Identifying the Emerging e-Health Technologies To Ubiquity 2.0 and Beyond

Author(s):  
Sabah Mohammed ◽  
Jinan Fiaidhi

Achieving improvements and optimum healthcare delivery has become a bipartisan top priority for several governments and institutions. The ability to meet this goal depends on the exchange of information within and across healthcare communities. The real challenge for any healthcare initiative is at the application level, where patient data may be stored on hundreds of different clinical systems such as lab, radiology, or pharmacy systems, and various clinical applications such as electronic medical record (EHRs), that use different protocols and schemas. In an attempt to overcome these challenges, many organizations have used enterprise-oriented integration platforms to transform and translate information so that disparate systems could exchange information internally and externally. However, the development and ongoing maintenance of such healthcare systems has become extremely expensive due to the growing complexity of healthcare organizations as they acquire more systems to meet clinical and business needs. As a result, healthcare communities continue to face the same challenge: how to achieve a level of interoperability for accessing all relevant information about a patient from a single point, which is universally becoming the Web, as well as to ensure accuracy, security, and privacy of all the relevant data. This chapter provides a roadmap solution based on the emerging web technologies that hold great promise for addressing these challenges. The roadmap is termed as the “ubiquity 2.0 trend.” This chapter also highlights the security challenges and the emerging web-oriented identity management technologies to provide a single, common user credential that is trusted, secure, and widely supported across the Web and within the healthcare enterprises.

2011 ◽  
pp. 1437-1461 ◽  
Author(s):  
Rui Lopes ◽  
Luís Carriço

Web Accessibility is a hot topic today. Striving for social inclusion has resulted in the requirement of providing accessible content to all users. However, since each user is unique, and the Web evolves in a decentralized way, little or none is known about the shape of the Web’s accessibility on its own at a large scale, as well as from the point-of-view of each user. In this chapter the authors present the Web Accessibility Knowledge Framework as the foundation for specifying the relevant information about the accessibility of a Web page. This framework leverages Semantic Web technologies, side by side with audience modeling and accessibility metrics, as a way to study the Web as an entity with unique accessibility properties dependent from each user’s point of view. Through this framework, the authors envision a set of queries that can help harnessing and inferring this kind of knowledge from Web graphs.


Author(s):  
Rui Lopes ◽  
Luís Carriço

Web Accessibility is a hot topic today. Striving for social inclusion has resulted in the requirement of providing accessible content to all users. However, since each user is unique, and the Web evolves in a decentralized way, little or none is known about the shape of the Web’s accessibility on its own at a large scale, as well as from the point-of-view of each user. In this chapter the authors present the Web Accessibility Knowledge Framework as the foundation for specifying the relevant information about the accessibility of a Web page. This framework leverages Semantic Web technologies, side by side with audience modeling and accessibility metrics, as a way to study the Web as an entity with unique accessibility properties dependent from each user’s point of view. Through this framework, the authors envision a set of queries that can help harnessing and inferring this kind of knowledge from Web graphs.


2016 ◽  
Vol 9 (3) ◽  
pp. 157 ◽  
Author(s):  
Esmaeil Mehraeen ◽  
Marjan Ghazisaeedi ◽  
Jebraeil Farzi ◽  
Saghar Mirshekari

<p><strong>BACKGROUND:</strong> Healthcare data are very sensitive records that should not be made available to unauthorized people in order for protecting patient's information security. However, in progressed technologies as cloud computing which are vulnerable to cyber gaps that pose an adverse impact on the security and privacy of patients’ electronic health records and in these situations, security challenges of the wireless networks need to be carefully understood and considered. Recently, security concerns in cloud computing environment are a matter of challenge with rising importance.</p><p><strong>OBJECTIVE:</strong> In this study a systematic review to investigate the security challenges in cloud computing was carried out. We focused mainly on healthcare cloud computing security with an organized review of 210 full text articles published between 2000 and 2015.</p><p><strong>METHOD:</strong> A systematic literature review was conducted including PubMed, Science direct, Embase, ProQuest, Web of science, Cochrane, Emerald, and Scopus databases.</p><p><strong>FINDINGS:</strong> Using the strategies described, 666 references retrieved (for research question one 365, research question two 201, and research question three 100 references).</p><p><strong>IMPROVEMENTS:</strong> Review of articles showed that for ensuring healthcare data security, it is important to provide authentication, authorization and access control within cloud's virtualized network. Issues such as identity management and access control, Internet-based access, authentication and authorization and cybercriminals are major concerns in healthcare cloud computing. To manage these issues<strong> </strong>many involved events such as Hybrid Execution Model, VCC-SSF, sHype Hypervisor Security Architecture, Identity Management, and Resource Isolation approaches<em> </em>have to be defined for using cloud computing threat management processes.</p>


Author(s):  
Patrick Maué ◽  
Sven Schade

Geospatial decision makers have to be aware of the varying interests of all stakeholders. One crucial task in the process is to identify relevant information available from the Web. In this chapter the authors introduce an application in the quarrying domain which integrates Semantic Web technologies to provide new ways to discover and reason about relevant information. The authors discuss the daily struggle of the domain experts to create decision-support maps helping to find suitable locations for opening up new quarries. After explaining how semantics can help these experts, they introduce the various components and the architecture of the software which has been developed in the European funded SWING project. In the last section, the different use cases illustrate how the implemented tools have been applied to real world scenarios.


2014 ◽  
Vol 2014 ◽  
pp. 1-17 ◽  
Author(s):  
Eghbal Ghazizadeh ◽  
Mazdak Zamani ◽  
Jamalul-lail Ab Manan ◽  
Mojtaba Alizadeh

Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.


