2018 Fourth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN) 2018
DOI: 10.1109/icrcicn.2018.8718717
|View full text |Cite
|
Sign up to set email alerts
|

Extensive Survey on Cloud-based IoT-Healthcare and Security using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…These technologies have made human life smarter by providing costeffective and easily accessible services [1,2]. These technologies have also had a dramatic impact on the healthcare industry, making the healthcare services prompt and extending their outreach [13,39,66]. But the digital revolution is also the harbinger of serious issues and challenges.…”
Section: Results and Findingsmentioning
confidence: 99%
See 2 more Smart Citations
“…These technologies have made human life smarter by providing costeffective and easily accessible services [1,2]. These technologies have also had a dramatic impact on the healthcare industry, making the healthcare services prompt and extending their outreach [13,39,66]. But the digital revolution is also the harbinger of serious issues and challenges.…”
Section: Results and Findingsmentioning
confidence: 99%
“…This study discussed the security issues and challenges of the Internet of Things (IoT) systems. Ghosal et al [39] performed an extensive survey on cloud based IoT that used ML for data analysis and cyber security in healthcare. This study proposed a model for data analysis and secure data access.…”
Section: Existing Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…From a safety and defense viewpoint of IoT, cyber-attacks, mainly data breaches and identity theft, are growing; thus, necessitating real-time connected devices to support sufficient security and defense in an integrated way [10]. In the relevant literature, an intelligent intrusion-detection system tailored to the IoT environment was developed: a deep-learning algorithm can detect malicious traffic in IoT networks through simulating and providing evidence of scalability and interoperability between various IoT-running protocols upon network communication [11].…”
Section: Introductionmentioning
confidence: 99%
“…Table I provides a comparison between IoT, CC, and BGD and provides a brief overview of all three approaches. This will help in getting an overview of all three paradigms quickly [44][45][46][47][48][49][50][51][52][53][54]. Although these three approaches have their purpose and importance, however, the convergence of these three is very beneficial in real-time applications.…”
Section: Introductionmentioning
confidence: 99%