0% Complete
فارسی
Home
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Towards Provable Privacy Protection in IoT-Health Applications
Authors :
Samane Sobuti
1
دکتر سیاوش خرسندی
2
1- دانشگاه آزاد اسلامی واحد کرمان
2- دانشگاه صنعتی امیرکبیر
Keywords :
IoT،mHealth،privacy،access control
Abstract :
Healthcare is one of major application areas in IoT. Medical wearable devices and patient-area cyber physical systems has a great potential to increase healthcare quality, expand access to services, reduce costs, and improve personal wellness and public health. However, iHealth also raises significant privacy and security challenges. Especially, in dealing with sensitive personal information, privacy issues in IoT-health applications are not adequately addressed. Despite extensive studies in protecting patient privacy in iHealth, the solutions are by large opportunistic, that is, protection mechanisms are proposed to be applied wherever possible without proving or analyzing their sufficiency. In this paper, we provide an end-to-end analysis of a patient’s data flow and develop a framework with sufficient set of protection mechanisms to guarantee end-to-end threat mitigation. The proposed framework encompasses the three aspects of privacy in iHealth, namely, access control, trust management and data protection.
Papers List
List of archived papers
Evaluating LLMs in Persian News Summarization
Arya VarastehNezhad - Reza Tavasoli - Mostafa Masumi - Seyed Soroush Majd - Mehrnoush Shamsfard
BMPA- DSL: Binary Marine Predators Algorithm to Identify Driver's Different Levels of Stress
Mahtab Vaezi - Mehdi Nasri - Farhad Azimifar - Mahdi Mosleh
Electrophysiological Modeling and Interactive Approaches of Electrical Circuits and Hypergraphs for Understanding Neural Circuit Dynamics
Arian Baymani - Maryam Naderi Soorki
شناسایی جایگاه مالونیلاسیون در پروتئینها با بهرهگیری از استخراج ویژگی و تکنیکهای پردازش زبان طبیعی
حنانه رجبیون - محمد قاسم زاده - وحید رنجبر بافقی
Presenting an Edge-based Air Quality Management System for Smart City Scenarios
Tina Samizadeh Nikoui - Ali Balador - Amir Masoud Rahmani - Hooman Tabarsaied
A Survey on Utilizing Reinforcement Learning in Wireless Sensor Networks Routing Protocols
Ali Forghani Elah Abadi - Seyedeh Elham Asghari - Sepideh Sharifani - Seyyed Amir Asghari - Mohammadreza Binesh Marvasti
کشف برخط تقلب پیشنهاد ساختگی (Bid-Shielding) در مناقصه و مزایدههای الکترونیکی هلندی با رویکرد تحلیل شبکه اجتماعی
فاطمه الثلایا - دکتر سید علیرضا هاشمی گلپایگانی فاطمه الثلایا - سید علیرضا هاشمی گلپایگانی -
ارائه یک الگوریتم سلسله مراتبی جهت تشخیص نفوذ در شبکه های کامپیوتری
دکتر باقر رحیم پور کامی - سیدمحمد سیدی برشی باقر رحیم پور کامی - سیدمحمد سیدی برشی -
An Eco-Friendly Cosmopolitan (EFC) by Recycling Scientific/Industrial Towns (RSITs)
Engineer Reza Khalilian - Dr. Abdalhossein Rezai - Dr. Mohammadreza Talakesh
Human Resource Allocation to the Credit Requirement Process, A Process Mining Approach
Omid Mahdi Ebadati - Mohammad Mehrabioun - Shokoofeh Sadat Hosseini
more
Samin Hamayesh - Version 42.5.2