the relationship between different usage patterns and perceived usability, and identify user misconceptions and insecure habits to determine ease of use. It was observed that the biometric-based method was given the utmost preferability. Hindawi 2022-03-24 /pmc/articles/PMC8970854/ /pubmed/35368929 http://dx.doi.org/10.1155/2022/1789996 Text en Copyright © 2022 Dhananjay Nigam et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Review Article Nigam, Dhananjay Patel, Shilp Nirajbhai Raj Vincent, P. M. Durai Srinivasan, Kathiravan Arunmozhi, Sinouvassane Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems |
title | Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems |
title_full | Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems |
title_fullStr | Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems |
title_full_unstemmed | Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems |
title_short | Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems |
title_sort | biometric authentication for intelligent and privacy-preserving healthcare systems |
topic | Review Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8970854/ https://www.ncbi.nlm.nih.gov/pubmed/35368929 http://dx.doi.org/10.1155/2022/1789996 |
work_keys_str_mv | AT nigamdhananjay biometricauthenticationforintelligentandprivacypreservinghealthcaresystems AT patelshilpnirajbhai biometricauthenticationforintelligentandprivacypreservinghealthcaresystems AT rajvincentpmdurai biometricauthenticationforintelligentandprivacypreservinghealthcaresystems AT srinivasankathiravan biometricauthenticationforintelligentandprivacypreservinghealthcaresystems AT arunmozhisinouvassane biometricauthenticationforintelligentandprivacypreservinghealthcaresystems |