A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Integrating Digital Technologies and Public Health to Fight Covid-19 Pandemic: Key Technologies, Applications, Challenges and Outlook of Digital Healthcare
2021
International Journal of Environmental Research and Public Health
In addition, we also provide policy recommendations for other countries that use digital technology to combat COVID-19. ...
First, main concepts, key development processes, and common application scenarios of integrating digital technologies and digital healthcare were offered in the part of background information. ...
Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/ijerph18116053
fatcat:pa23aay2sneznddobzqrxyudea
Privacy Preservation for Wireless Sensor Networks in Healthcare: State of the Art, and Open Research Challenges
[article]
2020
arXiv
pre-print
However, an important barrier is that acceptance by healthcare stakeholders is influenced by the effectiveness of privacy safeguards for personal and intimate information which is collected and transmitted ...
The advent of miniature biosensors has generated numerous opportunities for deploying wireless sensor networks in healthcare. ...
Analysis of information leakage can be categorized according to the type of traffic analysis attack: correlation-based source identification attack, routing trace back attack, and reducing source space ...
arXiv:2012.12958v1
fatcat:6bqeb3htibaypmbfckveiizxpm
Big data privacy: a technological perspective and review
2016
Journal of Big Data
Big data analytics is the term used to describe the process of researching massive amounts of complex data in order to reveal hidden patterns or identify secret correlations. ...
On the premise of this definition, the properties of big Abstract Big data is a term used for very large data sets that have more varied and complex structure. ...
or the de-identification risks. • De-identification is more feasible for privacy-preserving big data analytics if develop efficient privacy-preserving algorithms to help mitigate the risk of re-identification ...
doi:10.1186/s40537-016-0059-y
fatcat:hol5lhemzvawzc6yyxe4paa7zu
Developing a comprehensive information security framework for mHealth: a detailed analysis
2017
Journal of Reliable Intelligent Environments
Furthermore, the use of cloud computing is becoming an option for the healthcare sector to store healthcare data; but storing data in the cloud raises serious concerns. ...
overall efficiency of healthcare systems. ...
This may lead to the risk of lost or leakage of data that has been stored on the device. ...
doi:10.1007/s40860-017-0038-x
fatcat:mdpnztq7yrhejao5lu6unpjpoe
Access Management of User and Cyber-Physical Device in DBaaS according to Indian IT Laws using Blockchain
2020
Scalable Computing : Practice and Experience
Computing on the cloud has changed the working of mankind in every manner, from storing to fetching every information on the cloud. ...
Companies managing user data are also liable to protect user data from any type of attack under various sections of the Indian IT act. ...
Trusted users come in the category of enablers and average users based on Risk level comes in the category of neutral. ...
doi:10.12694/scpe.v21i3.1737
fatcat:5w5zoazjhfhpxoe2452qvfpj6i
Data exfiltration: A review of external attack vectors and countermeasures
2018
Journal of Network and Computer Applications
Context: One of the main targets of cyber-attacks is data exfiltration, which is the leakage of sensitive or private data to an unauthorized entity. ...
These countermeasures aim to detect, prevent, or investigate exfiltration of sensitive or private data. ...
[43] present a VLAN-based architecture for reducing the risk of data leakage in a healthcare organization. ...
doi:10.1016/j.jnca.2017.10.016
fatcat:fweg67tparct5owb3r4qrpgvxq
When Machine Learning Meets Privacy: A Survey and Outlook
[article]
2020
arXiv
pre-print
It is important to note that the problem of privacy preservation in the context of machine learning is quite different from that in traditional data privacy protection, as machine learning can act as both ...
This paper surveys the state of the art in privacy issues and solutions for machine learning. ...
The scheme can prevent information leakage to the "honest-but-curious cloud server" in the condition of collaborative deep learning. ...
arXiv:2011.11819v1
fatcat:xuyustzlbngo3ivqkc4paaer5q
When Machine Learning Meets Privacy
2021
ACM Computing Surveys
., deep learning) methods have become a strong driving force to revolutionize a wide range of industries, such as smart healthcare, financial technology, and surveillance systems. ...
It is important to note that the problem of privacy preservation in the context of machine learning is quite different from that in traditional data privacy protection, as machine learning can act as both ...
