{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T04:30:32Z","timestamp":1762057832763,"version":"build-2065373602"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T00:00:00Z","timestamp":1657324800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T00:00:00Z","timestamp":1657324800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2022,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The deployment of Internet of Things platforms as well as the use of mobile and wireless technologies to support healthcare environments have enormous potential to transform healthcare. This has also led to a desire to make eHealth and mHealth part of national healthcare systems. The COVID-19 pandemic has accelerated the requirement to do this to reduce the number of patients needing to attend hospitals and General Practitioner surgeries. This direction, however, has resulted in a renewed need to look at security of future healthcare platforms including information and data security as well as network and cyber-physical security. There have been security frameworks that were developed to address such issues. However, it is necessary to develop a security framework with a combination of security mechanisms that can be used to provide all the essential security requirements for healthcare systems. In addition, there is now a need to move from frameworks to prototypes which is the focus of this paper. Several security frameworks for eHealth and mHealth are first examined. This leads to a new reference model from which an implementation framework is developed using new mechanisms such as Capabilities, Secure Remote Procedure Calls, and a Service Management Framework. The prototype is then evaluated against practical security requirements.<\/jats:p>","DOI":"10.1007\/s40860-022-00180-7","type":"journal-article","created":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T09:02:27Z","timestamp":1657357347000},"page":"299-315","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Securing future healthcare environments in a post-COVID-19 world: moving from frameworks to prototypes"],"prefix":"10.1007","volume":"8","author":[{"given":"Nattaruedee","family":"Vithanwattana","sequence":"first","affiliation":[]},{"given":"Gayathri","family":"Karthick","sequence":"additional","affiliation":[]},{"given":"Glenford","family":"Mapp","sequence":"additional","affiliation":[]},{"given":"Carlisle","family":"George","sequence":"additional","affiliation":[]},{"given":"Ann","family":"Samuels","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,9]]},"reference":[{"key":"180_CR1","unstructured":"NHS Digital (N\/A) Transparency notice: how we use your personal data [online] Available at: https:\/\/digital.nhs.uk\/about-nhs-digital\/our-work\/keeping-patient-data-safe\/gdpr\/gdpr-register (Accessed: 3 August 2021)"},{"issue":"3","key":"180_CR2","first-page":"67","volume":"2","author":"MN Tahir","year":"2007","unstructured":"Tahir MN (2007) C-RBAC: contextual role-based access control model. Ubiquitous Comput Commun J 2(3):67\u201374","journal-title":"Ubiquitous Comput Commun J"},{"key":"180_CR3","doi-asserted-by":"publisher","unstructured":"Barkley J (1995) Implementing role-based access control using object technology. In: Proceedings of the First ACM Workshop on Role-Based Access Control (RBAC), pp. 93\u201398. https:\/\/doi.org\/10.1145\/270152.270192","DOI":"10.1145\/270152.270192"},{"key":"180_CR4","unstructured":"U.S. Department of Health and Human Services (2013) Summary of the HIPPA Privacy Rule [online] Available at: https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html (Accessed: 3 August 2021)"},{"key":"180_CR5","unstructured":"Aver H (2021) Ransomware attacks on healthcare [online] Available at: https:\/\/www.kaspersky.co.uk\/blog\/ransomware-vs-healthcare\/22670\/ (Accessed: 6 August 2021)"},{"key":"180_CR6","unstructured":"Center for Internet Security (N\/A) Ransomware: In the Healthcare Sector [online] Available at: https:\/\/www.cisecurity.org\/blog\/ransomware-in-the-healthcare-sector\/ (Accessed: 6 August 2021)"},{"key":"180_CR7","doi-asserted-by":"publisher","unstructured":"Ashu MR, Zafar S (2021) DDoS attacks impact on data transfer in IOT-MANET-based E-Healthcare for Tackling COVID-19. In: Khanna A., Gupta D., P\u00f3lkowski Z., Bhattacharyya S., Castillo O. (eds) Data analytics and management. Lecture notes on data engineering and communications technologies, vol 54. