2015
DOI: 10.19026/rjaset.9.2638
|View full text |Cite
|
Sign up to set email alerts
|

Protecting E-healthcare Data Privacy for Internet of Things Based Wireless Body Area Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Some examples of big data collection may seem mundane. Currently, most smartphones are enabled with location sensors, providing real-time data to be collected on an individual's whereabouts and activities (Rghioui, et al, 2015). As more devices are enabled to provide similar information, we observe that cars also provide data on location, while household efficiency and security protection are connected to handheld devices.…”
Section: Big Data and Individual Privacy In The Age Of The Internet Omentioning
confidence: 91%
“…Some examples of big data collection may seem mundane. Currently, most smartphones are enabled with location sensors, providing real-time data to be collected on an individual's whereabouts and activities (Rghioui, et al, 2015). As more devices are enabled to provide similar information, we observe that cars also provide data on location, while household efficiency and security protection are connected to handheld devices.…”
Section: Big Data and Individual Privacy In The Age Of The Internet Omentioning
confidence: 91%
“…The creation and use of big data constitute various information privacy-related risks, such as data breach, de-anonymization, and the transferal of information to third parties. Researchers have identified that IoT-based devices that track and analyze extensive user data often lack careful consideration of data security, leading to data breach problems (e.g., Rghioui, Aziza, Elouaai & Bouhorma, 2015). In addition, one of the major challenges in IoT is designing a security system guaranteeing the complete anonymity of collected data to ensure user privacy (e.g., Sanchez, Bernabe & Skarmeta, 2018).…”
Section: Privacy Downsides Of Iotmentioning
confidence: 99%
“…Amplification of these risks to individual privacy are sometimes associated with the Internet of Things (IoT), because the IoT enables digital devices of many kinds to connect with local and virtual networks, communicating automatically with other devices, while continuously generating data (Borgohain, Kuman, & Sanyal, 2015). For example, smartphones are equipped with location-based sensors, generating real-time data about human time-space paths (Rghioui, Aziza, Elouaai, & Bouhorma, 2015). Even in countries where technologies are less accessible, mobile telecommunications services have expanded, as marketers use a plethora of applications that draw on global information systems (GIS) services to inform and enhance the capabilities of the user experience and the functionality of the device (Hayes, 2014, p. 50).…”
Section: Privacy and Dataveillancementioning
confidence: 99%