scholarly journals Security and Privacy in IoT-Cloud-Based e-Health Systems—A Comprehensive Review

Symmetry ◽  
2020 ◽  
Vol 12 (7) ◽  
pp. 1191 ◽  
Author(s):  
Chanapha Butpheng ◽  
Kuo-Hui Yeh ◽  
Hu Xiong

When the Internet and other interconnected networks are used in a health system, it is referred to as “e-Health.” In this paper, we examined research studies from 2017–2020 to explore the utilization of intelligent techniques in health and its evolution over time, particularly the integration of Internet of Things (IoT) devices and cloud computing. E-Health is defined as “the ability to seek, find, understand and appraise health information derived from electronic sources and acquired knowledge to properly solve or treat health problems. As a repository for health information as well as e-Health analysis, the Internet has the potential to protect consumers from harm and empower them to participate fully in informed health-related decision-making. Most importantly, high levels of e-Health integration mitigate the risk of encountering unreliable information on the Internet. Various research perspectives related to security and privacy within IoT-cloud-based e-Health systems are examined, with an emphasis on the opportunities, benefits and challenges of the implementation such systems. The combination of IoT-based e-Health systems integrated with intelligent systems such as cloud computing that provide smart objectives and applications is a promising future trend.

10.2196/15099 ◽  
2020 ◽  
Vol 22 (6) ◽  
pp. e15099 ◽  
Author(s):  
Winja Weber ◽  
Anne Reinhardt ◽  
Constanze Rossmann

Background As a result of demographic changes, the number of people aged 60 years and older has been increasing steadily. Therefore, older adults have become more important as a target group for health communication efforts. Various studies show that online health information sources have gained importance among younger adults, but we know little about the health-related internet use of senior citizens in general and in particular about the variables explaining their online health-related information–seeking behavior. Media use studies indicate that in addition to sociodemographic variables, lifestyle factors might play a role in this context. Objective The aim of this study was to examine older people’s health-related internet use. Our study focused on the explanatory potential of lifestyle types over and above sociodemographic variables to predict older adults’ internet use for health information. Methods A telephone survey was conducted with a random sample of German adults aged 60 years and older (n=701) that was quota-allocated by gender, age, educational status, and degree of urbanity of their place of residence. Results The results revealed that participants used the internet infrequently (mean 1.82 [SD 1.07]), and medical personnel (mean 2.89 [SD 1.11]), family and friends (mean 2.86 [SD 1.21]), and health brochures (mean 2.85 [SD 1.21]) were their main sources of health information. A hierarchical cluster analysis based on values, interests, and leisure time activities revealed three different lifestyle types for adults aged over 60 years: the Sociable Adventurer, the Average Family Person, and the Uninterested Inactive. After adding these types as second-step predictors in a hierarchical regression model with sociodemographic variables (step 1), the explained variance increased significantly (R2=.02, P=.001), indicating that the Average Family Person and the Sociable Adventurer use the internet more often for health information than the Uninterested Inactive, over and above their sociodemographic attributes. Conclusions Our findings indicate that the internet still plays only a minor role in the health information–seeking behavior of older German adults. Nevertheless, there are subgroups including younger, more active, down-to-earth and family-oriented males that may be reached with online health information. Our findings suggest that lifestyle types should be taken into account when predicting health-related internet use behavior.


Author(s):  
Hicham Amellal ◽  
Abdelmajid Meslouhi ◽  
Abderahim El Allati ◽  
Annas El Haddadi

With the advancement of communication and information technology, the internet has become used as a platform for computing and not only a way of communications networks. Accordingly, the large spread of cloud computing led to the emergence of different privacy implications and data security complexities. In order to enhance data security in the cloud, the authors propose in this chapter the use of an encryption box, which includes different cryptosystems. In fact, this step gives the user the opportunities to encrypt data with an unknown algorithm and makes a private key before the storage of data in the host company servers. Moreover, to manage the encryption database, the authors propose a quantum approach in search based on Grover's algorithm.


