A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Differential Privacy in Blockchain Technology: A Futuristic Approach
[article]
2020
arXiv
pre-print
Blockchain works over the principle of distributed, secured, and shared ledger, which is used to record, and track data within a decentralized network. ...
Blockchain works over peer-to-peer (P2P) phenomenon for its operation and does not require any trusted-third party authorization for data tracking and storage. ...
Similarly, application layer provides users a platform to carry out efficient and secure distributed and decentralized management. ...
arXiv:1910.04316v3
fatcat:u2fdtysuszburar73b5pdd4ezu
Privacy Preserving Blockchain Technique to Achieve Secure and Reliable Sharing of IoT Data
2020
Computers Materials & Continua
In this study, the authors deployed blockchain technique to create a secure and reliable data exchange platform across multiple data providers, where IoT data is encrypted and recorded in a distributed ...
In present digital era, an exponential increase in Internet of Things (IoT) devices poses several design issues for business concerning security and privacy. ...
[Azbeg, Ouchetto, Andaloussi et al. (2018) ] reported IoT and blockchain-based stage to facilitate diabetes' surveillance and help patients manage their disease properly. ...
doi:10.32604/cmc.2020.011599
fatcat:i6w3veatyfft7nchvvmt43qyc4
Applications of Blockchain in Ensuring the Security and Privacy of Electronic Health Record Systems: A Survey
2020
Computers & security
Therefore, in this paper we perform a systematic literature review of blockchain approaches designed for EHR systems, focusing only on the security and privacy aspects. ...
We also identify a number of research challenges and opportunities. ...
Acknowledgements We thank the anonymous reviewers for their valuable comments and suggestions which helped us to improve the content and presentation of this paper. ...
doi:10.1016/j.cose.2020.101966
pmid:32834254
pmcid:PMC7362828
fatcat:ymwetk2kajhddm4wu2p6lagqzm
A Survey and Classification of Security and Privacy Research in Smart Healthcare Systems
2019
IEEE Access
Finally, we identify the open-research challenges in security and privacy of SHS and provide directions for future research. ...
We review the methodologies, objectives, platforms, and techniques used in SHS. First, we present a novel classification scheme for SHS that ranks their methodologies within their applicable domains. ...
and privacy of SHS, and 3) new insights and suggestions for future research directions concerning the security and privacy of SHS. ...
doi:10.1109/access.2019.2930962
fatcat:4lax7tjd4fgftif5fbawadsjc4
Privacy-Preserving Cloud Computing: Ecosystem, Life Cycle, Layered Architecture and Future Roadmap
[article]
2022
arXiv
pre-print
Cloud computing is important because it allows for scalability, adaptability, and improved security. ...
This paper helps to identify existing trends by establishing a layered architecture along with a life cycle and an ecosystem for privacy-preserving cloud systems in addition to identifying the existing ...
feature and developed in machine learning and a Secure Storage Distribution (SSD) in order to provide security and privacy Cloud-IoT data. ...
arXiv:2204.11120v1
fatcat:tx75pckegjgqxg6tiibptiazbi
MyHealthMyData (MHMD): Deliverable 2.6 - Privacy-by-design and compliance assessment
2019
Zenodo
(user and hospital interfaces, data catalogue, blockchain architecture model), data usage modalities (i.e., data sharing and secure local computation), data de-identification measures and system security ...
It has been produced to assess and certify the compliance of the MHMD system to the data privacy and security constraints and requirements set out in the GDPR. ...
diabetes);
o Not for certain clinical areas or diseases:
___________________ (e.g. cardiac pathologies
and cancer);
o For a given period of time: (e.g. available
until 31 December 2030);
o For ...
doi:10.5281/zenodo.3541593
fatcat:e4d4ophzavchxddosamaw3xkre
Security and Privacy in IoT-Cloud-Based e-Health Systems—A Comprehensive Review
2020
Symmetry
Various research perspectives related to security and privacy within IoT-cloud-based e-Health systems are examined, with an emphasis on the opportunities, benefits and challenges of the implementation ...
(IoT) devices and cloud computing. ...
Acknowledgments: The authors would like to thank the anonymous reviewers for their valuable comments and feedback which was extremely helpful in improving the quality of the paper. ...
doi:10.3390/sym12071191
fatcat:zgktlhafpfhvvkdqccdhxz7noq
SaYoPillow: A Blockchain-Enabled, Privacy-Assured Framework for Stress Detection, Prediction and Control Considering Sleeping Habits in the IoMT
[article]
2020
arXiv
pre-print
Not having to compromise the user's privacy, SaYoPillow proposes secure data transmission for both uploading and retrieving, and secure storage and communications as an attempt to reduce malicious attacks ...
