A Collaborative Fog-Based Healthcare Intrusion Detection Security Using Blockchain and Machine Learning DOI

Maryam Douiba,

Said Benkirane,

Azidine Guezzaz

et al.

Lecture notes in networks and systems, Journal Year: 2023, Volume and Issue: unknown, P. 1 - 6

Published: Jan. 1, 2023

Language: Английский

Fog Computing in Healthcare DOI Open Access

Deepa Arora,

Oshin Sharma

Published: Feb. 20, 2025

Fog computing is an emerging paradigm that aims to enhance the performance, security, and privacy of distributed systems by bringing resources closer users. In healthcare, fog has potential revolutionize way medical services are delivered, enabling real-time monitoring analysis patients' health data. However, as with any system, security concerns critical challenges need be addressed. This chapter explores use in healthcare along enhancement systems. We provide overview key concepts architectures discuss unique arise healthcare. then review existing solutions techniques for enhancing computing-based systems, including data encryption, access control, privacy-preserving analysis. Finally, we highlight some open research opportunities this area, recommendations future directions.

Language: Английский

Citations

0

Prediction of Diabetes During Pregnancy Through Fog Environment DOI

K. K. Baseer,

P. Karthik,

M. Sheshendra

et al.

Communications in computer and information science, Journal Year: 2025, Volume and Issue: unknown, P. 231 - 246

Published: Jan. 1, 2025

Language: Английский

Citations

0

OPERA: Optional Dimensional Privacy-Preserving Data Aggregation for Smart Healthcare Systems DOI
Huadong Liu, Tianlong Gu, Mohammad Shojafar

et al.

IEEE Transactions on Industrial Informatics, Journal Year: 2022, Volume and Issue: 19(1), P. 857 - 866

Published: July 18, 2022

Massive multidimensional health data collected from Internet of Things (IoT) devices are driving a new era smart health, and with it come privacy concerns. Privacy-preserving aggregation (PDA) is proven solution providing statistics while hiding raw data. However, existing PDA schemes ignore the willingness owners to share, so may refuse share To increase their contribute data, we propose an OPtional dimEnsional pRivacy-preserving Aggregation scheme (OPERA) provide contributors options on sharing dimensions keeping choices private. OPERA uses selection vectors represent decisions users count participants dimensionally achieves utility based multisecret method symmetric homomorphic cryptography. Analyses show that in OPERA, probability adversaries breaching less than 4.68e-97. Performance evaluations demonstrate outstanding computation practical communication.

Language: Английский

Citations

13

Security and Privacy of Wearable Wireless Sensors in Healthcare: A Systematic Review DOI Creative Commons

Ranjit Kaur,

Seyed Shahrestani,

Chun Ruan

et al.

Deleted Journal, Journal Year: 2024, Volume and Issue: unknown

Published: Feb. 5, 2024

Wearable Wireless Sensor Network (WWSN) devices are widely used in healthcare to monitor health data. However, when WWSN users transmit their data professionals or third parties over wireless connections, they face privacy and security vulnerabilities. This paper aims identify the unsolved challenges wearable sensor healthcare, especially aspects overlooked by previous research. The main research question is: What what implications for professionals? systematic review employs specific keywords search relevant publications on bibliographic databases, including Google Scholar, Scopus, IEEE Xplore, Web of Science. Preferred Reporting Items Systematic Reviews Meta-Analyses (PRISMA) charts helped screening summarising selected papers. results highlight critical areas that can make WWSNs vulnerable attacks. findings examine issues cloud computing, fog Internet Things (IoT) like. Many studies IoT due its challenges, regarding handling extensive data, using public channels, deploying advanced technologies, managing sharing policies alongside growing number devices, protecting from hackers. These seriously threaten confidentiality, integrity, availability transmitted cloud-based environments exacerbated limited resources. significant thereby focus unresolved IoT. safeguard against cyber-attacks increase users' adoption rate devices.

Language: Английский

Citations

2

A Collaborative Fog-Based Healthcare Intrusion Detection Security Using Blockchain and Machine Learning DOI

Maryam Douiba,

Said Benkirane,

Azidine Guezzaz

et al.

Lecture notes in networks and systems, Journal Year: 2023, Volume and Issue: unknown, P. 1 - 6

Published: Jan. 1, 2023

Language: Английский

Citations

5