2019
DOI: 10.1002/ett.3634
|View full text |Cite
|
Sign up to set email alerts
|

A privacy‐preserving framework for smart context‐aware healthcare applications

Abstract: Internet of things (IoT) is a disruptive paradigm with wide ranging applications including healthcare, manufacturing, transportation and retail. Within healthcare, smart connected wearable devices are widely used to achieve improved wellbeing, quality of life and security of citizens. Such connected devices generate significant amount of data containing sensitive information about patient requiring adequate protection and privacy assurance. Unauthorized access to an individual's private data constitutes a brea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(27 citation statements)
references
References 60 publications
(96 reference statements)
0
25
0
Order By: Relevance
“…One type of risk is tampering with a patient's medication intake instructions, which could cause the patient's death. Therefore, many researchers emphasize the need for security and privacy policies and protocols to use IoT solutions in health care (Al-Nayadi and Abawajy, 2007 ; Azad et al, 2019 ; Ball et al, 2003 ; Park and Moon, 2016 ). One crucial challenge of e-Prescription systems is whether the system's overall architecture should be centralized or decentralized.…”
Section: Discussionmentioning
confidence: 99%
“…One type of risk is tampering with a patient's medication intake instructions, which could cause the patient's death. Therefore, many researchers emphasize the need for security and privacy policies and protocols to use IoT solutions in health care (Al-Nayadi and Abawajy, 2007 ; Azad et al, 2019 ; Ball et al, 2003 ; Park and Moon, 2016 ). One crucial challenge of e-Prescription systems is whether the system's overall architecture should be centralized or decentralized.…”
Section: Discussionmentioning
confidence: 99%
“…Content may change prior to final publication. Referenced Papers [119], [120], [78], [121], [122], [95], [13], [111], [123], [80], [56], [11], [124] [89], [125], [126], [127], [128], [129], [31], [79], [76], [130], [131], [132], [133], [134], [20], [135], [18], [88], [106], [127], [136], [137], [41], [138], [139], [71] [10], [82], [130], [81], [140], [60], [141], [30], [142], [29], [129], [19], …”
Section: Application Context Of Schmentioning
confidence: 99%
“…24[4] ≔ ( 24[4])) into Upd place for future references, as shown in rule 12. [1], 54 [2], 54 [3], 54 [4])} Rule 20…”
Section: Formal Modeling and Analysis For ( )-Slicedbucket Privacy Modelmentioning
confidence: 99%
“…The accumulated data can be of various type such as credit card transactions, phone calls, web browsing, social media activities, or Electronic Health Records (EHR), etc. [1][2][3]. Such data may contain private information e.g.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation