帳號:guest(3.135.187.227)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者:Chanapha Butpheng
作者(英文):Chanapha Butpheng
論文名稱:On the Design of a Secure and Extensible E-Health Framework
論文名稱(英文):On the Design of a Secure and Extensible E-Health Framework
指導教授:葉國暉
指導教授(英文):Kuo-Hui-Yeh
口試委員(英文):Nai-Wei Lo
Jia‐Ning Luo
Chi-Yuan Chen
Ying-Ho Liu
Kuo-Hui Yeh
學位類別:博士
校院名稱:國立東華大學
系所名稱:企業管理學系
學號:810532009
出版年(民國):111
畢業學年度:110
語文別:英文
論文頁數:177
關鍵詞(英文):SecurityIoTCloud computingBlockchainCross-blockchaine-Heath Systems
相關次數:
  • 推薦推薦:0
  • 點閱點閱:26
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:11
  • 收藏收藏:0
High levels of innovative technologies, such as the Internet of Things (IoT), cloud computing, and blockchain have been integrated into e-Health systems to mitigate the potential risk of unsatisfactory health management outcomes. The implementation of cloud computing and IoT technologies on e-Health systems has improved diagnostics, treatments, convenience, reduced costs, redundant loss, and enhanced patient outcomes. Users can utilize IoT-cloud e-Health services anytime, anywhere, and in any environment.
The purpose of this study is to create an efficient and secure data management scheme for e-Health systems that utilized cloud computing, IoT, and blockchain technologies to achieve improved security and privacy with low computational forfeits. To guarantee security robustness for e-Health application services, we designed an IoT-cloud-based authentication and access control scheme. The proposed scheme can be effectively executed on low-cost testbeds (Raspberry PI) while ensuring greater security than historically available alternatives. Then, we introduce an interoperability management scheme with certificateless cryptographic primitives for securing cross-chain e-Health transactions. Unlike most existing cross-chain transaction exchanging solutions, we refine the Delegated Proof of Stake (DPoS) consensus algorithm as a verification scheme to ensure the data integrity and provenance of the transferred transactions when performing cross-chain interactions. The scheme relies on cross-chain consensus with relays to improve the compatibility among heterogeneous blockchains. However, system efficiency could be further improved with the future development of more efficient leaner codes, algorithms, and architectures.
Abstract i
Table of Contents ii
List of Tables iv
List of Figures v
Chapter 1 Introduction 1
1.1 Background and Motivation 1
1.2 Research Problems 7
1.3 Notations 15
1.4 Contributions 16
1.5 Outline of the Dissertation 25
Chapter 2 The State of the Art 27
2.1 Innovative e-Health Concepts 28
2.2 Security for e-Health Systems 38
2.3 The State of the Art 39
2.4 Blockchain Technology for e-Health Management Systems 54
Chapter 3. IoT-Cloud-based Solution dealing with Authentication and Access control issues. 61
3.1 The requirement for IoT-cloud-based e-Health Management 63
3.2 Preliminary and Assumption 86
3.3 The proposed scheme 87
3.4 Security Analysis 93
3.5 Proof-of-concept Implementation 102
3.6 Brief Summary 112
Chapter 4. Blockchain-based Solution dealing with Data exchange issues. 115
4.1 System requirement of Cross-blockchain Transactions 115
4.2 Preliminary 118
4.3 The Proposed Scheme 121
4.4 Protocol Analysis 126
4.5 Proof of concept implementation 128
4.6 Brief Summary 132
Chapter 5 Discussion on Other Issues 135
5.1 Resource Management 135
5.2 Context Awareness 138
5.3 Data Privacy 138
5.4. Challenges and Open Issues 147
Chapter 6 Conclusion and Future Work 157
6.1 Conclusion 158
6.2 Future Work 163
References 165

1. Eysenbach, G. (2001). What is e-health? Journal of medical internet research. 3(2): p. e20.
2. Ruhul Amin, N. K., G. P. Biswas, R. Iqbal, Victor Chang. (2018). A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment. Future Generation Computer Systems. 78: p. 1005-1019.
3. Kaur, C. (2020). The Cloud Computing and Internet of Things (IoT). International Journal of Scientific Research in Science, Engineering and Technology. 7(1): p. 19-22.
4. Kaur, H., Atif, M., &Chauhan, R.An Internet of Healthcare Thing (IoHT) based Healthcare Monitoring System, in Advances in Intelligent Computing and Communication. 2020. Singapore: Springer.
