0% Complete
فارسی
Home
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Towards Provable Privacy Protection in IoT-Health Applications
Authors :
Samane Sobuti
1
دکتر سیاوش خرسندی
2
1- دانشگاه آزاد اسلامی واحد کرمان
2- دانشگاه صنعتی امیرکبیر
Keywords :
IoT،mHealth،privacy،access control
Abstract :
Healthcare is one of major application areas in IoT. Medical wearable devices and patient-area cyber physical systems has a great potential to increase healthcare quality, expand access to services, reduce costs, and improve personal wellness and public health. However, iHealth also raises significant privacy and security challenges. Especially, in dealing with sensitive personal information, privacy issues in IoT-health applications are not adequately addressed. Despite extensive studies in protecting patient privacy in iHealth, the solutions are by large opportunistic, that is, protection mechanisms are proposed to be applied wherever possible without proving or analyzing their sufficiency. In this paper, we provide an end-to-end analysis of a patient’s data flow and develop a framework with sufficient set of protection mechanisms to guarantee end-to-end threat mitigation. The proposed framework encompasses the three aspects of privacy in iHealth, namely, access control, trust management and data protection.
Papers List
List of archived papers
سیستم پیشنهاددهنده غذای سالم با استفاده از داده کاوی عادت های تغذیه ای کاربران
محمد عباسی - مریم حسینی پزوه - محمدرضا شمس
نقشه های شناختی فازی پیشرفته (FCM) رویکردی برای مدل سازی سیستم های پیچیده ی پویا
فریبا اسلامی امیرآبادی - کمال میرزایی بدرآبادی
IT-based and Non-IT-based methods to separate and collect waste
Hoda Harati - Farzad Haghighi-Rad - Reza Yousefi Zenouz
تولید خودکار موارد آزمون برای پوشش مسیر اصلی با الگوریتم جایا
ُSaba Yadegari - Mohammad-Reza Keyvanpour
Statistical distance-base acceptance strategy for desirable offers in bilateral automated negotiation
Arash Ebrahimnezhad - Dr Hamid Jazayeriy - Dr Faria Nassiri-mofakham
NFV-Based Distributed Service Function Chaining with Imperfect Information
Mahsa Alikhani - Marzieh Sheikhi - Dr Vesal Hakami
Real-Time EEG-Based Analysis Of Stress-Inducing Stimuli
Mohsen Mahmoudi - Fattaneh Taghiyareh - Yasamin Akhavein - Elnaz Ghorbani
مدیریت توأم منابع و خواب ایستگاه پایه مبتنی بر یادگیری تقویتی در شبکه های فوق متراکم با ارتباطات دو طرفه
طاهره رحمتی - بهروز شاهقلی قهفرخی
A method for image steganography based on chaotic maps and advanced compression algorithms
Mohammad Yousefi Sorkhi
COVID-19 Image Retrieval Using Siamese Deep Neural Network and Hashing Technique
Farsad Zamani Boroujeni - Doryaneh Hossein Afshari - Fatemeh Mahmoodi
more
Samin Hamayesh - Version 41.3.1