Advanced Healthcare Systems
Здесь есть возможность читать онлайн «Advanced Healthcare Systems» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.
- Название:Advanced Healthcare Systems
- Автор:
- Жанр:
- Год:неизвестен
- ISBN:нет данных
- Рейтинг книги:5 / 5. Голосов: 1
-
Избранное:Добавить в избранное
- Отзывы:
-
Ваша оценка:
- 100
- 1
- 2
- 3
- 4
- 5
Advanced Healthcare Systems: краткое содержание, описание и аннотация
Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Advanced Healthcare Systems»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.
This book offers a complete package involving the incubation of machine learning, AI, and IoT in healthcare that is beneficial for researchers, healthcare professionals, scientists, and technologists.
Audience
Advanced Healthcare Systems — читать онлайн ознакомительный отрывок
Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Advanced Healthcare Systems», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.
Интервал:
Закладка:
Fake Identity Attack: In this, attacker can create false identity of authorized persons in the system and can do certain things like changing the entries and deleting some important records; attackers can also downgrade the system performance by consuming system resources unnecessarily.
Data Tampering Attack: In this, attacker can tamper health-related data by changing, editing, manipulating, and destroying.
Spamming: In this attack, fake data of patients is created and flooded in the system which induces unnecessary entry in data tables which leads to inaccurate results.
Denial-of-Service Attack: In this, attacker creates a large number of fake packets to flood the network, and then, the system engages in fulfilling the request generated by the fake packets and denies the request generated by genuine packets. This results in poor system performance and uptime. Eavesdropping: In this, attackers take access of the communication channel and start snooping the packet traveling in that channel. If a very strong encryption technique is not applied, then it is very easy for attackers to read and understand those data.
Location Privacy: In this, attacker can gain live location access of the patient, generated form the wearable IoT devices attached to the patient or the mobile phone.
Usages Privacy: In this, attacker can gain usage information of the patient or the person involved in the healthcare to find the useful and predict some sensitive information.
2.5 Conclusion
Technological advancement in the healthcare industry is increasing rapidly, and a variety of wearable devices are available for gathering health-related patient data. Data gathered from these smart devices are very huge.
The high volume of important data invites attackers to steal and manipulate it. To maintain integrity, security and privacy of health-related data. In this paper we have discussed architecture of the next generation healthcare system with latest available IoT devices, use of fog computing for local processing and storing, then for pattern recognition sends it to the cloud. Here, deep learning and data mining are done on that data. There are many security privacy issues, and challenges are there that need to be addressed very carefully.
References
1. Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., Wang, G., Security and Privacy in the Medical Internet of Things: A Review. Secur. Commun. Netw ., 2018, 9, 2018.
2. Zhang, H., Cai, Z., Liu, Q. et al ., A survey on security-aware measurement in SDN. Secur. Commun. Netw ., 2018, 2018. https://doi.org/10.1155/2018/2459154.
3. Han, S., Zhao, S., Li, Q., Ju, C.-H., Zhou, W., PPM-HDA: privacy-preserving and multifunctional health data aggregation with fault tolerance. IEEE Trans. Inf. Forensics Secur ., 11, 9, 1940–1955, 2016.
4. Yin, H. et al ., Smart Healthcare. Found. Trends R Electron. Des. Autom ., 1, 1–67, 2018.
5. Abuwardih, L.A., Shatnawi, W., Aleroud, A., Privacy preserving data mining on published data in healthcare: A survey. 1–6, 2016. https://ieeexplore.ieee.org/document/7549444
6. Anwar, M., Joshi, J., Tan, J., Anytime anywhere access to secure privacy-aware healthcare services: Issues approaches and challenges. Health Policy Technol ., 4, 4, 299–311, 2015.
7. Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y., Secure medical architecture on the cloud using wireless sensor networks for emergency management, in: Proceedings of the 2013 IEEE 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013 , pp. 248–252, October 2013.
8. Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y., Healing on the cloud: secure cloud architecture for medical wireless sensor networks. Future Gener. Comput. Syst ., 55, 266–277, 2016.
