2024
DOI: 10.26599/tst.2023.9010080
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Privacy and Security of Edge Computing in Smart Healthcare Systems: Issues, Challenges, and Research Directions

Ahmad Alzu'bi,
Ala'a Alomar,
Shahed Alkhaza'leh
et al.

Abstract: The healthcare industry is rapidly adapting to new computing environments and technologies. With academics increasingly committed to developing and enhancing healthcare solutions that combine the Internet of Things (IoT) and edge computing, there is a greater need than ever to adequately monitor the data being acquired, shared, processed, and stored. The growth of cloud, IoT, and edge computing models presents severe data privacy concerns, especially in the healthcare sector. However, rigorous research to deve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 144 publications
0
1
0
Order By: Relevance
“…Healthcare users, IoMT devices, and SHSs must all be verified using robust methods [99]. According to Da Silva et al [159] and Alzu'bi et al [160], authentication-based techniques are methods and technologies used to verify healthcare users' credentials against data stored in the system database and determine if the credentials match, ensuring that only authorized users have access to sensitive healthcare data and services. To prevent medical information from being disclosed to unauthorized entities, healthcare users and IoMT devices must be authenticated in SHSs [139].…”
Section: Authentication-based Techniquesmentioning
confidence: 99%
“…Healthcare users, IoMT devices, and SHSs must all be verified using robust methods [99]. According to Da Silva et al [159] and Alzu'bi et al [160], authentication-based techniques are methods and technologies used to verify healthcare users' credentials against data stored in the system database and determine if the credentials match, ensuring that only authorized users have access to sensitive healthcare data and services. To prevent medical information from being disclosed to unauthorized entities, healthcare users and IoMT devices must be authenticated in SHSs [139].…”
Section: Authentication-based Techniquesmentioning
confidence: 99%