Feasible Challenges and Applications of IoT in Healthcare

Author(s):  
Seelam Vasavi Sai Viswanada Prabhu Kumar ◽  
Shyam Akashe ◽  
Hee-Je Kim

In this chapter, the major enhanced techniques of internet of healthcare things (IoHT) with wearable sensor technologies (WST), stationary medical devices (SMD), and integrated system technologies (IST) for heterogeneous healthcare professionals are explored. A detailed view of the system architecture for developing IoHT device and a lot of issues are also described. The latest innovative technologies are realistic to specific purposes in the field of healthcare assessment. Analysis, sensor, and data studies approach the opportunities to improve personal healthcare and benefits for the medical industry. The ultimate aim of succeeding superior healthcare practice is to competently combine with information from diverse bases, to allocate the accumulated data, to retrieve the collected data. Effective data analysis tools from data with initialed conception services are needed while maintaining their security and privacy. Healthcare professionals, patients, and clients can take benefit of the IoHT for giving personalized smart care guidelines or solutions for existing technologies.

2020 ◽  
Vol 289 (1) ◽  
pp. 12-28 ◽  
Author(s):  
S. Eloranta ◽  
K. E. Smedby ◽  
P. W. Dickman ◽  
T. M. Andersson

2021 ◽  
Author(s):  
Ayan Chatterjee ◽  
Andreas Prinz

UNSTRUCTURED The Internet of Medical Things (IoMT) combines medical devices and applications connected to healthcare information technology systems using network technologies. With the flourishing adaptation rate of Internet-enabled medical devices in healthcare applications, we need to guarantee the security and privacy of electronic health records (EHRs) and communications among these IoMT devices, exposed web services, and the underlying infrastructure. This research is a proof-of-concept (PoC) study for implementing an integrated security solution with Spring Security and KeyCloak open-access platform (SSK) to safeguard microservice architecture application programming interfaces (APIs). Subsequently, we extended the security solution with a virtual private network (VPN), Bcrypt hash, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure following the Norwegian data protection policies and General Data Protection Regulation (GDPR). In this study, we have not proposed any new security solution; however, we have focused on accomplishing a hybrid security solution based on the established frameworks (e.g., Spring Security) and open-access software product (e.g., Keycloak) to protect microservice APIs for a health eCoach system as a PoC study. This study describes the methodological, technical, and practical considerations to protect REST interfaces only and ensuring the privacy of data in the system. We validate our SSK security implementation by theoretical evaluation and experimental testing. In addition, we compare the test results with related studies qualitatively to determine the effectiveness of the hybrid security solution (SSK).


2020 ◽  
Vol 10 (4) ◽  
pp. 36
Author(s):  
Sajeewan Pratsri ◽  
Prachyanun Nilsook

According to a continuously increasing amount of information in all aspects whether the sources are retrieved from an internal or external organization, a platform should be provided for the automation of whole processes in the collection, storage, and processing of Big Data. The tool for creating Big Data is a Big Data challenge. Furthermore, the security and privacy of Big Data and Big Data analysis in organizations, government agencies, and educational institutions also have an impact on the aspect of designing a Big Data platform for higher education institute (HEi). It is a digital learning platform that is an online instruction and the use of digital media for educational reform including a module provides information on functions of various modules between computers and humans. 1) Big Data architecture is a framework for an architecture of numerous data which consisting of Big Data Infrastructure (BDI), Data Storage (Cloud-based), processing of a computer system that uses all parts of computer resources for optimal efficiency (High-Performance Computing: HPC), a network system to detect the target device network. Thereafter, according to Hadoop’s tools and techniques, when Big Data was introduced with Hadoop's tools and techniques, the benefits of the Big Data platform would provide desired data analysis by retrieving existing information, to illustrate, student information and teaching information that is large amounts of information to adopt for accurate forecasting.


2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Bikash Pradhan ◽  
Saugat Bhattacharyya ◽  
Kunal Pal

The last decade has witnessed extensive research in the field of healthcare services and their technological upgradation. To be more specific, the Internet of Things (IoT) has shown potential application in connecting various medical devices, sensors, and healthcare professionals to provide quality medical services in a remote location. This has improved patient safety, reduced healthcare costs, enhanced the accessibility of healthcare services, and increased operational efficiency in the healthcare industry. The current study gives an up-to-date summary of the potential healthcare applications of IoT- (HIoT-) based technologies. Herein, the advancement of the application of the HIoT has been reported from the perspective of enabling technologies, healthcare services, and applications in solving various healthcare issues. Moreover, potential challenges and issues in the HIoT system are also discussed. In sum, the current study provides a comprehensive source of information regarding the different fields of application of HIoT intending to help future researchers, who have the interest to work and make advancements in the field to gain insight into the topic.