9. Li, M., Yu, S., Zheng, Y., Scalable and secure sharing of personal health records in cloud computing using attributebased encryption. IEEE Trans. Parallel Distrib. Syst ., 24, 1, 131–143, 2012.
10. Abdmeziem, M.R. and Tandjaoui, D., A cooperative end to end key management scheme for e-health applications in the context of internet of things, in: Ad-hoc Networks and Wireless , pp. 35–46, Springer, Berlin Heidelberg, 2014.
11. Hu, J.-X., Chen, C.-L., Fan, C.-L., Wang, K.-H., An intelligent and secure health monitoring scheme using IoT sensor based on cloud computing. J. Sens ., 2017, Article ID 3734764, 11 pages, 2017.
12. Li, M., Yu, S., Cao, N., Lou, W., Authorized private keyword search over encrypted data in cloud computing, in: Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS ‘11) , IEEE, Minneapolis, Minn, USA, pp. 383–392, July, 2011.
13. Miao, Y., Ma, J., Liu, X., Wei, F., Liu, Z., Wang, X.A., m2-ABKS: attributebased multi-keyword search over encrypted personal health records in multi-owner setting. J. Med. Syst ., 40, 11, 246, 2016. https://link.springer.com/article/10.1007/s10916-016-0617-z
14. Song, C., Lin, X., Shen, X. et al ., Kernel regression based encrypted images compression for e-healthcare systems, in: Proceedings of the International Conference on Wireless Communications and Signal Processing , pp. 1–6, 2013.
15. Bezawada, B., Liu, A.X., Jayaraman, B., Wang, A.L., Li, R., Privacy Preserving String Matching for Cloud Computing, in: Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, ICDCS ‘15 , pp. 609–618, July 2015.
16. Li, C.-T., Lee, C.-C., Weng, C.-Y., A secure cloud-assisted wireless body area network in mobile emergency medical care system. J. Med. Syst ., 40, 5, 1–15, 2016.
17. Gong, T., Huang, H., Li, P., Zhang, K., Jiang, H., A Medical Healthcare System for Privacy Protection Based on IoT, in: Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms, and Programming, PAAP ‘15 , pp. 217–222, December 2015.
18. Rahman, F., Ahamed, S., II, Yang, J.-J., Wang, Q., nclusive Society: Health and Wellbeing in the Community and Care at Home. 11th International Conference on Smart Homes and Health Telematics ICOST 2013 , June 19–21, 2013.
19. Bindahman, S. and Zakaria, N., Informatics Engineering and Information Science. International Conference ICIEIS 2011 , November 14–16, 2011.
20. Dubovitskaya, A., Urovi, V., Vasirani, M., Aberer, K., ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference SEC 2015 , May 26-28, 2015.
21. Farahani, B., Firouzi, F., Chang, V., Badaroglu, M., Constant, N., Mankodiya, K. , Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare. Future Gener. Comput. Syst ., 78, Part 2, 2018. https://digitalcommons.uri.edu/ele_facpubs/79
22. Idoga, P.E., Agoyi, M., Coker-Farrell, E.Y., Ekeoma, O.L., Review of security issues in e-Healthcare and solutions. 2016 HONET-ICT , Nicosia, pp. 118121, 2016.
23. Badidi, E. and Moumane, K., Enhancing the Processing of Healthcare Data Streams using Fog Computing. 2019 IEEE Symposium on Computers and Communications (ISCC) , Barcelona, Spain, pp. 1113–1118, 2019.
24. Apat, H.K., Bhaisare, K., Sahoo, B., Maiti, P., Energy Efficient Resource Management in Fog Computing Supported Medical Cyber-Physical System. 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA) , Gunupur, India, pp. 1–6, 2020.
25. Mutlag, A.A., Ghani, M.K.A., Arunkumar, N., Mohammed, M.A., Mohd, O., Enabling technologies for fog computing in healthcare IoT systems. Future Gener. Comput. Syst ., 90, 62–78, 2019.
Читать дальшеИнтервал:
Закладка:
Похожие книги на «Advanced Healthcare Systems»
Представляем Вашему вниманию похожие книги на «Advanced Healthcare Systems» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.
Обсуждение, отзывы о книге «Advanced Healthcare Systems» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.