2017
DOI: 10.1155/2017/7862842
|View full text |Cite
|
Sign up to set email alerts
|

Data Transmission and Access Protection of Community Medical Internet of Things

Abstract: On the basis of Internet of Things (IoT) technologies, Community Medical Internet of Things (CMIoT) is a new medical information system and generates massive multiple types of medical data which contain all kinds of user identity data, various types of medical data, and other sensitive information. To effectively protect users' privacy, we propose a secure privacy data protection scheme including transmission protection and access control. For the uplink transmission data protection, bidirectional identity aut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…Despite the high security, cryptography has the disadvantage that it is a slower speed. This is noted by scientists and this is confirmed by mathematics [33]. This approach will allow to some extent eliminate the internal uncertainty associated with a large number of data sources, the anonymity of participants, and uncertainty of responsibilities [34], [35].…”
mentioning
confidence: 78%
“…Despite the high security, cryptography has the disadvantage that it is a slower speed. This is noted by scientists and this is confirmed by mathematics [33]. This approach will allow to some extent eliminate the internal uncertainty associated with a large number of data sources, the anonymity of participants, and uncertainty of responsibilities [34], [35].…”
mentioning
confidence: 78%
“…Through a dynamic authorization mechanism, patients can sign up to receive an authorized code and access their medical data. 44 , 45 Confidentiality: This often happens by decrypting the encrypted data at data delivery. 40 These factors were addressed in the related literature; Kelly et al 46 mentioned confidence, privacy and security, data storage, control, and ownership as barriers to IoT‐based health care.…”
Section: Discussionmentioning
confidence: 99%
“…Through a dynamic authorization mechanism, patients can sign up to receive an authorized code and access their medical data. 44 , 45…”
Section: Discussionmentioning
confidence: 99%
“…Xunbao Wang et al [11] The system could be protected effectively during access process and transmission without loss in performance.…”
Section: Access Controlmentioning
confidence: 99%