5. Pasha, M.&Shah, S. M. W. (2018). Framework for E-Health Systems in IoT-Based Environments. Wireless Communications and Mobile Computing: p. 1-11.
6. Rahmani, A. M., Gia, T. N., Negash, B., Anzanpour, A., Azimi, I., Jiang, M., &Liljeberg, P. (2018). Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach. Future Generation Computer Systems. 78: p. 641-658.
7. Shewale, A. D.&Sankpal, S. V. (2020). IOT based Smart and Secure Health Care System Analysis & Data Comparison. International Journal for Research in Applied Science & Engineering Technology (IJRASET). 8(1): p. 394-398.
8. Islam, M. S., Humaira, F., &Nur, F. N. (2020). Healthcare Applications in IoT. Global Journal of Medical Research: B Pharma, Drug Discovery, Toxicology & Medicine. 20(2).
9. Selvaraj, S.&Sundaravaradhan, S. (2020). Challenges and opportunities in IoT healthcare systems: a systematic review. SN Applied Sciences. 2(1).
10. Butpheng, C., Yeh, K.-H., &Xiong, H. (2020). Security and Privacy in IoT-Cloud-Based e-Health Systems—A Comprehensive Review. Symmetry. 12(1191): p. 1-35.
11. Ambarkar, S. S.&Shekokar, N. (2020). Toward Smart and Secure IoT Based Healthcare System, in Internet of Things, Smart Computing and Technology: A Roadmap AheadSpringer Nature AG: Cham, Switzerland. p. 283-303.
12. Farahani, B., Firouzi, F., &Charkabarty, K. (2020). Healthcare IoT, in Intelligent Internet of Thing, F.F.e. al., Editor Springer Nature AG: Cham, Switzerland p. 515-537.
13. Kalyani, G.&Chaudhari, S. (2019). An efficient approach for enhancing security in Internet of Things using the optimum authentication key. International Journal of Computers and Applications. 42(3): p. 306-314.
14. Cha, S.-C., Hsu, T.-Y., Xiang, Y., &Yeh, K.-H. (2019). Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges. IEEE Internet of Things Journal. 6(2): p. 2159-2187.
15. Chattopadhyay, A. K., Nag, A., Ghosh, D., &Chanda, K. (2019). A Secure Framework for IoT-Based Healthcare System, in Proceedings of International Ethical Hacking ConferenceSpringer Nature: Singapore. p. 383-393.
16. Dang, L. M., Piran, M. J., Han, D., Min, K., &Moon, H. (2019). A Survey on Internet of Things and Cloud Computing for Healthcare. Electronics. 8(7).
17. Mohanty, M. N.&Das, S. (2020). Advances in Intelligent Computing and Communication, in Lecture Notes in Networks and Systems Proceeding of ICAC 2019Springer Nature: Singapore.
18. Borkowski, M., Frauenthaler, P., Sigwart, M., Hukkinen, T., Hladky, O., &Schulte, S. (2019). Cross-Blockchain Technologies: Review, State of the Art, and Outlook, in Technische Universität WienVienna University of Technology, Austria: Vienna University of Technology.
19. Selvaraj, S.&Sundaravaradhan, S. (2019). Challenges and opportunities in IoT healthcare systems: a systematic review. SN Applied Sciences. 2(1).
20. Nandyala, C. S.&Kim, H.-K. (2016). From Cloud to Fog and IoT-Based Real-Time U-Healthcare Monitoring for Smart Homes and Hospitals. International Journal of Smart Home. 10(2): p. 187-196.
21. Maksimović, M. (2017). Improving computing issues in internet of things driven e-health systems. International Conference for Young Researchers in Informatics, Mathematics and Engineering 2017. 1852: p. 14-17.
22. Amin, R., Kumar, N., Biswas, G. P., Iqbal, R., &Chang, V. (2018). A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment. Future Generation Computer Systems. 78: p. 1005-1019.
23. Shewale, A. D.&Sankpal, S. V. (2020). IOT & Raspberry Pi based Smart and Secure Health Care System using BSN. International Journal for Research in Applied Science &Engineering Technology (IJRASET). 8(2): p. 506-510.
