Thilakarathne et al., 2021 - Google Patents
Privacy dilemma in healthcare: A review on privacy preserving medical internet of thingsThilakarathne et al., 2021
View PDF- Document ID
- 13129298768579983693
- Author
- Thilakarathne N
- Weerasinghe H
- Welhenge A
- Kagita M
- Publication year
- Publication venue
- 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)
External Links
Snippet
In recent years, the Medical Internet of Things or well known as MIoT has attracted so much attentional from researchers, academia for its potential to alleviate the burden on global healthcare caused by the shortage of medical staff, chronic diseases, and deadly contagious …
- 230000001965 increased 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/321—Management of medical image data, e.g. communication or archiving systems such as picture archiving and communication systems [PACS] or related medical protocols such as digital imaging and communications in medicine protocol [DICOM]; Editing of medical image data, e.g. adding diagnosis information
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hasan et al. | A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things | |
Oh et al. | A comprehensive survey on security and privacy for electronic health data | |
Mittal et al. | Using identity‐based cryptography as a foundation for an effective and secure cloud model for e‐health | |
Abouelmehdi et al. | Big healthcare data: preserving security and privacy | |
Al-Issa et al. | eHealth cloud security challenges: a survey | |
Saha et al. | Review on “Blockchain technology based medical healthcare system with privacy issues” | |
Masud et al. | A robust and lightweight secure access scheme for cloud based E-healthcare services | |
Abouelmehdi et al. | Big data security and privacy in healthcare: A Review | |
Alkeem et al. | New secure healthcare system using cloud of things | |
Bhushan et al. | Towards a secure and sustainable internet of medical things (iomt): Requirements, design challenges, security techniques, and future trends | |
Al-Zubaidie et al. | PAX: Using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system | |
Al Alkeem et al. | Security and privacy framework for ubiquitous healthcare IoT devices | |
Sai et al. | Internet of things-based e-health care: Key challenges and recommended solutions for future | |
Mahajan et al. | Secure gene profile data processing using lightweight cryptography and blockchain | |
Abiodun et al. | Security and information assurance for IoT-based big data | |
Choudhury et al. | Covidchain: An anonymity preserving blockchain based framework for protection against covid-19 | |
Yogeshwar et al. | Healthcare domain in IoT with blockchain based security-A researcher's perspectives | |
Koren et al. | Iot health data in electronic health records (ehr): Security and privacy issues in era of 6g | |
Thilakarathne et al. | Privacy dilemma in healthcare: A review on privacy preserving medical internet of things | |
Wenhua et al. | A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications | |
Annane et al. | Cx‐CP‐ABE: Context‐aware attribute‐based access control schema and blockchain technology to ensure scalable and efficient health data privacy | |
Alzu'bi et al. | A review of privacy and security of edge computing in smart healthcare systems: issues, challenges, and research directions | |
Shree et al. | Data protection in internet of medical things using blockchain and secret sharing method | |
Makina et al. | Survey on security and privacy in Internet of Things‐based eHealth applications: Challenges, architectures, and future directions | |
Zhao et al. | Security and privacy analysis of mhealth application: A case study |