290 Hits in 5.1 sec

Differential Privacy in Blockchain Technology: A Futuristic Approach [article]

Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
2020 arXiv   pre-print
Blockchain works over the principle of distributed, secured, and shared ledger, which is used to record, and track data within a decentralized network.  ...  Blockchain works over peer-to-peer (P2P) phenomenon for its operation and does not require any trusted-third party authorization for data tracking and storage.  ...  Similarly, application layer provides users a platform to carry out efficient and secure distributed and decentralized management.  ... 
arXiv:1910.04316v3 fatcat:u2fdtysuszburar73b5pdd4ezu

Privacy Preserving Blockchain Technique to Achieve Secure and Reliable Sharing of IoT Data

Bao Le Nguyen, E. Laxmi Lydia, Mohamed Elhoseny, Irina V. Pustokhina, Denis A. Pustokhin, Mahmoud Mohamed Selim, Gia Nhu Nguyen, K. Shankar
2020 Computers Materials & Continua  
In this study, the authors deployed blockchain technique to create a secure and reliable data exchange platform across multiple data providers, where IoT data is encrypted and recorded in a distributed  ...  In present digital era, an exponential increase in Internet of Things (IoT) devices poses several design issues for business concerning security and privacy.  ...  [Azbeg, Ouchetto, Andaloussi et al. (2018) ] reported IoT and blockchain-based stage to facilitate diabetes' surveillance and help patients manage their disease properly.  ... 
doi:10.32604/cmc.2020.011599 fatcat:i6w3veatyfft7nchvvmt43qyc4

Applications of Blockchain in Ensuring the Security and Privacy of Electronic Health Record Systems: A Survey

Shuyun Shi, Debiao He, Li Li, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo
2020 Computers & security  
Therefore, in this paper we perform a systematic literature review of blockchain approaches designed for EHR systems, focusing only on the security and privacy aspects.  ...  We also identify a number of research challenges and opportunities.  ...  Acknowledgements We thank the anonymous reviewers for their valuable comments and suggestions which helped us to improve the content and presentation of this paper.  ... 
doi:10.1016/j.cose.2020.101966 pmid:32834254 pmcid:PMC7362828 fatcat:ymwetk2kajhddm4wu2p6lagqzm

A Survey and Classification of Security and Privacy Research in Smart Healthcare Systems

Abdullah Algarni
2019 IEEE Access  
Finally, we identify the open-research challenges in security and privacy of SHS and provide directions for future research.  ...  We review the methodologies, objectives, platforms, and techniques used in SHS. First, we present a novel classification scheme for SHS that ranks their methodologies within their applicable domains.  ...  and privacy of SHS, and 3) new insights and suggestions for future research directions concerning the security and privacy of SHS.  ... 
doi:10.1109/access.2019.2930962 fatcat:4lax7tjd4fgftif5fbawadsjc4

Privacy-Preserving Cloud Computing: Ecosystem, Life Cycle, Layered Architecture and Future Roadmap [article]

Saeed Ahmadi
2022 arXiv   pre-print
Cloud computing is important because it allows for scalability, adaptability, and improved security.  ...  This paper helps to identify existing trends by establishing a layered architecture along with a life cycle and an ecosystem for privacy-preserving cloud systems in addition to identifying the existing  ...  feature and developed in machine learning and a Secure Storage Distribution (SSD) in order to provide security and privacy Cloud-IoT data.  ... 
arXiv:2204.11120v1 fatcat:tx75pckegjgqxg6tiibptiazbi

MyHealthMyData (MHMD): Deliverable 2.6 - Privacy-by-design and compliance assessment

Lorenzo Cristofaro, Rocco Panetta
2019 Zenodo  
(user and hospital interfaces, data catalogue, blockchain architecture model), data usage modalities (i.e., data sharing and secure local computation), data de-identification measures and system security  ...  It has been produced to assess and certify the compliance of the MHMD system to the data privacy and security constraints and requirements set out in the GDPR.  ...  diabetes); o Not for certain clinical areas or diseases: ___________________ (e.g. cardiac pathologies and cancer); o For a given period of time: (e.g. available until 31 December 2030); o For  ... 
doi:10.5281/zenodo.3541593 fatcat:e4d4ophzavchxddosamaw3xkre

Security and Privacy in IoT-Cloud-Based e-Health Systems—A Comprehensive Review

Chanapha Butpheng, Kuo-Hui Yeh, Hu Xiong
2020 Symmetry  
Various research perspectives related to security and privacy within IoT-cloud-based e-Health systems are examined, with an emphasis on the opportunities, benefits and challenges of the implementation  ...  (IoT) devices and cloud computing.  ...  Acknowledgments: The authors would like to thank the anonymous reviewers for their valuable comments and feedback which was extremely helpful in improving the quality of the paper.  ... 
doi:10.3390/sym12071191 fatcat:zgktlhafpfhvvkdqccdhxz7noq

SaYoPillow: A Blockchain-Enabled, Privacy-Assured Framework for Stress Detection, Prediction and Control Considering Sleeping Habits in the IoMT [article]