24. Robinson, Y. H., Presskila, X. A., &Lawrence, T. S. (2020). Utilization of Internet of Things in Healthe Care Information System, in Internet of Things and Big Data Applications, V.E.B.e. al, Editor Springer AG: Cham, Switzerland. p. 35-46.
25. Yeh, K.-H. (2016). A Secure IoT-Based Healthcare System With Body Sensor Networks. IEEE Access. 4: p. 10288-10299.
26. Shewale, A. D.&Sankpal, S. V. (2020). IOT based Smart and Secure Health Care System Analysis & Data Comparison. International Journal for Research in Applied Science &Engineering Technology (IJRASET). 8(1): p. 394-398.
27. Alshammari, M. (2019). A Principled Approach for Engineering Privacy by Design, in Worcester CollegeUniversity of Oxford: Department of Computer Science. p. 304.
28. Cavoukian, A. (2019). Privacy-by-design. The 7 Foundational Principles Implementation and Mapping of Fair Information Practices: p. 1-5.
29. Abouelmehdi, K.-., Beni-Hssane, A., Khaloufi, H., &Saadi, M.Big data security and privacy in healthcare A Review, in Procedia Computer Science: The 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN). 2017.
30. Al-Turjman, F., Ever, Y. K., Ever, E., Nguyen, H. X., &David, D. B. (2017). Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks. IEEE Access. 5: p. 24617-24631.
31. Yu, Y., Hu, L., &Chu, J. (2020). A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment. Symmetry. 12(1).
32. Al-Haija, Q. A., Tarayrah, M. A., Al-Qadeeb, H., &Al-Lwaimi, A. (2014). A Tiny RSA Cryptosystem based on Arduino Microcontroller Useful for Small Scale Networks. Procedia Computer Science. 34: p. 639-646.
33. Alkhadhr, S. B., Alkandari, M. A., &Song, T. (2017). Cryptography and randomization to dispose of data and boost system security. Cogent Engineering. 4(1).
34. Garg, A.&Diksha, N. M. (2020). A security and Confidentiality survey in wireless Internet of Things (IoT), in Internet of Things and Big Data Applications: Recent Advances and ChallengesSpringer Nature: Cham, Switzerland. p. 65-88.
35. Pansari, N.&Kushwaha, D. (2018). Advancement in Robust Cyber Attacks- An Overview. International Journal of Research in Engineering, IT and Social Sciences. 8(Special Issue): p. 113-119.
36. Ray, P. P., Dash, D., Salah, K., &Kumar, N. (2020). Blockchain for IoT-Based Healthcare: Background, Consensus, Platforms, and Use Cases. IEEE Systems Journal. 99: p. 1-10.
37. B.D, D.&Al-Turjman, F. (2020). A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Networks. 97.
38. Chattopadhyay, A. K., Nag, A., Ghosh, D., &Chanda, K.A Secure Framework for IoT-Based Healthcare System, in Proceedings of International Ethical Hacking Conference 2018: EHaCON 2018. 2019. Kolkata, India: Springer.
39. Shirley, M. a. J. (2020). A cloud IoT based smart patient health monitoring system. Adalya Journal. 9(1).
40. Qiao, R., Luo, X.-Y., Zhu, S.-F., Liu, A.-D., Yan, X.-Q., &Wang, Q.-X. (2019). Dynamic Autonomous Cross Consortium Chain Mechanism in e-Healthcare. IEEE J Biomed Health Inform. 24(8): p. 2157-2168.
41. Nazir, S., Ali, Y., Ullah, N., &García-Magariño, I. (2019). Internet of Things for Healthcare Using Effects of Mobile Computing: A Systematic Literature Review. Wireless Communications and Mobile Computing: p. 1-20.
42. Semantha, F. H., Azam, S., Yeo, K. C., &Shanmugam, B. (2020). A Systematic Literature Review on Privacy by Design in the Healthcare Sector. Electronics. 9(452): p. 2-29.
43. Wu, J., Tian, X., &Tan, Y. (2019). Hospital evaluation mechanism based on mobile health for IoT system in social networks. Comput Biol Med. 109: p. 138-147.
44. Khatoon, N., Roy, S., &Pranav, P. (2020). A survey on Applications of Internet of Thing in Healthcare, in Internet of Things and Big Data Applications, Intelligent Systems, V.E.B.e. al., Editor Springer Nature AG: Cham, Switzerland. p. 89-106.
