15,953 Hits in 6.5 sec

An exploration of the Wearable Internet of Things (WIoT) Users" Privacy Concerns in healthcare domain

2020 International journal of recent technology and engineering  
The aim of this paper is to survey the end-user concerns of the privacy issues related to WIoT then we review conducted on current solutions that are worked toward preserving privacy in the healthcare  ...  Though the growing benefits to improve the health process and services and the large use of the Wearable Internet of Things (WIoT) devices, the patient's privacy issue remains a big concern.  ...  Test outcomes show that the offered solution fulfill imperceptibility [17] .One One of the uses of the internet of things in the medical area is by using machine learning technology to handle the data  ... 
doi:10.35940/ijrte.a2811.079220 fatcat:obcwo5ewm5cyljh3agfbgy2pb4

Differential Privacy for Industrial Internet of Things: Opportunities, Applications and Challenges [article]

Bin Jiang, Jianqiang Li, Guanghui Yue, Houbing Song
2021 arXiv   pre-print
Specially, some common algorithms in IIoT technology such as deep models strongly rely on data collection, which leads to the risk of privacy disclosure.  ...  Then we focus on the metrics of industrial data privacy, and analyze the contradiction between data utilization for deep models and individual privacy protection.  ...  Wang et al. put forward a method for secure medical data collection based on local differential privacy [129] .  ... 
arXiv:2101.10569v2 fatcat:xwebjbcvcjhbbaehajhdfjocia

Differential Privacy Techniques for Cyber Physical Systems: A Survey [article]

Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
2019 arXiv   pre-print
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT).With the provision of CPSs, the security and privacy  ...  This survey can serve as basis for the development of modern differential privacy techniques to address various problems and data privacy scenarios of CPSs.  ...  ) Blockchain Technology: In the past few years, blockchain emerged as one of the novel distributed strategy that allows the secure storage of transactions, or any other type of data without need of any  ... 
arXiv:1812.02282v3 fatcat:bnapnprldnaetjnjedz473lrme

Key Technologies of IoT Service Security and Privacy Protection

Dongxian Yu, Jiatao Kang, Junlei Dong
2021 Converter  
It is necessary to conduct in-depth research on the key technologies of Internet of things security and privacy protection.  ...  This article briefly describes the Internet of things security and privacy issues, then, it gives the research and application status of Internet of things security and privacy protection at home and abroad  ...  In view of the characteristics of IoT services and the above security and privacy challenges, this paper has conducted in-depth research on the key issues of security and privacy protection technologies  ... 
doi:10.17762/converter.158 fatcat:6kjzuhuvi5afhitf5nxdh36s3y

A Survey on Cryptographic Security and Information Hiding Technology for Cloud or Fog-Based IoT System

Liang Bai, Yuzhen Liu, Xiaoliang Wang, Nick Patterson, F. Jiang
2019 Journal of Information Hiding and Privacy Protection  
The purpose of this review is to look for original articles with novel ideas and solutions to address encryption security and information hiding technologies in cloud or fog-based Internet of Things systems  ...  Recently, cloud computing together with fog computing has become an important research area of the Internet of Things because of big data processing capabilities.  ...  [Piao, Shi, Yan et al. (2018) ] propose a framework for differentiated privacy in the publication of government statistics based on fog computing.  ... 
doi:10.32604/jihpp.2019.06043 fatcat:4r6jqlengzaungskj6qkjb6nsi

Data Security and Privacy-Preserving Framework Using Machine Learning and Blockchain in Big-Data to Data Middle Platform in the Era of IR 4.0 [chapter]

Chen Chuqiao, S.B. Goyal
2021 Advances in Parallel Computing  
Based on these gaps, trying to create a suitable framework to guide the industry to protect their privacy when the organization contribute and operate their data middle platform.  ...  These new digital technologies integrate into the data middle platform have facilitated the progress of industry, promoted the fourth industrial revolution.  ...  Privacy-preserving technology based on data encryption Data encryption-based privacy-preserving technology means the method of using encryption technology to hide privacy in the data mining process.  ... 
doi:10.3233/apc210190 fatcat:7j5qgemtizbyroemvmodgje4ju

Security, Privacy, and Applications in Mobile Healthcare

Chien-Lung Hsu, Atsuo Inomata, Sk. Md. Mizanur Rahman, Fatos Xhafa, Laurence T. Yang
2015 International Journal of Distributed Sensor Networks  
The paper "A Review of Differential Privacy in Individual Data Release" reviews and classified the literatures published in recent years about the methods of differentially private data releasing.  ...  The authors summarize a series of data release methods for privacy problem and provide certain references for differential privacy in further study. Chien-Lung Hsu Atsuo Inomata Sk. Md.  ... 
doi:10.1155/2015/675129 fatcat:xybr4cb7frahvh25unwrzymxj4