The scheme can prevent information leakage to the "honest-but-curious cloud server" in the condition of collaborative deep learning. ...
doi:10.1145/3436755
fatcat:cbkbmxj7krc3xoedv6tan4fle4
Evolution, Detection and Analysis of Malware for Smart Devices
2014
IEEE Communications Surveys and Tutorials
the device and collect sensory data and personal information. ...
This poses strong security and privacy issues to users and infrastructure operators, particularly through software of malicious (or dubious) nature that can easily get access to the services provided by ...
ACKNOWLEDGEMENTS We thank the anonymous reviewers for valuable suggestions that helped to improve the quality and organization of this paper. ...
doi:10.1109/surv.2013.101613.00077
fatcat:u7qjrw4grvcorjjmy3ykddjeda
Sensors for Context-Aware Smart Healthcare: A Security Perspective
2021
Sensors
of individuals or to their immediate context), the transmission of these data through wireless communication networks, to the final storage and analysis of such information in the appropriate health information ...
The advances in the miniaturisation of electronic devices and the deployment of cheaper and faster data networks have propelled environments augmented with contextual and real-time information, such as ...
Furthermore, monitoring the (de)hydration level in elderly people, a very high-risk group, is crucial to prevent their fragile health condition worsening. ...
doi:10.3390/s21206886
pmid:34696099
pmcid:PMC8537585
fatcat:n7qzpwyzo5f4rppmtkknkznpz4
A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective
2019
Symmetry
user-created data. ...
Protecting IoT data of such applications at rest either on the objects or in the cloud is an indispensable requirement for achieving a symmetry in the handling and protection of the IoT, as we do with ...
On the other hand, it opens doors for several attacks and threats like data leakage, as it increases the attack surface of IoT, according to [110] . ...
doi:10.3390/sym11060774
fatcat:ym5b6kycxvhenpwb7q5hpzihby
Smartphone: The Ultimate IoT and IoE Device
[chapter]
2017
Smartphones from an Applied Research Perspective
These new concepts can be applied in many application domains such as healthcare, transportation, and supply chain management (SCM), to name a few, and allow users to get real-time information such as ...
The smartphone-enabling technologies such as built-in sensors, Bluetooth, radio-frequency identification (RFID) tracking, and nearfield communications (NFC) allow it to be an integral part of IoT and IoE ...
IoT-driven healthcare systems and technologies can be used for prevention and early identification of diseases [39] and are basically used for hospitalized patients whose status requires continuous monitoring ...
doi:10.5772/intechopen.69734
fatcat:jft5szpcqfggzhh4r5icjgwdbq
Digital Landscape of COVID-19 Testing: Challenges and Opportunities
[article]
2020
arXiv
pre-print
It is the destiny of digitalization to navigate testing for COVID-19. Block-chain based systems can be used for privacy preservation and ensuring ownership of the data to remain with the user. ...
Despite numerous digital solutions available and being developed, many vary in terms of information being shared in terms of both quality and quantity, which can be overwhelming to the users. ...
, Saswati Soumya, Sunny Manduva, Bhavya Pandey, and Aarathi Prasad for their assistance in discussions, support and guidance in writing of this paper. ...
arXiv:2012.01772v1
fatcat:ahnc6cund5eh5f777mubvgl7hy
Personally Identifiable Information (PII) Detection in the Unstructured Large Text Corpus using Natural Language Processing and Unsupervised Learning Technique
2021
International Journal of Advanced Computer Science and Applications
Personally Identifiable Information (PII) has gained much attention with the rapid development of technologies and the exploitation of information relating to an individual. ...
The corporates and other organizations store a large amount of information that is primarily disseminated in the form of emails that include personnel information of the user, employee, and customers. ...
There are many contexts where certain information in these data is very private to a user or a system [2] . ...
doi:10.14569/ijacsa.2021.0120957
fatcat:3nmgcpw2krbmvj5rddmz7etddq
Privacy-Protecting Techniques for Behavioral Data: A Survey
[article]
2021
arXiv
pre-print
Hence, techniques to protect individuals privacy against unwanted inferences are required. To consolidate knowledge in this area, we systematically reviewed applicable anonymization techniques. ...
We also find that the evaluation methodology of behavioral anonymization techniques can be further improved. ...
[215] propose a theoretical framework to quantify the privacy leakage risk and utility loss for speech data publishing. ...
arXiv:2109.04120v1
fatcat:zsv2bgrynveutlq2akx3vllhbq
« Previous
Showing results 1 — 15 out of 1,319 results