2022
DOI: 10.1007/s41870-022-00997-8
|View full text |Cite
|
Sign up to set email alerts
|

Security framework to healthcare robots for secure sharing of healthcare data from cloud

Abstract: Healthcare robots have the potential to assist medical practitioners in accurately performing tasks such as nursing, diagnosing, and performing critical surgeries. Limited processing, battery power, and storage capacity may reduce the robot's working efficiency. Using cloud services (massive storage, fast processing, and network) overcome the above-mentioned issues. However, sharing healthcare data from the cloud to healthcare robots raises security concerns. Sharing sensitive healthcare data, from the cloud t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…This way, if there were changes to the data, they would be detected. Furthermore, Jain and Doriya [15] introduced a security framework aimed at facilitating the secure download of healthcare data from cloud platforms. Central to their proposed framework was a data auditing mechanism, necessary for ensuring data integrity.…”
Section: Principle Of Cryptographic Hash Functionsmentioning
confidence: 99%
See 1 more Smart Citation
“…This way, if there were changes to the data, they would be detected. Furthermore, Jain and Doriya [15] introduced a security framework aimed at facilitating the secure download of healthcare data from cloud platforms. Central to their proposed framework was a data auditing mechanism, necessary for ensuring data integrity.…”
Section: Principle Of Cryptographic Hash Functionsmentioning
confidence: 99%
“…Notably, investigations conducted between 2020 and 2023 seemingly explored the utilization of machine learning techniques, particularly the CNN algorithm, for detecting data modification. However, it is noteworthy that only studies [15] and [28] have integrated hash functions into their methodologies, albeit in approaches distinct from what is proposed in our research. Specifically, [15] utilized a hash function to ascertain the completeness and integrity of downloaded files from the cloud, while [28] employed a hash function for the creation of a hash table aimed at content identification.…”
Section: Principle Of Cryptographic Hash Functionsmentioning
confidence: 99%
“…Main solutions to ensure data security in health care include educating healthcare staff about security, restricting access based on roles, implementing data usage controls, monitoring data usage, encrypting data at rest and in transit, securing mobile devices, addressing risks from connected devices, conducting regular risk assessments, maintaining encrypted offline backups, and staying vigilant about software vulnerabilities through patches and updates [200][201][202][203][204][205].…”
Section: Ethical Considerations and Challenges In Implementing Ai And...mentioning
confidence: 99%
“…Blockchain can be thought of as a record that exists within a system and preserves certain sources of evidence on each end. In other words, a blockchain is an electronic method of data storage that cannot be altered, hacked, or scammed [1]. Blockchain is therefore used to securely store specific types of data, while machine learning is used for other purposes.…”
Section: Introductionmentioning
confidence: 99%