Guest Editorial: Blockchain and Healthcare Computing

Yulei Wu, Zheng Yan, F. Richard Yu, Robert Deng, Vijay Varadharajan, Wei Chen
2020 IEEE journal of biomedical and health informatics  
Using the Internet-of-Things (IoT) infrastructure in these health systems means that connected devices on these systems must be authenticated and securely interconnected to minimize security and privacy  ...  on blockchain to address the challenges of security and privacy concerns, data inconsistency, and timely access to the right records across multiple healthcare facilities.  ...  We foresee the continuation of the use of blockchain in healthcare computing and recognize that this special issue cannot cover all emerging issues in this area.  ... 
doi:10.1109/jbhi.2020.3003767 fatcat:o6k2liufubhfhfb4wjojkz2eom

Analysis of the architecture of the mental health education system for college students based on the Internet of Things and privacy security

Ruijian Xiao, Xingeng Liu
2021 IEEE Access  
on the privacy and security of the Internet of Things.  ...  First of all, this article combines the 3DES-RC4 hybrid security encryption algorithm based on the Internet of Things.  ...  PRIVACY DATA PROTECTION BASED ON EXTREME LEARNING MACHINE Mental health data is similar to financial and medical data, and usually contains a lot of private information.  ... 
doi:10.1109/access.2021.3084208 fatcat:pyi35f4f7rd7phwgydqgul64oe

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis

Mohamed Amine Ferrag, Othmane Friha, Leandros Maglaras, Helge Janicke, Lei Shu
2021 IEEE Access  
[102] developed a privacy-preserving federated learning scheme, which is based on blockchain technology for securing the Internet of Medical Things.  ...  The proposed protocol can provide privacypreserving of data based on the local differential privacy technology.  ...  He was a recipient of the 2021 IEEE TEM BEST PAPER AWARD. His current H-index is 21, i10-index is 35  ... 
doi:10.1109/access.2021.3118642 fatcat:222fgsvt3nh6zcgm5qt4kxe7c4

Analysis of Privacy-Preserving Edge Computing and Internet of Things Models in Healthcare Domain

Naif Almusallam, Abdulatif Alabdulatif, Fawaz Alarfaj, Osamah Ibrahim Khalaf
2021 Computational and Mathematical Methods in Medicine  
However, there is a lack of comprehensive research focused on seeking efficient and effective solutions that ensure data privacy in the healthcare domain.  ...  The advent of cloud, IoT, and edge computing paradigms poses huge risks towards the privacy of data, especially, in the healthcare environment.  ...  Acknowledgments This research was supported by the Deanship of Scientific Research, Imam Mohammad Ibn Saud Islamic University, Saudi Arabia Grant No. (20-13-08-004).  ... 
doi:10.1155/2021/6834800 pmid:35003323 pmcid:PMC8739545 fatcat:wio3dibh6ralzniuqwj4tcfwc4

A Survey on Internet of Things: Security and Privacy Issues

J. SathishKumar, Dhiren R. Patel
2014 International Journal of Computer Applications  
This survey summarizes the security threats and privacy concerns of IoT.. Keywords Internet of Things (IoT); Threats; Security ; Privacy .  ...  briefly on the IoTs applications in medical (health care)[5], smart home[6], intelligent community security system (smart city) [7].  ...  Based on a large number of low-cost sensors and wireless communication, the sensor network technology puts forward new demands to the Internet technology.  ... 
doi:10.5120/15764-4454 fatcat:xqm5xbu3lrezpbm23ej5q7moka

Table of contents

2021 IEEE Internet of Things Journal  
Li 10452 Internet of Things (IoT): A Review of Its Enabling Technologies in Healthcare Applications, Standards Protocols, Security, and Market Opportunities . . . . . . . . . . . . . . . M. N.  ...  Pan 10639 A New Preventive Routing Method Based on Clustering and Location Prediction in the Mobile Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M.  ... 
doi:10.1109/jiot.2021.3077780 fatcat:oi46xvj6efgtvefe3jrmkc4dwq

The applicability of the Internet of Things (IoT) between fundamental rights to health and to privacy

Mateus De Oliveira Fornasier
2019 Revista de Investigações Constitucionais  
Results: IoT/IoMT presents a great potential of actualization of the fundamental right to health, but the security of the collection and storage of sensitive data should be the first concern Resumo este  ...  Its main hypothesis is that healthcare can be revolutionarily improved with IoT, but despite of all of that revolution in good practices, good technologies of security, securitized by public policies and  ...  start suing one each other based on their behavior in the IoT and on security characteristics of devices/networks of people.  ... 
doi:10.5380/rinc.v6i2.67592 fatcat:dbcbswedsngijlcdm7wjuqjrru

Health Care Reform and the Internet [chapter]

Patricia MacTaggart, Stephanie Fiore
2011 Lecture Notes in Computer Science  
Health Care reform and the use of the Internet for Health Information Technology rely on consumer/patient "trust" that information will remain private and secure and recognizing the interdependence of  ...  Each decision is a balance between ease of use, privacy and security concerns of consumers/patients, practicality, costs and political will.  ...  data posting on the Internet, disregard of personal information, and breaches.  ... 
doi:10.1007/978-3-642-23300-5_7 fatcat:bddzbt2zaza3hotlzqasc2u5yy
« Previous Showing results 1 — 15 out of 15,953 results