The reasons for not having a productive sleep could be many. ...
transfer to the privacy assured IoT-Cloud storage. • Transferring the privacy assured data securely from the IoT cloud to the user interface for user feedback. ...
arXiv:2007.07377v1
fatcat:5sfi7x2z3ravvj6gh6v2hwqv5u
Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy
[article]
2020
arXiv
pre-print
Finally, it illustrates the best available techniques for precision health data security and privacy with a conceptual system model that enables compliance, ethics clearance, consent management, medical ...
Herein, in the light of precision health data security, privacy, ethical and regulatory requirements, finding the best methods and techniques for the utilization of the health data, and thus precision ...
Together with the model-to-data approach, we illustrated an example case for the security and privacy of PH data along with a policy enforcer in a PH platform. ...
arXiv:2008.10733v1
fatcat:oj2neoftf5hcbpatnfn7ntyhzy
Grokya: a Privacy-Friendly Framework for Ubiquitous Computing
[article]
2016
arXiv
pre-print
It aims to do this by creating the building blocks for a consumer owned infrastructure that can provide both privacy for the user, and still enable the enterprises to achieve their high-level goals. ...
In a world where for-profit enterprises are increasingly looking to maximize profits by engaging in privacy invading consumer-profiling techniques, the rise of ubiquitous computing and the Internet of ...
Similarly, Dr Eric Topol is leading the way in prescribing mobile apps for self-tracking as an alternative to traditional medicines for treating or managing chronic diseases. According to Dr. ...
arXiv:1602.03956v1
fatcat:ykdx2jeklrclrprq52dyfitkjy
Blockchain-based Privacy-preserving Fair Data Trading Protocol
[article]
2021
IACR Cryptology ePrint Archive
We introduce new security notions for privacypreserving blockchain-based fair data trading protocol and prove our protocol is secure under our new notions. ...
In this paper, we construct a fair trading protocol based on a smart contract that provides better privacy to the participants. ...
With blockchain and our privacy-preserving fair data exchange protocol, various consent model sand payment for data flows can be built without the needs for a central bank and a centralised trading platform ...
dblp:journals/iacr/GaltelandW21
fatcat:7hoyqomclbgdzeblblqlncxhxa
Towards a Smart Healthcare System
2021
International Journal of Healthcare Information Systems and Informatics
To ensure security and privacy, the architecture uses the Blockchain technology. For data analysis, smart contracts and artificial intelligence are used. ...
However, this architecture increases security and privacy risks. This paper describes an architecture of a smart healthcare system for remote patient monitoring. ...
in FC such as via the Blockchain as a secure layer between the cloud and IoT devices. ...
doi:10.4018/ijhisi.20211001.oa16
fatcat:fkx76rovnbhg5b4hs7oysgb3pa
Comprehensive Survey of IoT, Machine Learning, and Blockchain for Health Care Applications: A Topical Assessment for Pandemic Preparedness, Challenges, and Solutions
2021
Electronics
This study presents a comprehensive survey of emerging IoT technologies, machine learning, and blockchain for healthcare applications. ...
Secondly, the adaptation mechanism of machine learning and blockchain in IoT for healthcare applications are discussed to delineate the scope of the mentioned techniques in IoT domains. ...
Another patient-centric agent platform in [260] runs a concurrent tool and handles various blockchains for IoT data. ...
doi:10.3390/electronics10202501
fatcat:dch746un2vg6jkcycas5r3gnfy
Security Attacks in S-WBANs on IoT based Healthcare Applications
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
The internet exists as a global interconnection network for information sharing, commerce, and entertainment. ...
Moreover, the proposed system enhances the scalability and provides mitigation against all the security attacks in IoT Environment. ...
[42] implemented blockchain in a platform for Industrial IoT. The blockchain will aid in improving the Cloud-based Manufacturing(CBM) platform. ...
doi:10.35940/ijitee.a4242.119119
fatcat:3erh6dqjpzf7zonsh6yijj23pa
A Survey on Internet of Things and Cloud Computing for Healthcare
2019
Electronics
, so it leads to a stringy requirement for data analysis and data storage platform such as cloud computing and fog computing. ...
Moreover, an in-depth review of IoT privacy and security issues, including potential threats, attack types, and security setups from a healthcare viewpoint is conducted. ...
Similarly, a platform focusing on privacy and security issues in medical education learning platform based on IoT and cloud computing, which consisted of two main processes [49] , as shown in Figure ...
doi:10.3390/electronics8070768
fatcat:qg7w4bg25fdy7eoas7eaibfkxe
« Previous
Showing results 1 — 15 out of 290 results