Cargando…

Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems

Secure identification is a critical system requirement for patients seeking health-related services. In the event of critical, aged, or disabled patients who require frequent health treatments, quick and easy identification is vital. Researchers describe the notion of the unprotected environment in...

Descripción completa

Detalles Bibliográficos
Autores principales: Nigam, Dhananjay, Patel, Shilp Nirajbhai, Raj Vincent, P. M. Durai, Srinivasan, Kathiravan, Arunmozhi, Sinouvassane
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8970854/
https://www.ncbi.nlm.nih.gov/pubmed/35368929
http://dx.doi.org/10.1155/2022/1789996
_version_ 1784679523167502336
author Nigam, Dhananjay
Patel, Shilp Nirajbhai
Raj Vincent, P. M. Durai
Srinivasan, Kathiravan
Arunmozhi, Sinouvassane
author_facet Nigam, Dhananjay
Patel, Shilp Nirajbhai
Raj Vincent, P. M. Durai
Srinivasan, Kathiravan
Arunmozhi, Sinouvassane
author_sort Nigam, Dhananjay
collection PubMed
description Secure identification is a critical system requirement for patients seeking health-related services. In the event of critical, aged, or disabled patients who require frequent health treatments, quick and easy identification is vital. Researchers describe the notion of the unprotected environment in this study, in which patients can receive health services from the hospital's smart and intelligent surroundings without the use of explicit equipment. Patients would interact directly with the environment and be identified through it. We suggest a biometric-based authentication technique for the unprotected hospital environment that also safeguards the patient's identity privacy. Furthermore, we demonstrate that this authentication technique is resistant to many well-known assaults, including insider attacks, replay attacks, and identity privacy. Doctors and other staff members showed enthusiastic responses after installing 2-factor authentications, as it makes their workflow efficient and makes things easier for patients. It also lets them focus on other factors rather than worrying about data security; hence, we need biometric authentication in intelligent and privacy-preserving healthcare systems. The paper deals with two-factor biometric authentication, and despite the added security, two-factor authentication adoption is said to be poor. It is due to a lack of awareness and difficulty to use and configure two-factor authentication (2FA) into a particular application by some individuals who struggle with the concept of authentication and its technology. Also, many 2FA methods in widespread use today have not been subjected to adequate usability testing. Research focuses on the point that there is still a large section of people unaware of the use of biometric systems to protect their online data. Researchers collected quantitative and qualitative data from 96 individuals during a two-week between-subjects usability survey of some common and rarely used 2FA approaches. The survey allowed the researcher to investigate which authentication methods are given higher priority and why, along with the relationship between different usage patterns and perceived usability, and identify user misconceptions and insecure habits to determine ease of use. It was observed that the biometric-based method was given the utmost preferability.
format Online
Article
Text
id pubmed-8970854
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Hindawi
record_format MEDLINE/PubMed
spelling pubmed-89708542022-04-01 Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems Nigam, Dhananjay Patel, Shilp Nirajbhai Raj Vincent, P. M. Durai Srinivasan, Kathiravan Arunmozhi, Sinouvassane J Healthc Eng Review Article Secure identification is a critical system requirement for patients seeking health-related services. In the event of critical, aged, or disabled patients who require frequent health treatments, quick and easy identification is vital. Researchers describe the notion of the unprotected environment in this study, in which patients can receive health services from the hospital's smart and intelligent surroundings without the use of explicit equipment. Patients would interact directly with the environment and be identified through it. We suggest a biometric-based authentication technique for the unprotected hospital environment that also safeguards the patient's identity privacy. Furthermore, we demonstrate that this authentication technique is resistant to many well-known assaults, including insider attacks, replay attacks, and identity privacy. Doctors and other staff members showed enthusiastic responses after installing 2-factor authentications, as it makes their workflow efficient and makes things easier for patients. It also lets them focus on other factors rather than worrying about data security; hence, we need biometric authentication in intelligent and privacy-preserving healthcare systems. The paper deals with two-factor biometric authentication, and despite the added security, two-factor authentication adoption is said to be poor. It is due to a lack of awareness and difficulty to use and configure two-factor authentication (2FA) into a particular application by some individuals who struggle with the concept of authentication and its technology. Also, many 2FA methods in widespread use today have not been subjected to adequate usability testing. Research focuses on the point that there is still a large section of people unaware of the use of biometric systems to protect their online data. Researchers collected quantitative and qualitative data from 96 individuals during a two-week between-subjects usability survey of some common and rarely used 2FA approaches. The survey allowed the researcher to investigate which authentication methods are given higher priority and why, along with the relationship between different usage patterns and perceived usability, and identify user misconceptions and insecure habits to determine ease of use. It was observed that the biometric-based method was given the utmost preferability. Hindawi 2022-03-24 /pmc/articles/PMC8970854/ /pubmed/35368929 http://dx.doi.org/10.1155/2022/1789996 Text en Copyright © 2022 Dhananjay Nigam et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Review Article
Nigam, Dhananjay
Patel, Shilp Nirajbhai
Raj Vincent, P. M. Durai
Srinivasan, Kathiravan
Arunmozhi, Sinouvassane
Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems
title Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems
title_full Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems
title_fullStr Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems
title_full_unstemmed Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems
title_short Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems
title_sort biometric authentication for intelligent and privacy-preserving healthcare systems
topic Review Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8970854/
https://www.ncbi.nlm.nih.gov/pubmed/35368929
http://dx.doi.org/10.1155/2022/1789996
work_keys_str_mv AT nigamdhananjay biometricauthenticationforintelligentandprivacypreservinghealthcaresystems
AT patelshilpnirajbhai biometricauthenticationforintelligentandprivacypreservinghealthcaresystems
AT rajvincentpmdurai biometricauthenticationforintelligentandprivacypreservinghealthcaresystems
AT srinivasankathiravan biometricauthenticationforintelligentandprivacypreservinghealthcaresystems
AT arunmozhisinouvassane biometricauthenticationforintelligentandprivacypreservinghealthcaresystems