Fog Computing using Interoperability and IoT Security Issues in Health Care

Author(s):  
P. Karthika ◽  
R. Ganesh Babu ◽  
P. A. Karthik
Author(s):  
Aman Tyagi

Elderly population in the Asian countries is increasing at a very fast rate. Lack of healthcare resources and infrastructure in many countries makes the task of provding proper healthcare difficult. Internet of things (IoT) in healthcare can address the problem effectively. Patient care is possible at home using IoT devices. IoT devices are used to collect different types of data. Various algorithms may be used to analyse data. IoT devices are connected to the internet and all the data of the patients with various health reports are available online and hence security issues arise. IoT sensors, IoT communication technologies, IoT gadgets, components of IoT, IoT layers, cloud and fog computing, benefits of IoT, IoT-based algorithms, IoT security issues, and IoT challenges are discussed in the chapter. Nowadays global epidemic COVID19 has demolished the economy and health services of all the countries worldwide. Usefulness of IoT in COVID19-related issues is explained here.


2020 ◽  
Vol 21 (3) ◽  
pp. 515-542
Author(s):  
Neelam Saleem Khan ◽  
Mohammad Ahsan Chishti

As the IoT is moving out of its early stages, it is emerging as an area of future internet. The evolving communication paradigm among cloud servers, Fog nodes and IoT devices are establishing a multilevel communication infrastructure. Fog provides a platform for IoT along with other services like networking, storage and computing. With the tremendous expansion of IoT, security threats also arise. These security hazards cannot be addressed by mere dependence on cloud model. In this paper we present an overview of security landscape of Fog computing, challenges, and, existing solutions. We outline major authentication issues in IoT, map their existing solutions and further tabulate Fog and IoT security loopholes. Furthermore this paper presents Blockchain, a decentralized distributed technology as one of the solutions for authentication issues in IoT. We tried to discuss the strength of Blockchain technology, work done in this field, its adoption in COVID-19 fight and tabulate various challenges in Blockchain technology. At last we present the Cell Tree architecture as another solution to address some of the security issues in IoT, outlined its advantages over Blockchain technology and tabulated some future course to stir some attempts in this area.


Author(s):  
Okolie S.O. ◽  
Kuyoro S.O. ◽  
Ohwo O. B

Cyber-Physical Systems (CPS) will revolutionize how humans relate with the physical world around us. Many grand challenges await the economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defence, aerospace and buildings. Exploration of these potentialities around space and time would create applications which would affect societal and economic benefit. This paper looks into the concept of emerging Cyber-Physical system, applications and security issues in sustaining development in various economic sectors; outlining a set of strategic Research and Development opportunities that should be accosted, so as to allow upgraded CPS to attain their potential and provide a wide range of societal advantages in the future.


2020 ◽  
pp. 16-30
Author(s):  
Mukesh Soni ◽  
◽  
◽  
◽  
YashKumar Barot ◽  
...  

Health care information has great potential for improving the health care system and also providing fast and accurate outcomes for patients, predicting disease outbreaks, gaining valuable information for prediction in future, preventing such diseases, reducing healthcare costs, and improving overall health. In any case, deciding the genuine utilization of information while saving the patient's identity protection is an overwhelming task. Regardless of the amount of medical data it can help advance clinical science and it is essential to the accomplishment of all medicinal services associations, at the end information security is vital. To guarantee safe and solid information security and cloud-based conditions, It is critical to consider the constraints of existing arrangements and systems for the social insurance of information security and assurance. Here we talk about the security and privacy challenges of high-quality important data as it is used mainly by the healthcare structure and similar industry to examine how privacy and security issues occur when there is a large amount of healthcare information to protect from all possible threats. We will discuss ways that these can be addressed. The main focus will be on recently analyzed and optimized methods based on anonymity and encryption, and we will compare their strengths and limitations, and this chapter closes at last the privacy and security recommendations for best practices for privacy of preprocessing healthcare data.


2021 ◽  
Vol 20 (Supp01) ◽  
pp. 2140001
Author(s):  
Bremnavas Ismail Mohideen ◽  
Basem Assiri

In recent decades, the communication of electronic equipment and physical resources is combined. Internet of Things (IoT) distributes things widely in the network. The IoT is Internet-based pervasive computing, which created significant development in the recent disposition of IoT infrastructures. The IoT infrastructures lead, manage and generate large amounts of data across various applications including environmental, transportation and healthcare monitoring. In this regard, there are salient uncertainties about the use of security concepts that are frequently measured as a major concern of IoT distributed architecture design. This paper mainly focuses on the classification of IoT, novel architecture considering the sensitivity of data, IoT security layers, review of security issues and acclaimed countermeasures.


Author(s):  
Israa Al_Barazanchi ◽  
Aparna Murthy ◽  
Ahmad AbdulQadir Al Rababah ◽  
Ghadeer Khader ◽  
Haider Rasheed Abdulshaheed ◽  
...  

Blockchain innovation has picked up expanding consideration from investigating and industry over the later a long time. It permits actualizing in its environment the smart-contracts innovation which is utilized to robotize and execute deals between clients. Blockchain is proposed nowadays as the unused specialized foundation for a few sorts of IT applications. Blockchain would aid avoid the duplication of information because it right now does with Bitcoin and other cryptocurrencies. Since of the numerous hundreds of thousands of servers putting away the Bitcoin record, it’s impossible to assault and alter. An aggressor would need to change the record of 51 percent of all the servers, at the precise same time. The budgetary fetched of such an assault would distantly exceed the potential picks up. The same cannot be said for our private data that lives on single servers possessed by Google and Amazon. In this paper, we outline major Blockchain technology that based as solutions for IOT security. We survey and categorize prevalent security issues with respect to IoT data privacy, in expansion to conventions utilized for organizing, communication, and administration. We diagram security necessities for IoT together with the existing scenarios for using blockchain in IoT applications.


Sign in / Sign up

Export Citation Format

Share Document