45. Tuli, S., Basumatary, N., Singh-Gill, S., Kahani, M., Chand-Arya, R., Wander, G.-S., &Buyya, R. (2020). HealthFog: An ensemble deep learning based Smart Healthcare System for Automatic Diagnosis of Heart Diseases in integrated IoT and fog computing environments. Future Generation Computer Systems. 104: p. 187-200.
46. Gupta, P., Pandy, A., Akshita, P., &Sharma, A.IoT based Healthcare Kit for Diabetic foot Ulcer, in Proceedings of ICRIC 2019: Recent Innovations in Computing. 2019. Cham, Switzerland: Springer Nature.
47. Elmisery, A. M., Rho, S., &Aborizka, M. (2017). A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud services. Cluster Computing. 22(S1): p. 1611-1638.
48. Alihamidi, I., Madi, A. A., &Addaim, A. (2019). Proposed Architecture of e-health IOT. IEEE. 19: p. 1-7.
49. Dauwed, M.&Meri, A. (2019). IOT Service Utilisation in Healthcare, in Internet of Things (IoT) for Automated and Smart ApplicationsIntechOpen: London, UK. p. 1-27.
50. Muzammal, M., Talat, R., Sodhro, A. H., &Pirbhulal, S. (2020). A multi-sensor data fusion enabled ensemble approach for medical data from body sensor networks. Information Fusion. 53: p. 155-164.
51. Fan, K., Jiang, W., Li, H., &Yang, Y. (2018). Lightweight RFID Protocol for Medical Privacy Protection in IoT. IEEE Transactions on Industrial Informatics. 14(4): p. 1656-1665.
52. Khader, A. H. A.&Subasri, K. (2020). Fog Assisted-IOT Enabled Patient Healthmonitoring. Adalya Journal. 9(2).
53. Swaroop, K. N., Chandu, K., Gorrepotu, R., &Deb, S. (2019). A health monitoring system for vital signs using IoT. Internet of Things. 5: p. 116-129.
54. Wilt, T. D., Versluis, A., Goedhart, A., Talboom-Kamp, E., &Delft, S. V. (2020). General practitioners attitude towards the use of eHealth and onlinetesting in primary care. Clinical eHealth. 3: p. 16-22.
55. Aceto, G., Persico, V., &Pescapé, A. (2020). Industry 4.0 and health: Internet of things, big data, and cloud computing for healthcare 4.0. Journal of Industrial Information Integration. 18: p. 1-17.
56. Abouelmehdi, K., Beni-Hssane, A., Khaloufi, H., &Saadi, M. (2017). Big data security and privacy in healthcare: A Review. Procedia Computer Science. 113: p. 73-80.
57. Arasteh, H., Hosseinnerzhad, V., Loia, V., Tommasetti, A., Troisi, O., Shafie-Khah, M., &Siano, P. (2016). Iot-based Smart Cities: a Survey. IEEE Xplore.
58. Ray, P.-P., Dash, D., Salah, K., &Kumar, N. (2020). Blockchain for IoT-Based Healthcare: Background, Consensus, Platforms, and Use Cases. IEEE Systems Journal: p. 1-10.
59. Hasan, R., Hossain, M. M., &Khan, R. (2015). Aura: An IoT Based Cloud Infrastructure for Localized Mobile Computation Outsourcing, in 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and EngineeringIEEE Computer society: University of Alabama at Birmingham, AL, USA. p. 183-188.
60. Chindenga, E. (2016). Dynamic service orchestration in heterogeneous IoT environments, in Computer ScienceUniversity of Fort Hare: National Research Foundation of South Africa. p. 165.
61. Sandhu, R., Sood, S. K., &Kaur, G. (2016). An intelligent system for predicting and preventing MERS-CoV infection outbreak, in J SupercomputSpringer: New York. p. 3033-3056.
62. Stergiou, C., Psannis, K. E., Kim, B.-G., &Gupta, B. (2018). Secure integration of IoT and Cloud Computing. Future Generation Computer Systems. 78: p. 964-975.
63. Stergiou, C., Psannis, K. E., Gupta, B. B., &Ishibashi, Y. (2018). Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT. Sustainable Computing: Informatics and Systems. 19: p. 174-184.
64. Paranjothi, A., Khan, M. S., &Nijim, M. (2017). Survey on Three Components of Mobile Cloud Computing: Offloading, Distribution and Privacy. Journal of Computer and Communications. 5(6): p. 1-31.
