Filters








1,319 Hits in 9.7 sec

Integrating Digital Technologies and Public Health to Fight Covid-19 Pandemic: Key Technologies, Applications, Challenges and Outlook of Digital Healthcare

Qiang Wang, Min Su, Min Zhang, Rongrong Li
2021 International Journal of Environmental Research and Public Health  
In addition, we also provide policy recommendations for other countries that use digital technology to combat COVID-19.  ...  First, main concepts, key development processes, and common application scenarios of integrating digital technologies and digital healthcare were offered in the part of background information.  ...  Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/ijerph18116053 fatcat:pa23aay2sneznddobzqrxyudea

Privacy Preservation for Wireless Sensor Networks in Healthcare: State of the Art, and Open Research Challenges [article]

Yasmine N. M. Saleh, Claude C. Chibelushi, Ayman A. Abdel-Hamid, Abdel-Hamid Soliman
2020 arXiv   pre-print
However, an important barrier is that acceptance by healthcare stakeholders is influenced by the effectiveness of privacy safeguards for personal and intimate information which is collected and transmitted  ...  The advent of miniature biosensors has generated numerous opportunities for deploying wireless sensor networks in healthcare.  ...  Analysis of information leakage can be categorized according to the type of traffic analysis attack: correlation-based source identification attack, routing trace back attack, and reducing source space  ... 
arXiv:2012.12958v1 fatcat:6bqeb3htibaypmbfckveiizxpm

Big data privacy: a technological perspective and review

Priyank Jain, Manasi Gyanchandani, Nilay Khare
2016 Journal of Big Data  
Big data analytics is the term used to describe the process of researching massive amounts of complex data in order to reveal hidden patterns or identify secret correlations.  ...  On the premise of this definition, the properties of big Abstract Big data is a term used for very large data sets that have more varied and complex structure.  ...  or the de-identification risks. • De-identification is more feasible for privacy-preserving big data analytics if develop efficient privacy-preserving algorithms to help mitigate the risk of re-identification  ... 
doi:10.1186/s40537-016-0059-y fatcat:hol5lhemzvawzc6yyxe4paa7zu

Developing a comprehensive information security framework for mHealth: a detailed analysis

Nattaruedee Vithanwattana, Glenford Mapp, Carlisle George
2017 Journal of Reliable Intelligent Environments  
Furthermore, the use of cloud computing is becoming an option for the healthcare sector to store healthcare data; but storing data in the cloud raises serious concerns.  ...  overall efficiency of healthcare systems.  ...  This may lead to the risk of lost or leakage of data that has been stored on the device.  ... 
doi:10.1007/s40860-017-0038-x fatcat:mdpnztq7yrhejao5lu6unpjpoe

Access Management of User and Cyber-Physical Device in DBaaS according to Indian IT Laws using Blockchain

Gaurav Deep, Jagpreet Sidhu, Rajni Mohana
2020 Scalable Computing : Practice and Experience  
Computing on the cloud has changed the working of mankind in every manner, from storing to fetching every information on the cloud.  ...  Companies managing user data are also liable to protect user data from any type of attack under various sections of the Indian IT act.  ...  Trusted users come in the category of enablers and average users based on Risk level comes in the category of neutral.  ... 
doi:10.12694/scpe.v21i3.1737 fatcat:5w5zoazjhfhpxoe2452qvfpj6i

Data exfiltration: A review of external attack vectors and countermeasures

Faheem Ullah, Matthew Edwards, Rajiv Ramdhany, Ruzanna Chitchyan, M. Ali Babar, Awais Rashid
2018 Journal of Network and Computer Applications  
Context: One of the main targets of cyber-attacks is data exfiltration, which is the leakage of sensitive or private data to an unauthorized entity.  ...  These countermeasures aim to detect, prevent, or investigate exfiltration of sensitive or private data.  ...  [43] present a VLAN-based architecture for reducing the risk of data leakage in a healthcare organization.  ... 
doi:10.1016/j.jnca.2017.10.016 fatcat:fweg67tparct5owb3r4qrpgvxq

When Machine Learning Meets Privacy: A Survey and Outlook [article]

Bo Liu, Ming Ding, Sina Shaham, Wenny Rahayu, Farhad Farokhi, Zihuai Lin
2020 arXiv   pre-print
It is important to note that the problem of privacy preservation in the context of machine learning is quite different from that in traditional data privacy protection, as machine learning can act as both  ...  This paper surveys the state of the art in privacy issues and solutions for machine learning.  ...  The scheme can prevent information leakage to the "honest-but-curious cloud server" in the condition of collaborative deep learning.  ... 
arXiv:2011.11819v1 fatcat:xuyustzlbngo3ivqkc4paaer5q

When Machine Learning Meets Privacy

Bo Liu, Ming Ding, Sina Shaham, Wenny Rahayu, Farhad Farokhi, Zihuai Lin
2021 ACM Computing Surveys  
., deep learning) methods have become a strong driving force to revolutionize a wide range of industries, such as smart healthcare, financial technology, and surveillance systems.  ...  It is important to note that the problem of privacy preservation in the context of machine learning is quite different from that in traditional data privacy protection, as machine learning can act as both  ...  The scheme can prevent information leakage to the "honest-but-curious cloud server" in the condition of collaborative deep learning.  ... 
doi:10.1145/3436755 fatcat:cbkbmxj7krc3xoedv6tan4fle4