Laavanya Rachakonda and Anand K. Bapatla and Saraju P. Mohanty and Elias Kougianos
2020 arXiv   pre-print
Not having to compromise the user's privacy, SaYoPillow proposes secure data transmission for both uploading and retrieving, and secure storage and communications as an attempt to reduce malicious attacks  ...  The reasons for not having a productive sleep could be many.  ...  transfer to the privacy assured IoT-Cloud storage. • Transferring the privacy assured data securely from the IoT cloud to the user interface for user feedback.  ... 
arXiv:2007.07377v1 fatcat:5sfi7x2z3ravvj6gh6v2hwqv5u

Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy [article]

Chandra Thapa, Seyit Camtepe
2020 arXiv   pre-print
Finally, it illustrates the best available techniques for precision health data security and privacy with a conceptual system model that enables compliance, ethics clearance, consent management, medical  ...  Herein, in the light of precision health data security, privacy, ethical and regulatory requirements, finding the best methods and techniques for the utilization of the health data, and thus precision  ...  Together with the model-to-data approach, we illustrated an example case for the security and privacy of PH data along with a policy enforcer in a PH platform.  ... 
arXiv:2008.10733v1 fatcat:oj2neoftf5hcbpatnfn7ntyhzy

Grokya: a Privacy-Friendly Framework for Ubiquitous Computing [article]

Daniel Filipe G. Farinha
2016 arXiv   pre-print
It aims to do this by creating the building blocks for a consumer owned infrastructure that can provide both privacy for the user, and still enable the enterprises to achieve their high-level goals.  ...  In a world where for-profit enterprises are increasingly looking to maximize profits by engaging in privacy invading consumer-profiling techniques, the rise of ubiquitous computing and the Internet of  ...  Similarly, Dr Eric Topol is leading the way in prescribing mobile apps for self-tracking as an alternative to traditional medicines for treating or managing chronic diseases. According to Dr.  ... 
arXiv:1602.03956v1 fatcat:ykdx2jeklrclrprq52dyfitkjy

Blockchain-based Privacy-preserving Fair Data Trading Protocol [article]

Yao Jiang Galteland, Shuang Wu
2021 IACR Cryptology ePrint Archive  
We introduce new security notions for privacypreserving blockchain-based fair data trading protocol and prove our protocol is secure under our new notions.  ...  In this paper, we construct a fair trading protocol based on a smart contract that provides better privacy to the participants.  ...  With blockchain and our privacy-preserving fair data exchange protocol, various consent model sand payment for data flows can be built without the needs for a central bank and a centralised trading platform  ... 
dblp:journals/iacr/GaltelandW21 fatcat:7hoyqomclbgdzeblblqlncxhxa

Towards a Smart Healthcare System

Laila Fetjah, Kebira Azbeg, Ouail Ouchetto, Said Jai Andaloussi
2021 International Journal of Healthcare Information Systems and Informatics  
To ensure security and privacy, the architecture uses the Blockchain technology. For data analysis, smart contracts and artificial intelligence are used.  ...  However, this architecture increases security and privacy risks. This paper describes an architecture of a smart healthcare system for remote patient monitoring.  ...  in FC such as via the Blockchain as a secure layer between the cloud and IoT devices.  ... 
doi:10.4018/ijhisi.20211001.oa16 fatcat:fkx76rovnbhg5b4hs7oysgb3pa

Comprehensive Survey of IoT, Machine Learning, and Blockchain for Health Care Applications: A Topical Assessment for Pandemic Preparedness, Challenges, and Solutions

Muhammad Imran, Umar Zaman, Imran, Junaid Imtiaz, Muhammad Fayaz, Jeonghwan Gwak
2021 Electronics  
This study presents a comprehensive survey of emerging IoT technologies, machine learning, and blockchain for healthcare applications.  ...  Secondly, the adaptation mechanism of machine learning and blockchain in IoT for healthcare applications are discussed to delineate the scope of the mentioned techniques in IoT domains.  ...  Another patient-centric agent platform in [260] runs a concurrent tool and handles various blockchains for IoT data.  ... 
doi:10.3390/electronics10202501 fatcat:dch746un2vg6jkcycas5r3gnfy

Security Attacks in S-WBANs on IoT based Healthcare Applications

The internet exists as a global interconnection network for information sharing, commerce, and entertainment.  ...  Moreover, the proposed system enhances the scalability and provides mitigation against all the security attacks in IoT Environment.  ...  [42] implemented blockchain in a platform for Industrial IoT. The blockchain will aid in improving the Cloud-based Manufacturing(CBM) platform.  ... 
doi:10.35940/ijitee.a4242.119119 fatcat:3erh6dqjpzf7zonsh6yijj23pa

A Survey on Internet of Things and Cloud Computing for Healthcare

L. Minh Dang, Md. Jalil Piran, Dongil Han, Kyungbok Min, Hyeonjoon Moon
2019 Electronics  
, so it leads to a stringy requirement for data analysis and data storage platform such as cloud computing and fog computing.  ...  Moreover, an in-depth review of IoT privacy and security issues, including potential threats, attack types, and security setups from a healthcare viewpoint is conducted.  ...  Similarly, a platform focusing on privacy and security issues in medical education learning platform based on IoT and cloud computing, which consisted of two main processes [49] , as shown in Figure  ... 
doi:10.3390/electronics8070768 fatcat:qg7w4bg25fdy7eoas7eaibfkxe
« Previous Showing results 1 — 15 out of 290 results