AI-Powered Cybersecurity for Safeguarding Electronic Health Records from Deepfake Biometric Attacks

Authors

  • Mahendra Krishnapatnam

Keywords:

Electronic Health Records (EHRs), Deepfake Biometric Attacks, AI-Powered Cybersecurity, Biometric Authentication, Generative Adversarial Networks (GANs), Liveness Detection, Behavioural Authentication, Zero Trust, Blockchain Identity Management, Deepfake Detection Models, Synthetic Fingerprint Spoofing, Voice Authentication Attack, Healthcare Cybersecurity, Machine Learning Security, Regulatory Compliance (HIPAA, GDPR, NIST 800-63B)

Abstract

The adoption of biometric authentication in Electronic Health Records (EHR) systems enhances security but also introduces new vulnerabilities, particularly from deepfake biometric attacks. This paper introduces an AI-driven cybersecurity framework integrating deepfake detection models, liveness verification, behavioral authentication, Zero Trust security, and blockchain identity management to mitigate these risks. Unlike traditional authentication methods, the proposed framework ensures real-time biometric verification, adaptive risk-based access control, and decentralized identity validation to prevent unauthorized access and identity fraud. By leveraging machine learning algorithms, generative adversarial networks (GANs), and AI-powered anomaly detection, this study demonstrates an improved authentication success rate and a 45% reduction in unauthorized access attempts, ensuring regulatory compliance with HIPAA, GDPR, and NIST 800-63B standards

Downloads

Download data is not yet available.

References

M. Alharthi, et al., “AI-powered security mechanisms for EHR authentication, including deepfake detection and liveness verification,” PMC - AI Security in EHRs, 2022. [Online]. Available: [PMC Database].

A. Olatunji, et al., “The impact of artificial intelligence on organizational cybersecurity, including AI-based anomaly detection in healthcare,” ResearchGate - AI and Cybersecurity, 2024. [Online]. Available: [ResearchGate].

National Institute of Standards and Technology (NIST), “AI Security & Risk Assessment – Guidelines on AI-driven threat detection and biometric security improvements,” NIST AI Security Framework. [Online]. Available: [NIST Website].

IEEE Xplore, “Deepfake Detection in Biometric Systems – A comprehensive review of deepfake detection models in AI-based authentication,” IEEE Deepfake Biometric Security. [Online]. Available: [IEEE Xplore].

MIT Technology Review, “AI for Biometric Authentication – Insights into AI’s role in combating deepfake attacks within healthcare security infrastructures,” MIT AI Biometric Security. [Online]. Available: [MIT Technology Review].

G. Gupta, K. Raja, M. Gupta, T. Jan, S.T. Whiteside, and M. Prasad, “A Comprehensive Review of DeepFake Detection Using Advanced Machine Learning and Fusion Methods,” *Electronics*, vol. 13, no. 1, p. 95, 2024. [Online]. Available: https://doi.org/10.3390/electronics13010095.

A. R. Alsabbagh and O. Al-Kadi, “Comparative Analysis of Deep Convolutional Neural Networks for Detecting Medical Image Deepfakes,” *arXiv preprint*, arXiv:2406.08758, 2024. [Online]. Available: https://arxiv.org/abs/2406.08758.

S. Solaiyappan and Y. Wen, “Machine Learning-Based Medical Image Deepfake Detection: A Comparative Study,” *arXiv preprint*, arXiv:2109.12800, 2021. [Online]. Available: https://arxiv.org/abs/2109.12800.

B. Zhu, H. Fang, Y. Sui, and L. Li, “Deepfakes for Medical Video De-Identification: Privacy Protection and Diagnostic Information Preservation,” *arXiv preprint*, arXiv:2003.00813, 2020. [Online]. Available: https://arxiv.org/abs/2003.00813.

J. Qureshi and S. Khan, “Artificial Intelligence (AI) Deepfakes in Healthcare Systems: A Double-Edged Sword? Balancing Opportunities and Navigating Risks,” *Preprints*, 202402.0176, 2024. [Online]. Available: https://www.preprints.org/manuscript/202402.0176/v1.

Downloads

Published

12.06.2024

How to Cite

Mahendra Krishnapatnam. (2024). AI-Powered Cybersecurity for Safeguarding Electronic Health Records from Deepfake Biometric Attacks. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 5422–5427. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7393

Issue

Section

Research Article