Author(s):  
Kleopatra Alamantariotou

Recent statistics show that the World Wide Web has now grown to over 100 million sites: a phenomenal expansion in only 15 years (Mulligan 2007). It has been estimated that there are 100,000 sites offering health related information (Wilson 2002). As the amount of health information increases, the public find it increasingly difficult to decide what to accept and what to reject (Burgess 2007). Searching for information on the internet is both deceptively easy and the same time frustratingly difficult (Kiley 2002). The challenge for consumers is to find high quality, relevant information as quickly as possible. There has been ongoing debate about the quality of information aimed at patients and the general public and opinions differ on how it can be improved (Stepperd 1999). The purpose of this chapter is to provide a brief overview of the different perspectives on information quality and to review the main criteria for assessing the quality of health information on the internet. Pointers are provided to enable both clinicians and patients find high quality information sources. An understanding of these issues should help health professionals and patients to make effective use of the internet.


Author(s):  
Aakanksha Tewari ◽  
Brij B. Gupta

Internet of Things (IoT) is playing more and more important roles in our daily lives in the last decade. It can be a part of traditional machine or equipment to daily household objects as well as wireless sensor networks and devices. IoT has a huge potential which is still to be unleashed. However, as the foundation of IoT is the Internet and all the data collected by these devices is over the Internet, these devices also face threats to security and privacy. At the physical or sensor layer of IoT devices the most commonly used technology is RFID. Thus, securing the RFID tag by cryptographic mechanisms can secure our data at the device as well as during communication. This article first discusses the flaws of our previous ultra-lightweight protocol due to its vulnerability to passive secret disclosure attack. Then, the authors propose a new protocol to overcome the shortcomings of our previous work. The proposed scheme uses timestamps in addition to bitwise operation to provide security against de-synchronization and disclosure. This research also presents a security and performance analysis of our approach and its comparison with other existing schemes.


2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


Subject IoT ecosystem. Significance The market for the Internet of Things (IoT) or connected devices is expanding rapidly, with no manufacturer currently forecast to dominate the supply chain. This has fragmented the emerging IoT ecosystem, triggering questions about interoperability and cybersecurity of IoT devices. Impacts Firms in manufacturing, transportation and logistics and utilities are expected to see the highest IoT spending in coming years. The pace of IoT adoption is inextricably linked to that of related technologies such as 5G, artificial intelligence and cloud computing. Data privacy and security will be the greatest constraint to IoT adoption.


Author(s):  
Rushikesh Umak

Cloud based healthcare computing have changed the face of healthcare in many ways. The main advantages of cloud computing in healthcare are scalability of the required service and the provision to upscale or downsize the data storge, collaborating Artificial Intelligence (AI) and machine learning. The current paper examined various research studies to explore the utilization of intelligent techniques in health systems and mainly focused into the security and privacy issues in the current technologies. E-Healthcare is an emerging field of medical informatics, referring to the delivery of health services and information using the Internet and related technologies. Rendering efficient storage and security for all data is very important for cloud computing. Securing and privacy preserving of data is of high priority when it comes to cloud storage. E-Healthcare is the most important source in the healthcare society. E-healthcare system is now being popularized globally. Implementing the E-healthcare system will have more advantages such as online services for teleconsultation (second medical opinion), e-prescription, e-referral, telemonitoring, telecare etc. E-healthcare system provides high level of security and cost-effective use of patients records, information and communication in support of healthcare and health related issues.


2021 ◽  
Vol 5 (Supplement_1) ◽  
pp. 660-660
Author(s):  
Matthew Picchiello ◽  
Payton Rule ◽  
Tina Lu ◽  
Brian Carpenter

