Data Security and Privacy Challenges in Adopting Solutions for IOT

@article{Supriya2016DataSA,
  title={Data Security and Privacy Challenges in Adopting Solutions for IOT},
  author={S. Supriya and Sagar Padaki},
  journal={2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)},
  year={2016},
  pages={410-415}
}
  • S. Supriya, Sagar Padaki
  • Published 1 December 2016
  • Business, Computer Science
  • 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
Advancements in medical imaging have revolutionized the way in which clinicians' approach diagnoses. From monitoring of disease to the treatment of illnesses is realized to be much more effective than ever before. The ability to exchange, connect and share information about human anatomy via non-invasive methods of radiology, nuclear medicine has opened up an entire new genre of medicine. Having said that, 'image distribution' in medical field has always been a challenge for the reasons known… 
Privacy Preserving and Resilient Cloudified IoT Architecture to Support eHealth Systems
TLDR
This paper addresses issues by proposing tokenization architecture and crypto-implementation for personal identity number (PIN) which will allow the storage and processing of the personal health information (PII) in the public cloud as the data cannot be identified to a specific person.
eHealth Cloud Security Challenges: A Survey
TLDR
There is an immediate need for a holistic solution that balances all the contradicting requirements of the cloud technology and the state-of-the art solutions address only a subset of those concerns.
A Data Security And Privacy Risk Management Framework For WBAN Based Healthcare Applications*
TLDR
The goal of this paper is to present the methodology used to develop a data security and privacy risk management framework for WBAN healthcare applications and outline how the framework addresses the aforementioned challenges.
A novel method for secure sharing of PHR data in cloud
TLDR
This paper proposes a methodology called SeSPHR for secure sharing of the PHRs in the cloud and formally analyze and verify the working of SeSP HR methodology through the High Level Petri Nets (HLPN).
Secure Sharing Of PHR Data Using Reencryption
TLDR
This paper proposes a methodology called SeSPHR for secure sharing of the PHRs in the cloud and formally analyze and verify the working of SeSP HR methodology through the High Level Petri Nets (HLPN).
An IoT-Based Framework of Webvr Visualization for Medical Big Data in Connected Health
TLDR
A lightweight progressive transmission algorithm based on large data visualization in telemedicine is proposed to improve transmission efficiency and achieve lossless transmission of original data.
A Systematic Literature Mapping of Risk Analysis of Big Data in Cloud Computing Environment
TLDR
A framework of how to assess the risk of security, privacy and trust associated with big data and cloud computing environment is highly needed.
El reto del desarrollo seguro de aplicaciones IoT en un mercado acelerado
TLDR
Este artículo aborda el reto del desarrollo seguro de dispositivos y aplicaciones IoT en un mercado that exige desar rollo y actualizaciones de forma ágiles, and presenta two alternativas propuestas in the literatura para gestionar el desarRollo seGuro with the filosofía del desARrollo ágil.

References

SHOWING 1-10 OF 19 REFERENCES
Big Data Security and Privacy Issues in Healthcare
TLDR
This paper presents the state-of-the-art security and privacy issues in big data as applied to healthcare industry and suggests ways to lower healthcare costs and eventually lead to economic growth.
Security and Privacy in eHealth: Is it possible?
  • T. Sahama, L. Simpson, B. Lane
  • Computer Science
    2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013)
  • 2013
TLDR
It is hypothesize that the major concerns regarding eHealth security and privacy cannot be overcome through the implementation of technology alone and a framework that accommodates consideration of the legislative requirements and human perspectives in addition to the technological measures is useful in developing a measurable and accountable eHealth system.
Privacy Challenges for the Internet of Things
The IoT is a paradigm encompassing a wide range of developments that enable everyday objects to be tagged and uniquely identified over the Internet. Although there is no single definition for the
Security Risk and Threat Models for Health Care Product Development Processes
The purpose of this study was to explore a variety of information security risk and threat models as well as apply and develop the appropriate model of health care needs of the domain. Healthcare
Cryptography & Network Security
TLDR
A textbook for beginners in security, well-known author Behrouz Forouzan uses his accessible writing style and visual approach to simplify the difficult concepts of cryptography and network security.
Digital Signature
  • R. Kaur, A. Kaur
  • Computer Science
    2012 International Conference on Computing Sciences
  • 2012
TLDR
This paper describes the different key factor of digital signature with the working ofdigital signature, through various methods and procedures involved in signing the data or message by using digital signature, and introduces algorithms used in digital signatures.
Threat Modelling with Stride and UML
TLDR
This paper uses a standard case study to illustrate the effects of using an alternative process model (UML activity diagrams) with STRIDE and suggests that using a more modern process diagram can generate a more effective threat model.
Communication Networks: Fundamental Concepts and Key Architectures
TLDR
This new text shows students the big picture of networks in general so that they may see how the various parts of the network fit in to the picture.
Cybersecurity and data protection: Helping healthcare clients protect patient information
  • 2016. [Online]. Available: https://www.lexisnexis.com/lexis-practice-advisor/thejournal/b/lpa/archive/2016/06/03/cybersecurity-and-data-protectionhelping-healthcare-clients-protect-patient-information.aspx.
  • 2016
...
1
2
...