2019
DOI: 10.1007/978-3-030-32785-9_1
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and Security of IoT Based Healthcare Systems: Concerns, Solutions, and Recommendations

Abstract: Although emerging IoT paradigms in sleep tracking have a substantial contribution to enhancing current healthcare systems, there are several privacy and security considerations that end-users need to consider. End-users can be susceptible to malicious threats when they allow permission to potentially vulnerable or leaky third-party apps. Since the data is migrated to the cloud, it goes over insecure communication channels, all of which have their security concerns. Moreover, there are alternative data violatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(19 citation statements)
references
References 22 publications
(25 reference statements)
0
19
0
Order By: Relevance
“…A new trend in this field has started relying on implementing models that can be implemented on-device and are both quick and accurate in detecting these behaviors. In addition to providing real-time interventions (Thomas and Bond, 2015 ; Nahum-Shani et al, 2018 ), on-device monitoring of these behaviors can reduce privacy concerns (Sadek et al, 2019 ). However, since wearable devices themselves might not be capable of processing the data, federated machine learning approaches are also being explored recently by several researchers (Rieke et al, 2020 ).…”
Section: Exemplars Of Domain Applicationsmentioning
confidence: 99%
“…A new trend in this field has started relying on implementing models that can be implemented on-device and are both quick and accurate in detecting these behaviors. In addition to providing real-time interventions (Thomas and Bond, 2015 ; Nahum-Shani et al, 2018 ), on-device monitoring of these behaviors can reduce privacy concerns (Sadek et al, 2019 ). However, since wearable devices themselves might not be capable of processing the data, federated machine learning approaches are also being explored recently by several researchers (Rieke et al, 2020 ).…”
Section: Exemplars Of Domain Applicationsmentioning
confidence: 99%
“…Since data is collected through sensors, a lack of memory resources leads to data loss and overload of the processors block the gateways or cloud servers from operating in their optimal way and even disable them. 4) Human interaction issues: There is a high probability that human intervention can be part of a system failure [16] through: Implementation defects and operational mistakes, Co-programming and Formal Design. * a) Implementation defects and operational mistakes signify faults caused by human errors [8].…”
Section: Iot Architecture and Existing Issuesmentioning
confidence: 99%
“…* a) Data Security regroups data stealing, data loss, and data privacy. The importance of self-awareness of issues compromising data has been documented [16]. Attackers are well versed in a data attack through techniques such as man-in-the-middle attack, phishing, intrusion to get the information they need.…”
Section: Iot Architecture and Existing Issuesmentioning
confidence: 99%
“…Several recent works aim at integrating the IoT framework for data collection with the AI-based processing models [10,25]. The e-healthcare systems transfer the collected medical data over to cloud-based servers through insecure communication channels that lead to security breaches [26,28]. In the e-health systems, Computer-aided Diagnosis (CAD) is carried out for the treatment of the patient by using medical image analysis and segmentation.…”
Section: Introductionmentioning
confidence: 99%