2022
DOI: 10.1155/2022/9766844
|View full text |Cite|
|
Sign up to set email alerts
|

Blockchain-Based Trust Management Framework for Cloud Computing-Based Internet of Medical Things (IoMT): A Systematic Review

Abstract: The internet of medical things (IoMT) is a smart medical device structure that includes apps, health services, and systems. These medical equipment and applications are linked to healthcare systems via the internet. Because IoT devices lack computational power, the collected data can be processed and analyzed in the cloud by more computationally intensive tools. Cloud computing in IoMT is also used to store IoT data as part of a collaborative effort. Cloud computing has provided new avenues for providing servi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
19
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 67 publications
(19 citation statements)
references
References 67 publications
0
19
0
Order By: Relevance
“…Reference [26] analyzed the possible privacy information leakage problem in STIX network security threat intelligence sharing standard, and tried to solve the privacy information leakage problem by using an improved data sharing protocol. The above research work has played a role in privacy protection from a unilateral dimension, but cannot protect the privacy information of the intelligence sharing party, the intelligence user and the intelligence-related parties at the same time [27][28][29][30][31][32].…”
Section: Related Workmentioning
confidence: 99%
“…Reference [26] analyzed the possible privacy information leakage problem in STIX network security threat intelligence sharing standard, and tried to solve the privacy information leakage problem by using an improved data sharing protocol. The above research work has played a role in privacy protection from a unilateral dimension, but cannot protect the privacy information of the intelligence sharing party, the intelligence user and the intelligence-related parties at the same time [27][28][29][30][31][32].…”
Section: Related Workmentioning
confidence: 99%
“…Deep learning models that take such trained word representations as input have been employed by researchers to classify unstructured texts documents [38], medical notes [39], health-related social media texts [40], and biomedical text mining tasks [41]. Besides these, handwritten script recognition [42], detection of diseases [43][44][45], and healthcare solutions [46] involve the potential application of deep learning models.…”
Section: Related Workmentioning
confidence: 99%
“…REMOTE HEALTH MONITORING USING IOT WITH THREE SENSORS In this system, the use of a microcontroller is proposed along with the use of three basic sensors, including the pulse, ECG and temperature sensor. It proposes using IoT to send the data so that the details can be saved and processed on the cloud and alerts can be generated [13]. Additionally, since all this data is sensitive, user authentication is also employed for the security of the users.…”
Section: Analysis Of the Systemmentioning
confidence: 99%