Digital Health or Internet of Things in Tele-Health: A Survey of Security Issues, Security Attacks, Sensors, Algorithms, Data Storage, Implementation Platforms, and Frameworks

Author(s):  
Nadeesha D. Hettikankanamage ◽  
Malka N. Halgamuge
Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2784 ◽  
Author(s):  
Chao Qu ◽  
Ming Tao ◽  
Ruifen Yuan

With the fast development and expansion of the Internet of Things (IoT), billions of smart devices are being continuously connected, and smart homes, as a typical IoT application, are providing people with various convenient applications, but face security and privacy issues. The idea of Blockchain (BC) theory has brought about a potential solution to the IoT security problem. The emergence of blockchain technology has brought about a change of decentralized management, providing an effective solution for the protection of network security and privacy. On the other hand, the smart devices in IoT are always lightweight and have less energy and memory. This makes the application of blockchain difficult. Against this background, this paper proposes a blockchain model based on hypergraphs. The aims of this model are to reduce the storage consumption and to solve the additional security issues. In the model, we use the hyperedge as the organization of storage nodes and convert the entire networked data storage into part network storage. We discuss the design of the model and security strategy in detail, introducing some use cases in a smart home network and evaluating the storage performance of the model through simulation experiments and an evaluation of the network.


Author(s):  
G. Ikrissi ◽  
T. Mazri

Abstract. Smart environments provide many benefits to the users including comfort, convenience, energy efficiency, safety, automation, and service quality. The Internet of Things (IoT) has developed to become one of the widely used technologies in smart environments. Many security attacks and threats are generated by security flaws in IoT-based systems and devices, which may affect smart environments applications. As a result, security is one of the most important issues in any smart area or environment based on the IoT model. This paper presents an overview of smart environments based on IoT technology and highlights the main security issues and countermeasures in the four layers of smart environment IoT architecture. It also reviews some of the current solutions that ensure the security of information in smart environments applications.


Author(s):  
Uppuluri Sirisha ◽  
G. Lakshme Eswari

This paper briefly introduces Internet of Things(IOT) as a intellectual connectivity among the physical objects or devices which are gaining massive increase in the fields like efficiency, quality of life and business growth. IOT is a global network which is interconnecting around 46 million smart meters in U.S. alone with 1.1 billion data points per day[1]. The total installation base of IOT connecting devices would increase to 75.44 billion globally by 2025 with a increase in growth in business, productivity, government efficiency, lifestyle, etc., This paper familiarizes the serious concern such as effective security and privacy to ensure exact and accurate confidentiality, integrity, authentication access control among the devices.


2018 ◽  
Vol 3 (2) ◽  
pp. 74
Author(s):  
Helina Apriyani ◽  
Sismadi Sismadi ◽  
Sefrika Sefrika

AbstrakInternet of things (IoT) adalah sebuah konsep yang menghubungkan komputer dan perangkat elektronik melalui internet dan dapat dikendalikan dari jarak jauh. Konsep terpenting dalam Internet of things (Iot) adalah modul sistem informasi, koneksi internet dan penyimpanan datanya dalam cloud computing. Konsep ini memiliki manfaat besar dalam perkembangan usaha dan kelangsungan bisnis perusahaan dimana hampir semua bidang menggunakan IoT untuk dapat bersaing di pasaran. Indonesia merupakan sebuah negara yang dianugerahi kekayaan alam yang melimpah ruah. Salah satu komoditi unggulan adalah produk pertanian. Penelitian ini bertujuan untuk membantu para petani dalam memasarkan produknya melalui e-commerce dengan menggunakan konsep Internet of things IoT. Metode penelitian dengan menggunakan metode incremental.  Incremental digunakan untuk mendesai produk, kemudian  diimplementasikan, dan diuji secara bertahap (setiap modul akan ditambahkan bertahap) hingga produk selesai. Hasil penelitian ini digunakan untuk membantu petani di Kabupaten Bogor untuk mendistribusikan penjualannya secara luas, meningkatkan revenue dan memutus rantai panjang proses penjualan. Kata kunci— sistem penjualan, incremental, Internet of Things (IoT), produk pertanian, Kabupaten Bogor Abstract Internet of things (IoT) is a concept that connects computers and electronic devices via the internet and can be controlled remotely. The main concept in Internet of things (IoT) is information systems, internet connections and data storage in cloud computing. This concept has great benefits in the efforts and efforts used to use IoT to be able to compete in the market. Indonesia is a country that is blessed with abundant natural resources. One of the leading commodities is agricultural products. This study aims to help farmers market their products through e-commerce using the IoT Internet of things concept. Research method using incremental method. Incremental to design the product, then implemented, and gradually delay (each module will be added gradually) until the product is finished. The results of this study are to help farmers in Bogor Regency to distribute sales widely, increase revenue and break the sales process. Keywords—sales system, incremental, Internet of Things (IoT), agricultural products, Kabupaten Bogor


2018 ◽  
Vol 6 (3) ◽  
pp. 359-363
Author(s):  
A. Saxena ◽  
◽  
S. Sharma ◽  
S. Dangi ◽  
A. Sharma ◽  
...  

2017 ◽  
Vol 7 (1.1) ◽  
pp. 64 ◽  
Author(s):  
S. Renu ◽  
S.H. Krishna Veni

The Cloud computing services and security issues are growing exponentially with time. All the CSPs provide utmost security but the issues still exist. Number of technologies and methods are emerged and futile day by day. In order to overcome this situation, we have also proposed a data storage security system using a binary tree approach. Entire services of the binary tree are provided by a Trusted Third Party (TTP) .TTP is a government or reputed organization which facilitates to protect user data from unauthorized access and disclosure. The security services are designed and implemented by the TTP and are executed at the user side. Data classification, Data Encryption and Data Storage are the three vital stages of the security services. An automated file classifier classify unorganized files into four different categories such as Sensitive, Private, Protected and Public. Applied cryptographic techniques are used for data encryption. File splitting and multiple cloud storage techniques are used for data outsourcing which reduces security risks considerably. This technique offers  file protection even when the CSPs compromise. 


Sign in / Sign up

Export Citation Format

Share Document