scholarly journals Privacy and Security of IoT Based Healthcare Systems: Concerns, Solutions, and Recommendations

Author(s):  
Ibrahim Sadek ◽  
Shafiq Ul Rehman ◽  
Josué Codjo ◽  
Bessam Abdulrazak
Author(s):  
Mirjana Maksimović

Nowhere do the technology advancements bring improvements than in the healthcare sector, constantly creating new healthcare applications and systems which completely revolutionize the healthcare domain. The appearance of Internet of Things (IoT) based healthcare systems has immensely improved quality and delivery of care, and significantly reduced the costs. At the same time, these systems generate the enormous amount of health-associated data which has to be properly gathered, analyzed and shared. The smart devices, as the components of IoT-driven healthcare systems, are not able to deal with IoT-produced data, neither data posting to the Cloud is the appropriate solution. To overcome smart devices’ and Cloud’s limitations the new paradigm, known as Fog computing, has appeared, where an additional layer processes the data and sends the results to the Cloud. Despite numerous benefits Fog computing brings into IoT-based environments, the privacy and security issues remain the main challenge for its implementation. The reasons for integrating the IoT-based healthcare system and Fog computing, benefits and challenges, as well as the proposition of simple low-cost system are presented in this paper.


2020 ◽  
Vol 9 (1) ◽  
pp. 2295-2299

There is exponential growth in the in the research industry of Internet of Things (IoT), but it is still vulnerable to privacy and security. Devices in the IoT having resourceconstraints and decentralized topology are not capable of conventional privacy and security approaches. The paper predominantly focuses on the survey in the IoT system. Where we can see the various issues in IoT. To overcome these issues researchers, use blockchain mechanism. Due to blockchain’s popularity and success this technology is incorporated into many other industries. Blockchain is a technology that is booming since a decade. Despite various advancements in blockchain there are issues that are still present in IoT that needs to undergo improvisation. Before going to design and implement a model based on blockchain it is essential to understand the issues and challenges met by earlier research works. The paper presents study on the previous challenges and the solutions which are presented to get rid of the problems. Some of the existing problems are as follows- When the data is collected from the IoT devices and stored using blockchain still the data is under constant threat due to lack of security mechanisms relating to authentication and data privacy. Hence, providing security to blockchain becomes of utmost importance. The goal of this paper is presenting a detailed survey of security mechanisms for IoT systems. Also, this survey examines and explores why providing security to IoT devices is important. Readers can ultimately get aware of the issues that are present in the IoT systems and how they can be overcome. The study is beneficial for those who are looking forward to deploying IoT applications. They can get to know what the prerequisites are to be met for a secure IoT system.


2021 ◽  
Vol 11 (21) ◽  
pp. 9977
Author(s):  
Daan Storm van Leeuwen ◽  
Ali Ahmed ◽  
Craig Watterson ◽  
Nilufar Baghaei

Faced with the biggest virus outbreak in a century, world governments at the start of 2020 took unprecedented measures to protect their healthcare systems from being overwhelmed in the light of the COVID-19 pandemic. International travel was halted and lockdowns were imposed. Many nations adopted measures to stop the transmission of the virus, such as imposing the wearing of face masks, social distancing, and limits on social gatherings. Technology was quickly developed for mobile phones, allowing governments to track people’s movements concerning locations of the virus (both people and places). These are called contact tracing applications. Contact tracing applications raise serious privacy and security concerns. Within Europe, two systems evolved: a centralised system, which calculates risk on a central server, and a decentralised system, which calculates risk on the users’ handset. This study examined both systems from a threat perspective to design a framework that enables privacy and security for contact tracing applications. Such a framework is helpful for App developers. The study found that even though both systems comply with the General Data Protection Regulation (GDPR), Europe’s privacy legislation, the centralised system suffers from severe risks against the threats identified. Experiments, research, and reviews tested the decentralised system in various settings but found that it performs better but still suffers from inherent shortcomings. User tracking and re-identification are possible, especially when users report themselves as infected. Based on these data, the study identified and validated a framework that enables privacy and security. The study also found that the current implementations using the decentralised Google/Apple API do not comply with the framework.


