2020
DOI: 10.1016/j.future.2020.07.023
|View full text |Cite
|
Sign up to set email alerts
|

A new data clustering strategy for enhancing mutual privacy in healthcare IoT systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 71 publications
(36 citation statements)
references
References 20 publications
0
36
0
Order By: Relevance
“…Starlink) to share clinical data between patients and physicians. Data shared in wireless networks often pose a threat of privacy leakage during the process of communication for analysis [391,392]. Strengthening the security and protecting the privacy of participants, patients, and cluster centers should be considered when developing new technologies [392].…”
Section: Issues With Current Screening and Diagnostic Tools: The Need For New Or Improved Techniquesmentioning
confidence: 99%
“…Starlink) to share clinical data between patients and physicians. Data shared in wireless networks often pose a threat of privacy leakage during the process of communication for analysis [391,392]. Strengthening the security and protecting the privacy of participants, patients, and cluster centers should be considered when developing new technologies [392].…”
Section: Issues With Current Screening and Diagnostic Tools: The Need For New Or Improved Techniquesmentioning
confidence: 99%
“…In IoT-based healthcare, studies on encryption and authentication protocols for user 8 Mobile Information Systems Figure 6: Keyword co-occurrence network obtained using VOSviewer. Mobile Information Systems authentication [120][121][122][123] and data encryption for patient privacy protection [124][125][126][127] are relevant. Safe and efficient medical data retrieval is important for remote medical monitoring.…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
“…With the spread of IoT applications, smart health is becoming an attractive paradigm. As it deals with user information and sensitive medical information, the security and mutual authentication of medical sensor devices for personal information protection, encryption, and real-time monitoring are key elements [125,[170][171][172][173][174][175][176][177][178][179][180][181].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…Another characteristic that needs to be optimized is the machine understanding. Guo et al [171] proposed that semantic technology that includes semantic annotation, reasoning and service based on associations for machine understanding in order to fulfill interoperability in IoT system. The third important optimization characteristic is a learning method in the decision making system.…”
Section: Definition Of Key Characteristics 2 Selection Of Measuring mentioning
confidence: 99%
“…There are different types of algorithms in order to perform learning. Some of them are decision tree, logistic regression, association rules, deep learning, clustering algorithms, and support vector machines (SVM) [171][172][173][174]. Researches and academicians mostly use all these learning algorithms but in real life applications, it is not possible to propose one algorithm due to diversity of IoT applications.…”
Section: Definition Of Key Characteristics 2 Selection Of Measuring mentioning
confidence: 99%