65. Wang, X.&Cai, S. (2020). Secure healthcare monitoring framework integrating NDN-based IoT with edge cloud. Future Generation Computer Systems. 112: p. 320-329.
66. Chenthara, S., Ahmed, K., Wang, H., &Whittaker, F. (2019). Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing. IEEE Access. 7: p. 74361-74382.
67. Koutli, M., Theologou, N., Tryferidis, A., Tzovaras, D., Kagkini, A., Zandes, D., Karkaletsis, K., Kaggelides, K., &Miralles, J. A. (2019). Secure IoT e-Health Applications using VICINITY Framework and GDPR guidelines. IEEE Computer Society: p. 263-270.
68. Alihamidi, I., Madi, A. A., &Addaim, A. (2019). Proposed Architecture of e-health IOT, in International Conference on Wireless Networks and Mobile CommunicationsThe international conference on Wireless Networks and Mobile Communications (WINCOM): Fez, Morocco. p. 1-7.
69. Ferrández-Pastor, F. J., García-Chamizo, J. M., Nieto-Hidalgo, M., Mora-Pascual, J., &Mora-Martínez, J. (2016). Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture. Sensors (Basel). 16(7).
70. Sinha, D., Babu, R., Patan, R., Jiao, P., Barri, K., &Alavi, A. H. (2020). Internet of things-based fog and cloud computing technology for smart traffic monitoring. Internet of Things: p. 1-30.
71. Baldassarre, M. T., Barletta, V. S., Caivano, D., &Scalera, M. (2020). Integrating security and privacy in software development. Software Quality Journal. 23(88): p. 1-32.
72. Hosseinian-Far, A., Ramachandran, M., &Slack, C. L. (2018). Emerging Trends in Cloud Computing, Big Data, Fog Computing, IoT and Smart Living, in Technology for Smart Futures, M.D.e. al., Editor Springer: International Publishing, Cham, Switzerland. p. 29-40.
73. Zhou, L., Li, X., Yeh, K.-H., Su, C., &Chiu, W. (2019). Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Generation Computer Systems. 91: p. 244-251.
74. Wang, T., Zhang, G., Liu, A., Bhuiyan, M. Z. A., &Jin, Q. (2019). A Secure IoT Service Architecture With an Efficient Balance Dynamics Based on Cloud and Edge Computing. IEEE Internet of Things Journal. 6(3): p. 4831-4843.
75. Fu, J.-S., Liu, Y., Chao, H.-C., Bhargava, B. K., &Zhang, Z.-J. (2018). Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing. IEEE Transactions on Industrial Informatics. 14(10): p. 4519-4528.
76. Yeh, K.-H. (2018). A Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments. IEEE Systems Journal. 12(2): p. 2027-2038.
77. Shojafar, M.&Sookhak, M. (2019). Internet of everything, networks, applications, and computing systems (IoENACS). International Journal of Computers and Applications. 42(3): p. 213-215.
78. Sadique, K. M., Rahmani, R., &Johannesson, P. (2020). Identity Management in Internet of Things: A Software-Defined Networking Approach, in Proceedings of the 2nd International Conference on Communication, Devices and Cloud computing, Lecture notes in Electrical Engineering, S.K.e. al., Editor Springer Nature: Singapore. p. 495-504.
79. Abu-Elezz, I., Hassan, A., Nazeemudeen, A., Househ, M., &Abd-Alrazaq, A. (2020). The benefits and threats of blockchain technology in healthcare: A scoping review. International Journal of Medical Informatics. 142: p. 104246.
80. Agbo, C. C., Mahmoud, Q. H., &Eklund, J. M. (2019). Blockchain Technology in Healthcare: A Systematic Review. Healthcare (Basel). 7(2).
81. Yaqoob, I., Salah, K., Jayaraman, R., &Al-Hammadi, Y. (2021). Blockchain for healthcare data management: opportunities, challenges, and future recommendations. Neural Computing and Applications.
82. Vyas, J. D., Han, M., Li, L., Pouriyeh, S., &He, J. S. (2020). Integrating Blockchain Technology into Healthcare, in Proceedings of the 2020 ACM Southeast ConferenceAssociation for computing Machinery (ACM): April 2-4, 2020, Tampa, FL, USA. p. 197-203.
83. Attaran, M. (2020). Blockchain technology in healthcare: Challenges and opportunities. International Journal of Healthcare Management. 7: p. 1-14.