Abstract Nearly 60% of older adults use the internet for health-related reasons. Some studies have demonstrated differences in the frequency at which men and women perform various online activities. However, few studies have investigated gender differences in health-related search behaviors (HRSB). The purpose of this study was to examine differences in self-reported HRSB between older men and women. A total of 47 older adults (M age = 66.6, 55% female, 87% White) completed a survey assessing perceived usefulness and trust in the internet for health-care information, types of websites used, and reasons for looking up health information. Independent samples t-tests revealed that, compared to women, men regard the internet as more useful in helping them make health care decisions (t (45) = 2.715) and as a more trustworthy source (t (45) = 2.24, p's < 0.05). Men were more likely to get health information through sources affiliated with educational institutions (χ2(1) = 3.9) and government agencies (χ2(1) = 8.8), whereas women were more likely to use social media, (χ2(1) = 4.3, p's < 0.05). Lastly, men were more likely to use the internet to learn about information on medical procedures (χ2(1) = 5.1), while women were more likely to learn about alternative treatments (χ2(1) = 4.9, p 's < 0.05) online. As 72.3% of participants indicated the internet as their first source for health information, interventions geared towards enhancing HRSB for older adults are needed, especially for older women whose HRSB may make them particularly vulnerable to misinformation.


2019 ◽  
Author(s):  
Winja Weber ◽  
Anne Reinhardt ◽  
Constanze Rossmann

BACKGROUND As a result of demographic changes, the number of people aged 60 years and older has been increasing steadily. Therefore, older adults have become more important as a target group for health communication efforts. Various studies show that online health information sources have gained importance among younger adults, but we know little about the health-related internet use of senior citizens in general and in particular about the variables explaining their online health-related information–seeking behavior. Media use studies indicate that in addition to sociodemographic variables, lifestyle factors might play a role in this context. OBJECTIVE The aim of this study was to examine older people’s health-related internet use. Our study focused on the explanatory potential of lifestyle types over and above sociodemographic variables to predict older adults’ internet use for health information. METHODS A telephone survey was conducted with a random sample of German adults aged 60 years and older (n=701) that was quota-allocated by gender, age, educational status, and degree of urbanity of their place of residence. RESULTS The results revealed that participants used the internet infrequently (mean 1.82 [SD 1.07]), and medical personnel (mean 2.89 [SD 1.11]), family and friends (mean 2.86 [SD 1.21]), and health brochures (mean 2.85 [SD 1.21]) were their main sources of health information. A hierarchical cluster analysis based on values, interests, and leisure time activities revealed three different lifestyle types for adults aged over 60 years: the Sociable Adventurer, the Average Family Person, and the Uninterested Inactive. After adding these types as second-step predictors in a hierarchical regression model with sociodemographic variables (step 1), the explained variance increased significantly (<i>R</i><sup>2</sup>=.02, <i>P</i>=.001), indicating that the Average Family Person and the Sociable Adventurer use the internet more often for health information than the Uninterested Inactive, over and above their sociodemographic attributes. CONCLUSIONS Our findings indicate that the internet still plays only a minor role in the health information–seeking behavior of older German adults. Nevertheless, there are subgroups including younger, more active, down-to-earth and family-oriented males that may be reached with online health information. Our findings suggest that lifestyle types should be taken into account when predicting health-related internet use behavior.


2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
Maria-Dolores Cano ◽  
Antonio Cañavate-Sanchez

The disclosure of personal and private information is one of the main challenges of the Internet of Medical Things (IoMT). Most IoMT-based services, applications, and platforms follow a common architecture where wearables or other medical devices capture data that are forwarded to the cloud. In this scenario, edge computing brings new opportunities to enhance the operation of IoMT. However, despite the benefits, the inherent characteristics of edge computing require countermeasures to address the security and privacy issues that IoMT gives rise to. The restrictions of IoT devices in terms of battery, memory, hardware resources, or computing capabilities have led to a common agreement for the use of elliptic curve cryptography (ECC) with hardware or software implementations. As an example, the elliptic curve digital signature algorithm (ECDSA) is widely used by IoT devices to compute digital signatures. On the other hand, it is well known that dual signature has been an effective method to provide consumer privacy in classic e-commerce services. This article joins both approaches. It presents a novel solution to enhanced security and the preservation of data privacy in communications between IoMT devices and the cloud via edge computing devices. While data source anonymity is achieved from the cloud perspective, integrity and origin authentication of the collected data is also provided. In addition, computational requirements and complexity are kept to a minimum.


Sign in / Sign up

Export Citation Format

Share Document