| Literature DB >> 34779788 |
Imrana Abdullahi Yari1, Tobias Dehling2,3, Felix Kluge1, Juergen Geck4, Ali Sunyaev2,3, Bjoern Eskofier1.
Abstract
BACKGROUND: Patient-centered health care information systems (PHSs) enable patients to take control and become knowledgeable about their own health, preferably in a secure environment. Current and emerging PHSs use either a centralized database, peer-to-peer (P2P) technology, or distributed ledger technology for PHS deployment. The evolving COVID-19 decentralized Bluetooth-based tracing systems are examples of disease-centric P2P PHSs. Although using P2P technology for the provision of PHSs can be flexible, scalable, resilient to a single point of failure, and inexpensive for patients, the use of health information on P2P networks poses major security issues as users must manage information security largely by themselves.Entities:
Keywords: COVID-19 proximity trackers; attacks; decentralization; edge computing; health care; information infrastructures; mobile health; mobile phone; patient-centered; peer-to-peer; security; threats; vulnerabilities
Mesh:
Year: 2021 PMID: 34779788 PMCID: PMC8663665 DOI: 10.2196/24460
Source DB: PubMed Journal: J Med Internet Res ISSN: 1438-8871 Impact factor: 5.428
Security advantages and disadvantages of peer-to-peer patient-centered health care information systems (P2P PHSs).
| Dimension | Advantages | Disadvantages |
| Privacy management | Patients technically govern data. Patients can define access rights to their own PHSs. | Inconsistent views in the network allow attackers (and super users) to cheat and remain undetected. |
| Federated medical data | Patients keep their medical data and software on their own devices. Patients can determine the desired redundancy for their data by backing up at their end. | Patients may lose access when the device is lost, and no backup system is used by the patient. |
| Security | No central attack profiles. | Specific security issues other than general networked application attacks are introduced and slow deployment of security patches by users results in insecure P2P systems. |
| Offline capability | Data are available without a network connection, which improves infrastructure resilience. Disrupted internet connections will not stop data access. | Maintenance effort for storing large amounts of data offline can be high. |
| Stakeholder interaction management | All health care stakeholders requiring access to patient data have to interact with patients to achieve their goals. | Increased access control requirements for patients are hard to satisfy with current health care processes and systems due to bureaucracy and diverse levels of digitalization. |
Figure 1Peer-to-peer (P2P) architectures. Some P2P systems are supported by centralized servers, other P2P systems attempt to decentralize as far as possible. Between these two extremes, hybrid systems benefit from the properties of both.
Figure 2The centralized peer-to-peer (P2P) system. A peer E sends a message to the central server asking for the desired resource, the server runs a lookup and determines the peers that contain the queried resource and then sends back the result to the requesting peer E. Once peer E obtained the list (which consists of peer A and peer F), it establishes a direct connection to the peers.
Figure 3Proposed peer-to-peer (P2P) high-level architecture for patient-centered health care information system (PHS). An aggregate relationship exists between the practitioners and the patients. The patients control the access to their health data, and other entities require patient permission to access a patient’s medical data, for example, by using tokens as currently being implemented in the MedicalChain PHS project [11].
Figure 4PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) flow diagram. P2P: peer-to-peer.
Overview of peer-to-peer security themes identifieda.