84. Jabbar, R., Fetais, N., Krichen, M., &Barkaoui, K. (2020). Blockchain technology for healthcare Enhancing shared e-health record interoperability and integrity, in 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)IEEE: Doha, Qatar. p. 310-317.
85. Pandey, P.&Litoriya, R. (2020). Securing and authenticating healthcare records through blockchain technology. Cryptologia. 44(4): p. 341-356.
86. Satamraju, K. P.&B., M. (2020). Proof of Concept of Scalable Integration of Internet of Things and Blockchain in Healthcare. Sensors (Basel). 20(1389): p. 1-21.
87. Antonio Fusco, Dicuonzo, G., Dell'atti, V., &Tatullo, M. (2020). Blockchain in Healthcare: Insights on COVID-19. Int J Environ Res Public Health. 17(19).
88. Ratta, P., Kaur, A., Sharma, S., Shabaz, M., Dhiman, G., &Khan, R. (2021). Application of Blockchain and Internet of Things in Healthcare and Medical Sector: Applications, Challenges, and Future Perspectives. Journal of Food Quality. 2021: p. 1-20.
89. Swarnkar, M., Bhadoria, R. S., &Sharma, N. (2021). Security, Privacy, Trust Management and Performance Optimization of Blockchain Technology, in Application of Blockchain in Healthcare, S. Namasudra &G.C. Deka, Editors, Springer: Springer Nature Singapore Pte Ltd. p. 69-92.
90. Singh, P., Masud, M., Hossain, M. S., &Kaur, A. (2021). Cross-domain secure data sharing using blockchain for industrial IoT. Journal of Parallel and Distributed Computing. 156: p. 176-184.
91. Azbeg, K., Ouchetto, O., Andaloussi, S. J., &Fetjah, L. (2021). A Taxonomic Review of the Use of IoT and Blockchain in Healthcare Applications. Irbm.
92. Dhillon, V., Metcalf, D., &Hooper, M. (2021). Blockchain Enabled Applications. Second Edition ed. Understand the blockchain Ecosystem and how to make it work for you. Apress: Springer Science Business Media LLC.
93. Khan, F. A., Asif, M., Ahmad, A., Alharbi, M., &Aljuaid, H. (2020). Blockchain technology, improvement suggestions, security challenges on smart grid and its application in healthcare for sustainable development. Sustainable Cities and Society. 55.
94. Abouelmehdi, K., Beni-Hssane, A., Khaloufi, H., &Saadi, M. (2017). Big data security and privacy in healthcare: A Review. Procedia Computer Science: The 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN). 113: p. 73-80.
95. Altam, H. F.&Wills, G. B. (2019). IoT Security, Privacy, Safety and Ethics, in Digital Twin Technologies and Smart cities: Internet of Things (Technology communication Computing), M.F.e. al., Editor Springer: Cham, Switzerland. p. 123-149.
96. Axon, L., Goldsmith, M., &Creese, S. (2018). Privacy requirements in Cybersecurity applications of block chain: Safety Requirements in the Internet of Things, in RIoT Control, T. Macaulay, Editor Elsevier Inc. p. 113-123.
97. Stepien, K., Poniszewska-Maranda, A., &Maranda, W. (2020). Securing connection and data transfer between devices and IoT cloud service, in Integrating Research and Practice in Software Engineering: Studies in Computation Intelligence, S.J.e. al., Editor Springer Nature: Cham, Switzerland. p. 83-96.
98. Basu, S., Ghosh, M., &Barman, S.Raspberry PI 3B+Based Smart Remote Health Monitoring System Using IoT Platform, in Proceedings of the 2nd International Conference on Communication, Devices and Computing (ICCDC 2019). 2019. West Bengal, India: Springer Nature Singapore.
99. Li, D., Zhongsheng, W., Xiaodong, W., &Dong, W. (2020). Security information transmission algorithms for IoT based on cloud computing. Computer Communications. 155(1): p. 32-39.
100. Alaba, F. A., Othman, M., Hashem, I. a. T., &Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications. 88: p. 10-28.
101. Yousefnezhad, N., Malhi, A., &Främling, K. (2020). Security in product lifecycle of IoT devices: A survey. Journal of Network and Computer Applications. 171.
102. Yu, Y., Hu, L., &Chu, J. (2020). A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment. Symmetry. 12(150): p. 1-15.