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-15-8335-3_24","DOI":"10.1007\/978-981-15-8335-3_24"},{"key":"180_CR8","doi-asserted-by":"publisher","unstructured":"Sami I, Asif M, Ahmad MB, Ullah R (2018) DoS\/DDoS detection for E-Healthcare in internet of things. Int J Adv Compu Sci Appl 2(1): 297\u2013300. https:\/\/doi.org\/10.14569\/IJACSA.2018","DOI":"10.14569\/IJACSA.2018"},{"key":"180_CR9","doi-asserted-by":"publisher","unstructured":"Firesmith D (2003) Analyzing and specifying reusable security requirements. In: IEEE 11th International Conference on Requirements Engineering, RHAS 2003, pp. 507-514. https:\/\/doi.org\/10.5381\/jot.2004.3.1.c6","DOI":"10.5381\/jot.2004.3.1.c6"},{"issue":"1","key":"180_CR10","doi-asserted-by":"publisher","first-page":"61","DOI":"10.5381\/JOT.2004.3.1.C6","volume":"3","author":"D Firesmith","year":"2004","unstructured":"Firesmith D (2004) Specifying reusable security requirements. J Obj Technol 3(1):61\u201375. https:\/\/doi.org\/10.5381\/JOT.2004.3.1.C6","journal-title":"J Obj Technol"},{"issue":"3","key":"180_CR11","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1145\/365230.365252","volume":"9","author":"JB Dennis","year":"1966","unstructured":"Dennis JB, Horn ECV (1966) Programming semantics for multiprogrammed computations. Commun ACM 9(3):143\u2013155. https:\/\/doi.org\/10.1145\/365230.365252","journal-title":"Commun ACM"},{"key":"180_CR12","doi-asserted-by":"publisher","unstructured":"Mapp G, Aiash M, Ondiege B, Clarke M (2014) Exploring a new security framework for cloud storage using capabilities. In: 2014 IEEE 8th Symposium on Service Oriented System Engineering (SOSE). IEEE, Oxford, pp 484-489. https:\/\/doi.org\/10.1109\/SOSE.2014.69","DOI":"10.1109\/SOSE.2014.69"},{"key":"180_CR13","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1016\/j.future.2019.01.008","volume":"95","author":"S Pirbhulal","year":"2019","unstructured":"Pirbhulal S, Samuel OW, Wu W, Sangaiah K, Li G (2019) A joint resource-aware and medical data security framework for wearable healthcare systems. Fut Gen Comput Syst 95:382\u2013391. https:\/\/doi.org\/10.1016\/j.future.2019.01.008","journal-title":"Fut Gen Comput Syst"},{"issue":"15\u201316","key":"180_CR14","doi-asserted-by":"publisher","first-page":"9711","DOI":"10.1007\/s11042-019-07835-3","volume":"79","author":"G Rathee","year":"2020","unstructured":"Rathee G, Sharma A, Saini H, Kumar R, Iqbal R (2020) A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology. Multimed Tools Appl. 79(15\u201316):9711\u20139733. https:\/\/doi.org\/10.1007\/s11042-019-07835-3","journal-title":"Multimed Tools Appl."},{"key":"180_CR15","unstructured":"Yayah F (2017) A security framework to protect data in cloud storage, PhD Thesis. University of Southampton, Southampton"},{"key":"180_CR16","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s40860-017-0038-x","volume":"3","author":"N Vithanwattana","year":"2017","unstructured":"Vithanwattana N, Mapp G, George C (2017) Developing a comprehensive information security framework for mHealth: a detailed analysis. J Reliable Intell Environ 3:21\u201339. https:\/\/doi.org\/10.1007\/s40860-017-0038-x","journal-title":"J Reliable Intell Environ"},{"key":"180_CR17","doi-asserted-by":"publisher","unstructured":"Vithanwattana N, Mapp G, George C (2016) mHealth-investigating an information security framework for mHealth data: challenges and possible solutions. In: 12th International Conference on Intelligent Environments. IEEE, London, pp.258\u2013261. https:\/\/doi.org\/10.1109\/IE.2016.59","DOI":"10.1109\/IE.2016.59"},{"key":"180_CR18","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199695591.001.0001","volume-title":"Everyday Cryptogr","author":"K Martin","year":"2012","unstructured":"Martin K (2012) Everyday Cryptogr. Oxford University Press Inc, Oxford"},{"key":"180_CR19","doi-asserted-by":"publisher","unstructured":"Yahya F, Walters RJ, Wills GB (2016) Goal-based security components for cloud storage security framework: a preliminary study. In: 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE, London, pp 1\u20135. https:\/\/doi.org\/10.1109\/CyberSecPODS.2016.7502338","DOI":"10.1109\/CyberSecPODS.2016.7502338"},{"key":"180_CR20","doi-asserted-by":"publisher","unstructured":"Ezenwigbo