2019
DOI: 10.1177/1550147719875653
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-based medical data protection against internal security threats in heterogeneous Internet of Medical Things

Abstract: Data and information security is considered to be an important and challenging task for any field of life. But it becomes more critical especially when it deals with the medical field due to life and health hazards. The ratio of internal security threats to external threats always remains high. A huge number of efforts and technical expertise are required in the case of attacking the system from the external environment. But it requires fewer efforts if a system is attacked internally by the stakeholders of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 26 publications
0
9
0
Order By: Relevance
“…These studies are as follows: [22], [45], [57], [58]. The papers [43], [47]- [49], [52], [53] also considered the access control property, although this property is not the main focus of these studies.…”
Section: Analysis Of Data Results and Research Gapmentioning
confidence: 99%
See 1 more Smart Citation
“…These studies are as follows: [22], [45], [57], [58]. The papers [43], [47]- [49], [52], [53] also considered the access control property, although this property is not the main focus of these studies.…”
Section: Analysis Of Data Results and Research Gapmentioning
confidence: 99%
“…In [49], an access control model named MDPAC for the purpose of security is proposed. This model enables legitimate entities to get access to health data and guarantees communication among patients and doctors in a private, secure, and efficient manner.…”
Section: Blockchain-based Iomtmentioning
confidence: 99%
“…A unified blockchain-based technique would solve many of the difficulties related to a centralized cloud solution. Authors in [89] introduced an access management model that safeguarded patients' medical data from internal information security attacks. It enabled only legally permitted people to connect despite physical limitations.…”
Section: Security and Privacy In Iomt-based Health Carementioning
confidence: 99%
“…Muhammad Asif et al [14] proposed a technique to ensure privacy of medical data especially against the threats emerging internally within SHS. The system allows access only for authorized users such as doctors and patients to communicate across the physical boundaries.…”
Section: Privacy-preservingmentioning
confidence: 99%