103. Sehgal, N.-K., Bhatt, P.-C. P., &Acken, J. M. (2020). Cloud Computing and Information Security. Concepts and Practices, ed. S. Edition. Cham, Switzerland: Springer Nature AG.
104. Aceto, G., Persico, V., &Pescapé, A. (2020). Industry 4.0 and Health: Internet of Things, Big Data, and Cloud Computing for Healthcare 4.0. Journal of Industrial Information Integration. 18.
105. Yeh, K.-H., Su, C., Choo, K.-K. R., &Chiu, W. (2017). A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things. Sensors (Basel). 17(5): p. 1-17.
106. Connor, Y. O. S., Wendy Rowan, L. L., &Heavin, C. (2017). Privacy by design informed consent and internet of things for smart health. Procedia Computer Science. 113: p. 653-658.
107. Kaliya, N.&Hussain, M. (2017). Framework for privacy preservation in iot through classification and access control mechanisms. International Conference for Convergence in Technology (I2CT): p. 430-434.
108. Caiza, J. C., Martin, Y.-S., Guaman, D. S., Alamo, J. M. D., &Yelmo, J. C. (2019). Reusable Elements for the Systematic Design of Privacy-Friendly Information Systems: A Mapping Study. IEEE Access. 7: p. 66512-66535.
109. Yeh, K.-H. (2017). A Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments. IEEE Systems Journal. 12(2): p. 2027-2038.
110. Sharma, A.&Singh, Y.On Security of Opportunistic Routing Protocol in Wireless Sensor Networks, in Proceeding of ICRIC: Lecture Notes in Electrical Engineering. 2019. Cham, Switzerland: Springer Natures AG.
111. Tyagi, S., Agarwal, A., &Maheshwari, P. (2016). A conceptual framework for IoT-based healthcare system using cloud computing. IEEE. 16: p. 503-507.
112. Chiu, W., Su, C., Fan, C.-Y., Chen, C.-M., &Yeh, K.-H. (2018). Authentication with What You See and Remember in the Internet of Things. Symmetry. 10(11).
113. M., G., Banga, M. K., &Patil, M. (2020). Secured Authentication Systems for Internet of Things. EAI Endorsed Transactions on Smart Cities: p. 1-8.
114. Bhattacharjya, A., Zhong, X., Wang, J., &Li, X. (2019). Present Scenario of IoT Projects with Security Aspects Focused, in Internet of Things: Digital Twin Technology, Communications, Computing and Smart Cities, M.F.A.D.A.H.-F.H. Jahankhani, Editor Springer Nature AG: Cham, Switzerland. p. 95-123.
115. Garcia, L., Parra, L., Jimenez, J. M., Lloret, J., &Lorenz, P. (2020). IoT-Based Smart Irrigation Systems: An Overview on the Recent Trends on Sensors and IoT Systems for Irrigation in Precision Agriculture. Sensors (Basel). 20(4): p. 1-48.
116. Srinivas, T. a. S., Somula, R., &Govinda, K.Privacy and Security in Aadhaar, in Smart Intelligent Computing and Applications, Smart Innovation system and technologies. 2020. Singapore: Springer Nature.
117. Sahmin, S.&Gharsellaoui, H. (2017). Privacy and Security in Internet-based Computing - Cloud Computing, Internet of Things, Cloud of Things :a review. Procedia Computer Science. 112: p. 1516-1522.
118. Hathaliya, J. J.&Tanwar, S. (2020). An exhaustive survey on security and privacy issues in Healthcare 4.0. Computer Communications. 153(1): p. 311-335.
119. Roy, M., Chowdhury, C., &Aslam, N. (2020). Security and Privacy Issues in Wireless sensor and Body Area Networks. Handbook of Computer Networks and Cyber Security: Principles and Paradigms. Cham, Switzerland: Springer Nature.
120. Gardasevic, G., Katzis, K., Bajic, D., &Berbakov, L. (2020). Emerging Wireless Sensor Networks and Internet of Things Technologies-Foundations of Smart Healthcare. Sensors (Basel). 20(13).
121. Zamyatin, A., Harz, D., Lind, J., Panayiotou, P., Gervais, A., &Knottenbelt, W. (2019). XCLAIM: Trustless, Interoperable, Cryptocurrency-Backed Assets. 2019 IEEE Symposium on Security and Privacy (SP): p. 193-210.