2022 ◽  
pp. 201-218
Author(s):  
J. Manga ◽  
V. J. K. Kishor Sonti

Internet of things is seen in many fields like civil engineering, consumer goods, oil and gas fields, smart cities, agriculture, etc. Apart from these, it is applicable to the medical field to detect and treat many kinds of diseases and can find the different health parameters quickly. It became important in the health sector to mitigate the challenges of health problems. Internet of things (IoT) is an amalgamation of pervasive computing, intelligent processing, and real-time response systems. Mechanics, devices, sensors make this machine-to-machine communication a feasible solution to dynamic requirements of tech-aspiring world. This chapter highlights the possibilities of further empowerment of healthcare systems using IoT or in other words IoMT (internet of medical things). Nanotechnology-driven IoT development or internet of nano things (IoNT) has become an added advantage in healthcare applications. So, IoNT with IoMT is another exciting research prospect of the near future. This chapter introduces a technique used in healthcare applications, PUF (physical unclonable function), and it is technique for solving many problems related to privacy and security. Security of data transmission, issues pertinent to reliability, and inter-operability are inherently affecting the progress of IoT-based healthcare systems. This chapter of focuses upon these issues and feasible solutions viewed from the dimension of technology-driven healthcare costs in the modern world and economic implications. The treatment used in this chapter will be more interesting for the casual readers. The analysis of IoMT implications in the near future will be helpful to the ardent learners. The research dimensions of IoT-empowered healthcare systems will add value to the thought process of young researchers.


2022 ◽  
pp. 239-260
Author(s):  
Aman Ahmad Ansari ◽  
Bharavi Mishra ◽  
Poonam Gera

The e-healthcare system maintains sensitive and private information about patients. In any e-healthcare system, exchanging health information is often required, making privacy and security a primary concern for e-healthcare systems. Another major issue is that existing e-healthcare systems use centralized servers. These centralized servers require high infrastructure and maintenance costs for day-to-day services. Along with that, server failure may affect the working of e-healthcare systems drastically and may create life-threatening situations for patients. Blockchain technology is a very useful way to provide decentralized, secure storage for healthcare information. A blockchain is a time-stamped series of immutable records of data that is managed by a cluster of computers not owned by any single entity. These blocks create a chain of immutable, tamper-proof blocks in a ledger. This chapter will discuss the different aspects of blockchain and its application in different fields of the e-healthcare system.


Author(s):  
Fernando Almeida ◽  
Justino Lourenço

Internet of things (IoT) is increasingly present in our lives. As a consequence of connecting devices, IoT can make people's lives more convenient and comfortable. However, despite unquestionable benefits offered by IoT, there is still a great deal of concern from users and companies about the security and privacy of their data. In this sense, this study conducts a qualitative study based on three case studies of companies in the IoT field, which aims to characterize how these IoT companies look at the security and privacy challenges posed by IoT. The findings allowed the authors to identify the main challenges faced by IoT companies during the past years, the main privacy risks exposed by IoT devices, and the countermeasures that companies and users can adopt to increase the security of IoT.


2021 ◽  
Vol 8 (12) ◽  
pp. 48-55
Author(s):  
Abdullah Mohammed Alodaynan ◽  
◽  
Adwan Alownie Alanazi ◽  

The security of healthcare servers and their applications from unauthorized access and hacking effect of patient file safety as a result of missing or modified data. Therefore, it is necessary to protect those servers and health systems and to know the cyber weaknesses in them and other related services to prevent them before they occur and treat them if they occur as soon as possible to reach the highest level of security and confidentiality of patient data and their privacy in addition to the safety of systems from malfunctions as a result of the attack. This research revolves around the concept of penetration and the motives of the attackers, in addition to the methods of penetration and vulnerability with mentioning some common attacks and clarifying their method of operation, and determining their effects on the victim. The research also deals with the most important basics and requirements to achieve privacy and security for health systems at different levels, including systems, users, and devices, with some intrusion protection techniques mentioned, and some challenges and solutions will be discussed in addition to some security issues in general, the research aims to gain the best level of security and privacy in the infrastructure of health systems.


Author(s):  
Nandhini Subramanian ◽  
Omar Elharrouss ◽  
Somaya Al-Maadeed

COVID-19 is a pandemic which has spread to all parts of the world. Detection of COVID infection is crucial to prevent the spread further. Contactless healthcare systems are essential which can be implemented with Cloud computing. Privacy and security of the medical image data transferred through untrusted channels cannot be ensured. The main aim is to secure the medical details when transferring them from the end device to the cloud and vice versa using image steganography. The medical lung images are masked under a normal and natural cover images.


Sign in / Sign up

Export Citation Format

Share Document