Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Digital evolution, whether through Internet advances or the development of connected objects, has triggered a veritable societal revolution. Thanks to technological advances, e-health services enable healthcare professionals to monitor patients in real time. However, new challenges have also arisen in the field of e-health, concerning the security of medical data, as well as the protection of patient privacy.
After presenting e-health architectures and explaining the proliferation of cyber attacks, e-Health Security Management focuses on proposing solutions designed to meet these security imperatives and respect patient privacy, such as the use of blockchain, "biometrics", new encryption methods or artificial intelligence. Implementing these solutions is crucial to guarantee the acceptance and effectiveness of e-health services.
Omessaad Hamdi is a member of the IEEE and has a PhD in computer science. Her research focuses on information systems security.
Omessaad HAMDI
IEEE, Rennes, France
Digitization occupies a central place in all our daily activities, and the healthcare field is particularly affected by this digital evolution, which has considerably improved patient care (Hermes et al. 2020; Gupta et al. 2021). This improvement is based on two key factors: the increased involvement of patients in the management of their health, and easy access for healthcare professionals to digital tools and services.
Digitization is also improving people's quality of life, in terms of well-being and autonomy, and is helping respond to the growing number of elderly people worldwide. The phenomenon of aging is becoming a growing concern. To enable this population to age in a secure environment with a good quality of life, while reducing costs, several approaches have been developed.
In this chapter, we focus on e-health architectures. We begin by introducing the terms used in e-health. Next, we present the services offered by e-health systems and their requirements. The final sections will focus on security and the techniques used to guarantee the required security services. Finally, we look ahead to the future of e-health.
The term e-health refers to information and communication technologies (ICT) combined with the Internet in the service of health.
Telehealth is part of e-health. It refers to the use of tools for producing, transmitting, and managing digitized medical information. Telehealth encompasses telemedicine and mobile health (m-health).
m-Health is part of telehealth. It refers to healthcare practices supported by mobile devices, such as cell phones, patient monitoring systems and other wireless devices. The term includes, among others, applications such as wellness apps. Bashshur et al. (2011) point out that m-health is the only ICT-based healthcare field that can be justified solely based on mobility.
Telemedicine is part of telehealth. It refers to the digital transmission of medical information (images, recordings, etc.) for remote diagnosis, specialist advice and continuous monitoring of a patient.
There are four forms of telemedicine (2010 decree):
Figure 1.1 summarizes the components of telehealth.
Figure 1.1. Components of e-health
e-Health offers a wide range of services designed to improve the quality of care and accessibility to medical services thanks to digital technologies:
e-Health systems must meet certain requirements if they are to be adapted by users.
In this section, we present some of these requirements:
Figure 1.2 summarizes the services and requirements of e-health systems.
Figure 1.2. Services and requirements for e-health systems
Different e-health system architectures have been developed to meet the specific needs of each project.
An architecture that summarizes most of the architectures proposed in the literature is shown in Figure 1.3.
In all e-health architectures, information flows from the patient to a medical server. Data are transferred from the sensors to a gateway that manages the sensors. Data transfer in the network can be continuous or ad hoc. Collected data are stored in a gateway, and then uploaded to a medical server.
The main components of an e-health system are as follows (Hamdi et al. 2014):
Figure 1.3 gives an overview of the main components of e-health systems.
Figure 1.3. Architecture of e-health systems (Hajar et al. 2021)
Connection technologies such as Bluetooth, WiFi, Internet and ZigBee play a key role in the growth of e-health applications and systems. When used in conjunction with other technologies, such as the Internet of Things (IoT), robotics, artificial intelligence (AI), cloud and Big Data, high-performance e-health systems can be created (Devedzic et al. 2021).
Figure 1.4. e-Health technologies
Figure 1.4 illustrates the main technologies used in e-health systems. These are grouped into medical devices, connection technologies and other technologies, and are detailed below.
Devices are mainly made up of sensors and connected objects, which play a key role in monitoring and...
Dateiformat: ePUBKopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.