Data Security and Privacy Challenges in Adopting Solutions for IOT

@article{Supriya2016DataSA,
  title={Data Security and Privacy Challenges in Adopting Solutions for IOT},
  author={S. Supriya and Sagar Padaki},
  journal={2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)},
  year={2016},
  pages={410-415}
}
  • S. SupriyaSagar Padaki
  • Published 1 December 2016
  • Computer Science, Medicine
  • 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
Advancements in medical imaging have revolutionized the way in which clinicians' approach diagnoses. From monitoring of disease to the treatment of illnesses is realized to be much more effective than ever before. The ability to exchange, connect and share information about human anatomy via non-invasive methods of radiology, nuclear medicine has opened up an entire new genre of medicine. Having said that, 'image distribution' in medical field has always been a challenge for the reasons known… 

Figures and Tables from this paper

Analysis of Privacy and Security Challenges in e-Health Clouds

  • R. Alanazi
  • Medicine, Computer Science
    International Journal of Advanced Computer Science and Applications
  • 2022
With the increasing interest of healthcare organizations to migrate from the conventional healthcare systems to the modern cloud-based eHealth systems, not much care is being taken to address security and privacy issues effectively towards the protection of sensitive data.

Privacy Preserving and Resilient Cloudified IoT Architecture to Support eHealth Systems

This paper addresses issues by proposing tokenization architecture and crypto-implementation for personal identity number (PIN) which will allow the storage and processing of the personal health information (PII) in the public cloud as the data cannot be identified to a specific person.

eHealth Cloud Security Challenges: A Survey

There is an immediate need for a holistic solution that balances all the contradicting requirements of the cloud technology and the state-of-the art solutions address only a subset of those concerns.

A Data Security And Privacy Risk Management Framework For WBAN Based Healthcare Applications*

The goal of this paper is to present the methodology used to develop a data security and privacy risk management framework for WBAN healthcare applications and outline how the framework addresses the aforementioned challenges.

A novel method for secure sharing of PHR data in cloud

This paper proposes a methodology called SeSPHR for secure sharing of the PHRs in the cloud and formally analyze and verify the working of SeSP HR methodology through the High Level Petri Nets (HLPN).

Secure Sharing Of PHR Data Using Reencryption

This paper proposes a methodology called SeSPHR for secure sharing of the PHRs in the cloud and formally analyze and verify the working of SeSP HR methodology through the High Level Petri Nets (HLPN).

An IoT-Based Framework of Webvr Visualization for Medical Big Data in Connected Health

A lightweight progressive transmission algorithm based on large data visualization in telemedicine is proposed to improve transmission efficiency and achieve lossless transmission of original data.

Internet of Things data management: A systematic literature review, vision, and future trends

This study aims to classify and evaluate studies published between 2015 and 2021 in IoT data management, and includes five categories, data processing, data smartness application, data collection, data security, and data storage.

A Systematic Literature Mapping of Risk Analysis of Big Data in Cloud Computing Environment

A framework of how to assess the risk of security, privacy and trust associated with big data and cloud computing environment is highly needed.

References

SHOWING 1-10 OF 19 REFERENCES

Big Data Security and Privacy Issues in Healthcare

  • H. PatilR. Seshadri
  • Medicine, Computer Science
    2014 IEEE International Congress on Big Data
  • 2014
This paper presents the state-of-the-art security and privacy issues in big data as applied to healthcare industry and suggests ways to lower healthcare costs and eventually lead to economic growth.

Security and Privacy in eHealth: Is it possible?

  • T. SahamaL. SimpsonB. Lane
  • Computer Science, Political Science
    2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013)
  • 2013
It is hypothesize that the major concerns regarding eHealth security and privacy cannot be overcome through the implementation of technology alone and a framework that accommodates consideration of the legislative requirements and human perspectives in addition to the technological measures is useful in developing a measurable and accountable eHealth system.

Privacy Challenges for the Internet of Things

This article will introduce the Internet of Things, address its definition and related concepts, outline anticipated application areas, highlight challenges, and discuss privacy and surveillance concerns.

Security Risk and Threat Models for Health Care Product Development Processes

A variety of information security risk and threat models are explored as well as apply and develop the appropriate model of health care needs of the domain to apply the existing models of Tieto’s health care development model.

Cryptography & Network Security

A textbook for beginners in security, well-known author Behrouz Forouzan uses his accessible writing style and visual approach to simplify the difficult concepts of cryptography and network security.

Digital Signature

  • R. KaurA. Kaur
  • Computer Science
    2012 International Conference on Computing Sciences
  • 2012
This paper describes the different key factor of digital signature with the working ofdigital signature, through various methods and procedures involved in signing the data or message by using digital signature, and introduces algorithms used in digital signatures.

Threat Modelling with Stride and UML

This paper uses a standard case study to illustrate the effects of using an alternative process model (UML activity diagrams) with STRIDE and suggests that using a more modern process diagram can generate a more effective threat model.

Communication Networks: Fundamental Concepts and Key Architectures

This new text shows students the big picture of networks in general so that they may see how the various parts of the network fit in to the picture.