Security Engineering of Patient-Centered Health Care Information Systems in Peer-to-Peer Environments: Systematic Review

BackgroundPatient-centered health care information systems (PHSs) enable patients to take control and become knowledgeable about their own health, preferably in a secure environment. Current and emerging PHSs use either a centralized database, peer-to-peer (P2P) technology, or distributed ledger tec...

Full description

Saved in:
Bibliographic Details
Main Authors: Imrana Abdullahi Yari (Author), Tobias Dehling (Author), Felix Kluge (Author), Juergen Geck (Author), Ali Sunyaev (Author), Bjoern Eskofier (Author)
Format: Book
Published: JMIR Publications, 2021-11-01T00:00:00Z.
Subjects:
Online Access:Connect to this object online.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 doaj_ae16fceb0f0445ffa40bb131394e513a
042 |a dc 
100 1 0 |a Imrana Abdullahi Yari  |e author 
700 1 0 |a Tobias Dehling  |e author 
700 1 0 |a Felix Kluge  |e author 
700 1 0 |a Juergen Geck  |e author 
700 1 0 |a Ali Sunyaev  |e author 
700 1 0 |a Bjoern Eskofier  |e author 
245 0 0 |a Security Engineering of Patient-Centered Health Care Information Systems in Peer-to-Peer Environments: Systematic Review 
260 |b JMIR Publications,   |c 2021-11-01T00:00:00Z. 
500 |a 1438-8871 
500 |a 10.2196/24460 
520 |a BackgroundPatient-centered health care information systems (PHSs) enable patients to take control and become knowledgeable about their own health, preferably in a secure environment. Current and emerging PHSs use either a centralized database, peer-to-peer (P2P) technology, or distributed ledger technology for PHS deployment. The evolving COVID-19 decentralized Bluetooth-based tracing systems are examples of disease-centric P2P PHSs. Although using P2P technology for the provision of PHSs can be flexible, scalable, resilient to a single point of failure, and inexpensive for patients, the use of health information on P2P networks poses major security issues as users must manage information security largely by themselves. ObjectiveThis study aims to identify the inherent security issues for PHS deployment in P2P networks and how they can be overcome. In addition, this study reviews different P2P architectures and proposes a suitable architecture for P2P PHS deployment. MethodsA systematic literature review was conducted following PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) reporting guidelines. Thematic analysis was used for data analysis. We searched the following databases: IEEE Digital Library, PubMed, Science Direct, ACM Digital Library, Scopus, and Semantic Scholar. The search was conducted on articles published between 2008 and 2020. The Common Vulnerability Scoring System was used as a guide for rating security issues. ResultsOur findings are consolidated into 8 key security issues associated with PHS implementation and deployment on P2P networks and 7 factors promoting them. Moreover, we propose a suitable architecture for P2P PHSs and guidelines for the provision of PHSs while maintaining information security. ConclusionsDespite the clear advantages of P2P PHSs, the absence of centralized controls and inconsistent views of the network on some P2P systems have profound adverse impacts in terms of security. The security issues identified in this study need to be addressed to increase patients' intention to use PHSs on P2P networks by making them safe to use. 
546 |a EN 
690 |a Computer applications to medicine. Medical informatics 
690 |a R858-859.7 
690 |a Public aspects of medicine 
690 |a RA1-1270 
655 7 |a article  |2 local 
786 0 |n Journal of Medical Internet Research, Vol 23, Iss 11, p e24460 (2021) 
787 0 |n https://www.jmir.org/2021/11/e24460 
787 0 |n https://doaj.org/toc/1438-8871 
856 4 1 |u https://doaj.org/article/ae16fceb0f0445ffa40bb131394e513a  |z Connect to this object online.