OA, Paranthaman VV, Trestian R, Mapp G, Sardis F (2018) Exploring a new transport protocol for vehicular networks. In: 2018 the 5th International Conference on Internet of Things: Systems, Management and Security, pp.287-294. https:\/\/doi.org\/10.1109\/IoTSMS.2018.8554836","DOI":"10.1109\/IoTSMS.2018.8554836"},{"key":"180_CR21","unstructured":"Korolov M (2016) The blockchain is now being hyped as the solution to all inefficient information processing systems [online]. Available at: http:\/\/www.csoonline.com\/article\/ 3050557\/security\/is-theblockchain-good-for-security.html. Accessed: 10 August 2021"},{"key":"180_CR22","unstructured":"Levy HM (1984) Capability-based computer systems [online]. Available from: https:\/\/homes.cs.washington.edu\/~levy\/capabook\/ (Accessed: 3 August 2021)"},{"key":"180_CR23","doi-asserted-by":"publisher","unstructured":"Gusmeroli S, Piccione S, Rotondi D (2012) IoT access control issues: a capability based approach. In: 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. IEEE: Palermo, pp.787\u2013792. https:\/\/doi.org\/10.1109\/IMIS.2012.38","DOI":"10.1109\/IMIS.2012.38"},{"key":"180_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/6510249","volume":"3","author":"M Carvalho","year":"2018","unstructured":"Carvalho M, Bandiera-Paiva P (2018) Health information system role-based access control current security trends and challenges. J Healthcare Eng 3:1\u20138. https:\/\/doi.org\/10.1155\/2018\/6510249","journal-title":"J Healthcare Eng"},{"issue":"1","key":"180_CR25","doi-asserted-by":"publisher","first-page":"11","DOI":"10.3390\/computers6010011","volume":"6","author":"B Ondiege","year":"2017","unstructured":"Ondiege B, Clarke M, Mapp G (2017) Exploring a new security framework for remote patient monitoring devices. J Comput 6(1):11. https:\/\/doi.org\/10.3390\/computers6010011","journal-title":"J Comput"},{"issue":"1","key":"180_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/fi6010001","volume":"6","author":"S Hermann","year":"2014","unstructured":"Hermann S, Fabian B (2014) A comparison of internet protocol (IPv6) security guidelines. J Fut Internet 6(1):1\u201360. https:\/\/doi.org\/10.3390\/fi6010001","journal-title":"J Fut Internet"},{"key":"180_CR27","unstructured":"Shaw K, Fruhlinger J (2020) What is IPv6, and why aren\u2019t we there yet?\u201d[Online] Available from: https:\/\/www.networkworld.com\/article\/ 3254575\/what-is-ipv6-and-why-aren-t-we-there-yet.html [Accessed: 2 August 2021]"},{"issue":"3","key":"180_CR28","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.1867","volume":"13","author":"AM Kuo","year":"2011","unstructured":"Kuo AM (2011) Opportunities and challenges of cloud computing to improve health care services. J Med Internet Res 13(3):e67. https:\/\/doi.org\/10.2196\/jmir.1867","journal-title":"J Med Internet Res"},{"key":"180_CR29","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12421","author":"G Karthick","year":"2021","unstructured":"Karthick G, Mapp G, Kammuller F, Aiash M (2021) Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems. Comput Intell. https:\/\/doi.org\/10.1111\/coin.12421","journal-title":"Comput Intell"},{"key":"180_CR30","doi-asserted-by":"publisher","unstructured":"Ramirez J, Ezenwigbo O.A, Karthick G, Trestian R, and Mapp G (2020) A new service management framework for vehicular networks. In: 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops. pp. 162-164. https:\/\/doi.org\/10.1109\/ICIN48450.2020.9059441","DOI":"10.1109\/ICIN48450.2020.9059441"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-022-00180-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40860-022-00180-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-022-00180-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T11:37:35Z","timestamp":1659613055000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40860-022-00180-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,9]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["180"],"URL":"https:\/\/doi.org\/10.1007\/s40860-022-00180-7","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"type":"print","value":"2199-4668"},{"type":"electronic","value":"2199-4676"}],"subject":[],"published":{"date-parts":[[2022,7,9]]},"assertion":[{"value":"11 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}