2019 ◽  
Vol 9 (15) ◽  
pp. 2953 ◽  
Author(s):  
Jamila Alsayed Kassem ◽  
Sarwar Sayeed ◽  
Hector Marco-Gisbert ◽  
Zeeshan Pervez ◽  
Keshav Dahal

Identity management (IdM) is a method used to determine user identities. The centralized aspect of IdM introduces a serious concern with the growing value of personal information, as well as with the General Data Protection Regulation (GDPR). The problem with currently-deployed systems and their dominating approach, with identity providers (IdP) and single-point services, is that a third party is in charge of maintaining and controlling the personal data. The main challenge to manage data securely lies in trusting humans and institutes who are responsible for controlling the entire activity. Identities are not owned by the rightful owners or the user him/herself, but by the mentioned providers. With the rise of blockchain technology, self-sovereign identities are in place utilizing decentralization; unfortunately, the flaws still exist. In this research, we propose DNS-IdM, a smart contract-based identity management system that enables users to maintain their identities associated with certain attributes, accomplishing the self-sovereign concept. DNS-IdM has promising outcomes in terms of security and privacy. Due to the decentralized nature, DNS-IdM is able to avoid not only the conventional security threats, but also the limitations of the current decentralized identity management systems.


2009 ◽  
Vol 11 (4) ◽  
pp. 100-122 ◽  
Author(s):  
Patrick Maué ◽  
Sven Schade

Geospatial decision makers have to be aware of the varying interests of all stakeholders. One crucial task in the process is to identify relevant information available from the Web. In this chapter the authors introduce an application in the quarrying domain which integrates Semantic Web technologies to provide new ways to discover and reason about relevant information. The authors discuss the daily struggle of the domain experts to create decision-support maps helping to find suitable locations for opening up new quarries. After explaining how semantics can help these experts, they introduce the various components and the architecture of the software which has been developed in the European funded SWING project. In the last section, the different use cases illustrate how the implemented tools have been applied to real world scenarios.


2019 ◽  
Vol 14 ◽  
Author(s):  
Khaleel Ahmad ◽  
Afsar Kamal

Background: Privacy enhancing techniques are developed in order to provide strong protection to cyberspace. These techniques aim to allow users to keep their identities hidden during the communication when they are sending email, making payments online, browsing the Web or posting to newsgroups. MixNet is the most practical solution for concealing identities of message and sender’s identities. Objective: It provides sender and receiver anonymity as well as message security. The main goal of MixNet is to overcome vulnerability and enhance the performance of communication. It can efficiently handle the messages of various length and produce desirable results with privacy. The main objective of this paper is to acquire information and concepts regarding MixNet. We also provide guidelines for future research and references. Methods : The designing of MixNet depends on what cryptosystem method is used. Symmetric and Asymmetric both are used. Other methods could be also used such as PIR, CSP and FDR model, RPC, Token-based approach or others. Result: In this paper we provide an overview of MixNet approaches and presented a survey on MixNet based techniques and different models. We also constructed the comparison tables as per our requirements for better understanding. For this purpose, we found a total of 120 articles related to the MixNet published between 1990 and 2018 from the most relevant scientific resources. However, only 86 papers were analyzed due to comprehensiveness and relevancy to this article. Conclusion: Focused on the security and privacy of communication and how it can be achieved. This survey also reveals research progress and research gap on MixNet.


2021 ◽  
Vol 20 (2) ◽  
pp. 1-24
Author(s):  
Stef Verreydt ◽  
Koen Yskout ◽  
Wouter Joosen

Electronic consent (e-consent) has the potential to solve many paper-based consent approaches. Existing approaches, however, face challenges regarding privacy and security. This literature review aims to provide an overview of privacy and security challenges and requirements proposed by papers discussing e-consent implementations, as well as the manner in which state-of-the-art solutions address them. We conducted a systematic literature search using ACM Digital Library, IEEE Xplore, and PubMed Central. We included papers providing comprehensive discussions of one or more technical aspects of e-consent systems. Thirty-one papers met our inclusion criteria. Two distinct topics were identified, the first being discussions of e-consent representations and the second being implementations of e-consent in data sharing systems. The main challenge for e-consent representations is gathering the requirements for a “valid” consent. For the implementation papers, many provided some requirements but none provided a comprehensive overview. Blockchain is identified as a solution to transparency and trust issues in traditional client-server systems, but several challenges hinder it from being applied in practice. E-consent has the potential to grant data subjects control over their data. However, there is no agreed-upon set of security and privacy requirements that must be addressed by an e-consent platform. Therefore, security- and privacy-by-design techniques should be an essential part of the development lifecycle for such a platform.


2021 ◽  
Vol 13 (2) ◽  
pp. 24
Author(s):  
Mohammed Amine Bouras ◽  
Qinghua Lu ◽  
Sahraoui Dhelim ◽  
Huansheng Ning

Identity management is a fundamental feature of Internet of Things (IoT) ecosystem, particularly for IoT data access control. However, most of the actual works adopt centralized approaches, which could lead to a single point of failure and privacy issues that are tied to the use of a trusted third parties. A consortium blockchain is an emerging technology that provides a neutral and trustable computation and storage platform that is suitable for building identity management solutions for IoT. This paper proposes a lightweight architecture and the associated protocols for consortium blockchain-based identity management to address privacy, security, and scalability issues in a centralized system for IoT. Besides, we implement a proof-of-concept prototype and evaluate our approach. We evaluate our work by measuring the latency and throughput of the transactions while using different query actions and payload sizes, and we compared it to other similar works. The results show that the approach is suitable for business adoption.


Sign in / Sign up

Export Citation Format

Share Document