Evolution, Detection and Analysis of Malware for Smart Devices

Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez, Arturo Ribagorda
2014 IEEE Communications Surveys and Tutorials  
the device and collect sensory data and personal information.  ...  This poses strong security and privacy issues to users and infrastructure operators, particularly through software of malicious (or dubious) nature that can easily get access to the services provided by  ...  ACKNOWLEDGEMENTS We thank the anonymous reviewers for valuable suggestions that helped to improve the quality and organization of this paper.  ... 
doi:10.1109/surv.2013.101613.00077 fatcat:u7qjrw4grvcorjjmy3ykddjeda

Sensors for Context-Aware Smart Healthcare: A Security Perspective

Edgar Batista, M. Angels Moncusi, Pablo López-Aguilar, Antoni Martínez-Ballesté, Agusti Solanas
2021 Sensors  
of individuals or to their immediate context), the transmission of these data through wireless communication networks, to the final storage and analysis of such information in the appropriate health information  ...  The advances in the miniaturisation of electronic devices and the deployment of cheaper and faster data networks have propelled environments augmented with contextual and real-time information, such as  ...  Furthermore, monitoring the (de)hydration level in elderly people, a very high-risk group, is crucial to prevent their fragile health condition worsening.  ... 
doi:10.3390/s21206886 pmid:34696099 pmcid:PMC8537585 fatcat:n7qzpwyzo5f4rppmtkknkznpz4

A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective

Hezam Akram Abdulghani, Niels Alexander Nijdam, Anastasija Collen, Dimitri Konstantas
2019 Symmetry  
user-created data.  ...  Protecting IoT data of such applications at rest either on the objects or in the cloud is an indispensable requirement for achieving a symmetry in the handling and protection of the IoT, as we do with  ...  On the other hand, it opens doors for several attacks and threats like data leakage, as it increases the attack surface of IoT, according to [110] .  ... 
doi:10.3390/sym11060774 fatcat:ym5b6kycxvhenpwb7q5hpzihby

Smartphone: The Ultimate IoT and IoE Device [chapter]

Mehdia Ajana El Khaddar, Mohammed Boulmalf
2017 Smartphones from an Applied Research Perspective  
These new concepts can be applied in many application domains such as healthcare, transportation, and supply chain management (SCM), to name a few, and allow users to get real-time information such as  ...  The smartphone-enabling technologies such as built-in sensors, Bluetooth, radio-frequency identification (RFID) tracking, and nearfield communications (NFC) allow it to be an integral part of IoT and IoE  ...  IoT-driven healthcare systems and technologies can be used for prevention and early identification of diseases [39] and are basically used for hospitalized patients whose status requires continuous monitoring  ... 
doi:10.5772/intechopen.69734 fatcat:jft5szpcqfggzhh4r5icjgwdbq

Digital Landscape of COVID-19 Testing: Challenges and Opportunities [article]

Darshan Gandhi, Rohan Sukumaran, Priyanshi Katiyar, Alex Radunsky, Sunaina Anand, Shailesh Advani, Jil Kothari, Kasia Jakimowicz, Sheshank Shankar, Sethuraman T. V., Krutika Misra, Aishwarya Saxena (+14 others)
2020 arXiv   pre-print
It is the destiny of digitalization to navigate testing for COVID-19. Block-chain based systems can be used for privacy preservation and ensuring ownership of the data to remain with the user.  ...  Despite numerous digital solutions available and being developed, many vary in terms of information being shared in terms of both quality and quantity, which can be overwhelming to the users.  ...  , Saswati Soumya, Sunny Manduva, Bhavya Pandey, and Aarathi Prasad for their assistance in discussions, support and guidance in writing of this paper.  ... 
arXiv:2012.01772v1 fatcat:ahnc6cund5eh5f777mubvgl7hy

Personally Identifiable Information (PII) Detection in the Unstructured Large Text Corpus using Natural Language Processing and Unsupervised Learning Technique

Poornima Kulkarni, Cauvery N K
2021 International Journal of Advanced Computer Science and Applications  
Personally Identifiable Information (PII) has gained much attention with the rapid development of technologies and the exploitation of information relating to an individual.  ...  The corporates and other organizations store a large amount of information that is primarily disseminated in the form of emails that include personnel information of the user, employee, and customers.  ...  There are many contexts where certain information in these data is very private to a user or a system [2] .  ... 
doi:10.14569/ijacsa.2021.0120957 fatcat:3nmgcpw2krbmvj5rddmz7etddq

Privacy-Protecting Techniques for Behavioral Data: A Survey [article]

Simon Hanisch, Patricia Arias-Cabarcos, Javier Parra-Arnau, Thorsten Strufe
2021 arXiv   pre-print
Hence, techniques to protect individuals privacy against unwanted inferences are required. To consolidate knowledge in this area, we systematically reviewed applicable anonymization techniques.  ...  We also find that the evaluation methodology of behavioral anonymization techniques can be further improved.  ...  [215] propose a theoretical framework to quantify the privacy leakage risk and utility loss for speech data publishing.  ... 
arXiv:2109.04120v1 fatcat:zsv2bgrynveutlq2akx3vllhbq
« Previous Showing results 1 — 15 out of 1,319 results