122. Jin, H., Dai, X., &Xiao, J. (2018). Towards a Novel Architecture for Enabling Interoperability amongst Multiple Blockchains, in 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS). p. 1203-1211.
123. Huang, X., Mu, Y., Susilo, W., Wong, D. S., &Wu, W. (2007). Certificateless Signature Revisited, ed. J. Pieprzyk, H. Ghodosi, & E. Dawson. Vol. LNCS 4586. Springer-Verlag Berlin heidelberg: Lecture Notes in Computer Science. 308-322.
124. Wang, Y.&He, M. (2021). CPDS: A Cross-Blockchain Based Privacy-Preserving Data Sharing for Electronic Health Records, in 2021 IEEE 6th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA)National University of Singapore: 24-26 April 2021, Chengdu, China. p. 90-99.
125. Zhao, D.&Li, T.Distributed cross-blockchain transactions, in 10th Annual conference on Innovative Data Systems Research (CIDR). 2020. Amsterdam, Netherlands: VLDB Endowment.
126. Dworkin, M. J. (2015). SHA-3 Standard: Permutation-based Hash and extendable output functions, in U.S. Department of CommerceNational Institue of Standards and Technology, Information Tecnology Laboratory: Federal Information Processing Standards Publication (FIPS PUBS). p. 37.
127. Hook, D. (2016). The Bouncy Castle FIPS Java API in 100 Examples. Legion of the Bouncy Castle Inc.,: National Institute of Standards and Technology (NIST).
128. Kang, J. J.&Larkin, H. (2017). Intellingent personal health devices converged with IoT networks. Journal of Mobile Multimedia. 12(3): p. 197-212.
129. Kubo, B., Sahk, A., Berendsen, V., &Saluveer, E. (2019). Privacy by design in statistics Should it become a default/standard. Statistical Journal of the IAOS 35: p. 623-631.
130. Okoye, J. N. (2017). Privacy by Design, in Telematics-Communication NetworksNorwegian University of Science and Technology: Trondheim, Norway.
131. Diamantopoulou, V., Argyropoulos, N., Kalloniatis, C., &Gritzalis, S. (2017). Supporting the design of privacyaware business processes via privacy process patterns. IEEE Access: p. 1-12.
132. Perera, C., Barhamgi, M., Bandara, A. K., Ajmal, M., Price, B., &Nuseibeh, B. (2019). Designing privacy-aware internet of things applications. Information Sciences. 512: p. 238-257.
133. Patil, S., Joshi, S., &Patil, D.Enhanced Privacy Preservation using Anonymization in IoT-Enabled Smart Homes, in Smart Intelligent Computing and Applications, Smart Innovation system and technologies. 2020. Singapore: Springer Nature.
134. Wong, R. Y., Mulligan, &K, D.Bringing Design to the Privacy Table: Broadening "Design" in "Privacy by Design" Through the lens of HCI, in Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 2019.
135. Foujdar, A. A. (2019). Implementing Privacy by Design through Privacy Impact Assessments, in Faculty of Law and Information SocietyUniversity of Turku: University of Turku.
136. Morales-Trujillo, M. E., Matla-Cruz, E. O., Alberto, G., García-Mireles, &Piattini, M. (2018). Privacy by design in software engineering a systematic mapping study. Conferencia Iberoamericana de Software Engineering (CIbSE): p. 1-14.
137. Yin, C., Xi, J., Sun, R., &Wang, J. (2017). Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things. IEEE Transactions on Industrial Informatics. 14(8): p. 3628-3636.
138. Tamò-Larrieux, A. (2018). Privacy Protection in an Internet of Things Environment, in Designing for Privacy and its Legal FrameworkSpringer: Cham, Switzerland. p. 45-72.
139. Thakare, V.&Kumbhar, M. (2020). Internet of Things (IoT) in Hospitals of India A Literature Review and Research Direction. UGC care Listed Journal. 68(15): p. 132-137.
140. Khan, M. A. (2020). An IoT Framework for Heart Disease Prediction Based on MDCNN Classifier. IEEE Access. 8: p. 34717-34727.
141. Vaishya, R., Javaid, M., Khan, I.-H., &Haleem, A. (2020). Artificial Intelligence (AI) applications for COVID-19 pandemic. Diabetes & Metabolic Syndrome: Clinical Research & Reviews. 14(4.): p. 337-339.

 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top

相關論文

無相關論文
 
* *