| Combined themes, second-order themes, and first-order themes | Study | |||
|
| [ | |||
|
| Metadata pollution |
Changing original file name or extension Replacing the file with a misleading one |
| |
|
| Index pollution |
Claims ownership of wanted but bogus content Sharing of the content record via the index |
| |
|
| Content pollution |
Modifying the file content Replacing the file with an incorrect one |
| |
|
| [ | |||
|
| Virus |
Infection of the system Appears to be part of legitimate programs |
| |
|
| Spyware or ransomware |
Spying or stealing user data Encrypts any kinds of files and data |
| |
|
| Worm |
Infection of P2Pb routing table Appears independent of existing programs |
| |
|
| [ | |||
|
| Baiting |
Tricks user to divulge sensitive information Relies on human error or mistakes |
| |
|
| Phishing |
Scam via email or SMS text messages Trick into divulging sensitive information |
| |
|
| [ | |||
|
| Index poisoning |
Sharing of bogus contents via indexing table Affects network quality of service |
| |
|
| Routing table poisoning |
Sharing of bogus contents via routing table Prevents from finding correct resources |
| |
|
| [ | |||
|
| Faking identity |
Faking multiple identities for a single user Affects the redundancy property of P2P systems |
| |
|
| 51% attack |
Outvoting of honest nodes in the network Cheating without being detected |
| |
|
| [ | |||
|
| Large man-in-the-middle |
Separating the network into several portions Acts as gateway and disrupts message flow |
| |
|
| [ | |||
|
| Flooding |
Invalid packets flood the network Impedes delivery of normal packets |
| |
|
| TCP-DDoSd |
Connection overload with full TCP-requests Denies connections from legitimate requests |
| |
|
| [ | |||
|
| Port number blockade |
Blocking of P2P network traffic Imposes bandwidth limits with P2P networks |
| |
aThe first- and second-order themes are only examples and not exhaustively listed.
bP2P: peer-to-peer.
cDDoS: distributed denial-of-service.
dTCP-DDoS: transmission control protocol–distributed denial-of-service.
Figure 5Geography example of a peer-to-peer (P2P) network.
Figure 6Example of Sybil attack [92]. The attacker placed his malicious nodes on one side of the network segment. Placing many malicious nodes in the network enables the attacker to gain control of the activities of one-half of the network.
Figure 7Example of an eclipse attack [92]. The attacker successfully segmented the network into 2 ID spaces. The communications between the nodes in the network must be forwarded by the malicious nodes.
Figure 8Example of a distributed denial-of-service (DDoS) attack [92]. The attacker successfully executed the DDoS attack and compromised many nodes in the network. The normal nodes cannot establish connections to other normal nodes.
Factors promoting the security issues.
| Security issues | Factors promoting the security issues | ||||||
|
| Inadvertent sensitive information disclosure | Set-and-forget | No borders | Digital winds Spreading Files | Use and network heterogeneity | No content verification | Snooping nodes |
| Malware | ✓a | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Social engineering attack | ✓ |
| ✓ | ✓ | ✓ | ✓ | ✓ |
| Poisoning the network |
|
| ✓ | ✓ | ✓ | ✓ | ✓ |
| Sybil attack |
|
| ✓ |
| ✓ |
| ✓ |
| Eclipse attack |
|
| ✓ |
| ✓ |
| ✓ |
| DDoS attack |
| ✓ | ✓ |
| ✓ | ✓ | ✓ |
| Pollution | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| P2Pb traffic blockade |
|
|
|
| ✓ | ✓ | ✓ |
aFactor present.
bP2P: peer-to-peer.
Severity ratings for peer-to-peer patient-centered health care information system security.
| Security issues | Severity score on P2P PHSa | Exemplary security measures | ||
|
| Centralized | Hybrid | Decentralized |
|
| Malware | Low | Medium | High |
Firewall Antivirus and antispyware Mobile agent–based intrusion detection system Access policies |
| Social engineering attack | Medium | Medium | Medium |
Education and awareness training |
| Poisoning the network | Low | Medium | High |
Authentication protocol Trust and reputation system Access policies |
| Sybil attack | Low | Low | Medium |
Authentication protocol Trust and reputation system End-to-end encryption |
| Eclipse attack | Low | Medium | Medium |
Authentication protocol Trust and reputation system End-to-end encryption Access policies |
| DDoSb attack | High | Medium | Medium |
Firewall Mobile agent–based intrusion detection system Bandwidth limitation per node Access policies |
| Pollution | Low | Medium | Medium |
File and content verification Trust and reputation system End-to-end encryption Removal of polluted content |
| P2P traffic blockade | High | Medium | Low |
End-to-end encryption Encryption of P2P traffic |
aP2P PHS: peer-to-peer patient-centered health care information system.
bDDoS: distributed denial-of-service.
Figure 9Guidelines for provision of the patient-centered health care information system (PHS) while ensuring security.