Author(s):  
Ruchira Naskar ◽  
Rajat Subhra Chakraborty ◽  
Dev Kumar Das ◽  
Chandan Chakraborty

With the advent of telemedicine, Digital Rights Management of medical images has become a critical issue pertaining to security and privacy preservation in the medical industry. The technology of telemedicine makes patient diagnosis possible for physicians located at a remote site. This technology involves electronic transmission of medical images over the internet, thus raising the need for ensuring security and privacy of such information. Digital watermarking is a widely used technique for the authentication and protection of multimedia data such as images and video against various security and privacy threats. But such digital rights management practices as watermarking often lead to considerable distortion or information loss of the medical images. The medical images being highly sensitive and legally valuable assets of the medical industry, such information loss are often not tolerable. Most importantly, such information loss may lead to incorrect patient diagnosis or reduced accuracy of disease detection. In this chapter we investigate the impact of digital watermarking, and its effect on the accuracy of disease diagnosis, specifically diagnosis of malarial infection caused by Plasmodium vivax parasite. We have used a computer–aided, automatic diagnostic model for our work in this chapter. Our experimental results show that although general (lossy) digital watermarking reduces the diagnostic accuracy, it can be improved with the use of reversible (lossless) watermarking. In fact, the adverse effect(s) of watermarking on the diagnostic accuracy can be completely mitigated through the use of reversible watermarking.


Author(s):  
Calin Ciufudean

Modern medical devices involves information technology (IT) based on electronic structures for data and signals sensing and gathering, data and signals transmission as well as data and signals processing in order to assist and help the medical staff to diagnose, cure and to monitors the evolution of patients. By focusing on biological signals processing we may notice that numerical processing of information delivered by sensors has a significant importance for a fair and optimum design and manufacture of modern medical devices. We consider for this approach fuzzy set as a formalism of analysis of biological signals processing and we propose to be accomplished this goal by developing fuzzy operators for filtering the noise of biological signals measurement. We exemplify this approach on neurological measurements performed with an Electro-Encephalograph (EEG).


Author(s):  
Miguel A. Sánchez-Acevedo ◽  
Zaydi A. Acosta-Chí ◽  
Beatriz A. Sabino-Moxo ◽  
José A. Márquez-Domínguez ◽  
Rosa M. Canton-Croda

In the healthcare field, plenty of clinical data is generated every day from patient records, surveys, research papers, medical devices, among others sources. These data can be exploited to discover new insights about health issues. For helping decision makers and healthcare data managers, a survey of research works and tools covering the process of handling big data in the healthcare field is included. A methodology for CVD prevention, detection and management through the use of tools for big data analysis is proposed. Also, it is important to maintain privacy of patients when handling healthcare data; therefore, a list of recommendations for maintaining privacy when handling healthcare data is presented. Specific clinical analysis are recommended on those regions where the incidence rate of CVD is high, but a weak relation with the common risk factors is observed according to historical data. Finally, challenges which need to be addressed are presented.


2020 ◽  
pp. 643-672
Author(s):  
Tamara K Hervey

This chapter examines EU law on health. Specifically, it discusses the law governing patient mobility; healthcare professionals; healthcare institutions; medical devices and pharmaceuticals; blood, organs, and human tissue; and public health.


Author(s):  
Christophe Feltus

Traditionally, the relationship between the company and its providers have for objective to generate value at the company side in exchange of money. This relationship is largely investigated through the vector of value chain. In this article, security and privacy cocreation (SPCC) is investigated as a specialization of value cocreation. Although it is an important research topic, and despite a plethora of research aiming at depicting the fundamental of SPCC, few contributions have been appeared until now in the area of a language to support SPCC design and deployment. However, such a language is necessary to describe elements of the information system, as well as their underlying dependencies. As a result, this article proposes extending an existing enterprise architecture language to support the process of decision-making and to allow understanding and analysis of the impacts associated to a change of the system architecture as a whole.


Sign in / Sign up

Export Citation Format

Share Document