A Collaborative Fog-Based Healthcare Intrusion Detection Security Using Blockchain and Machine Learning DOI

Maryam Douiba,

Said Benkirane,

Azidine Guezzaz

и другие.

Lecture notes in networks and systems, Год журнала: 2023, Номер unknown, С. 1 - 6

Опубликована: Янв. 1, 2023

Язык: Английский

Fog Computing in Healthcare DOI Open Access

Deepa Arora,

Oshin Sharma

Опубликована: Фев. 20, 2025

Fog computing is an emerging paradigm that aims to enhance the performance, security, and privacy of distributed systems by bringing resources closer users. In healthcare, fog has potential revolutionize way medical services are delivered, enabling real-time monitoring analysis patients' health data. However, as with any system, security concerns critical challenges need be addressed. This chapter explores use in healthcare along enhancement systems. We provide overview key concepts architectures discuss unique arise healthcare. then review existing solutions techniques for enhancing computing-based systems, including data encryption, access control, privacy-preserving analysis. Finally, we highlight some open research opportunities this area, recommendations future directions.

Язык: Английский

Процитировано

0

Prediction of Diabetes During Pregnancy Through Fog Environment DOI

K. K. Baseer,

P. Karthik,

M. Sheshendra

и другие.

Communications in computer and information science, Год журнала: 2025, Номер unknown, С. 231 - 246

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

OPERA: Optional Dimensional Privacy-Preserving Data Aggregation for Smart Healthcare Systems DOI
Huadong Liu, Tianlong Gu, Mohammad Shojafar

и другие.

IEEE Transactions on Industrial Informatics, Год журнала: 2022, Номер 19(1), С. 857 - 866

Опубликована: Июль 18, 2022

Massive multidimensional health data collected from Internet of Things (IoT) devices are driving a new era smart health, and with it come privacy concerns. Privacy-preserving aggregation (PDA) is proven solution providing statistics while hiding raw data. However, existing PDA schemes ignore the willingness owners to share, so may refuse share To increase their contribute data, we propose an OPtional dimEnsional pRivacy-preserving Aggregation scheme (OPERA) provide contributors options on sharing dimensions keeping choices private. OPERA uses selection vectors represent decisions users count participants dimensionally achieves utility based multisecret method symmetric homomorphic cryptography. Analyses show that in OPERA, probability adversaries breaching less than 4.68e-97. Performance evaluations demonstrate outstanding computation practical communication.

Язык: Английский

Процитировано

13

Security and Privacy of Wearable Wireless Sensors in Healthcare: A Systematic Review DOI Creative Commons

Ranjit Kaur,

Seyed Shahrestani,

Chun Ruan

и другие.

Deleted Journal, Год журнала: 2024, Номер unknown

Опубликована: Фев. 5, 2024

Wearable Wireless Sensor Network (WWSN) devices are widely used in healthcare to monitor health data. However, when WWSN users transmit their data professionals or third parties over wireless connections, they face privacy and security vulnerabilities. This paper aims identify the unsolved challenges wearable sensor healthcare, especially aspects overlooked by previous research. The main research question is: What what implications for professionals? systematic review employs specific keywords search relevant publications on bibliographic databases, including Google Scholar, Scopus, IEEE Xplore, Web of Science. Preferred Reporting Items Systematic Reviews Meta-Analyses (PRISMA) charts helped screening summarising selected papers. results highlight critical areas that can make WWSNs vulnerable attacks. findings examine issues cloud computing, fog Internet Things (IoT) like. Many studies IoT due its challenges, regarding handling extensive data, using public channels, deploying advanced technologies, managing sharing policies alongside growing number devices, protecting from hackers. These seriously threaten confidentiality, integrity, availability transmitted cloud-based environments exacerbated limited resources. significant thereby focus unresolved IoT. safeguard against cyber-attacks increase users' adoption rate devices.

Язык: Английский

Процитировано

2

A Collaborative Fog-Based Healthcare Intrusion Detection Security Using Blockchain and Machine Learning DOI

Maryam Douiba,

Said Benkirane,

Azidine Guezzaz

и другие.

Lecture notes in networks and systems, Год журнала: 2023, Номер unknown, С. 1 - 6

Опубликована: Янв. 1, 2023

Язык: Английский

Процитировано

5