期刊文献+
共找到237篇文章
< 1 2 12 >
每页显示 20 50 100
Fortifying Healthcare Data Security in the Cloud:A Comprehensive Examination of the EPM-KEA Encryption Protocol
1
作者 Umi Salma Basha Shashi Kant Gupta +2 位作者 Wedad Alawad SeongKi Kim Salil Bharany 《Computers, Materials & Continua》 SCIE EI 2024年第5期3397-3416,共20页
A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is stil... A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity Operations.We use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional method.This suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data. 展开更多
关键词 Cloud computing healthcare data security enhanced parallel multi-key encryption algorithm(EPM-KEA)
下载PDF
Cost analysis of radical resection of malignant breast tumors under the China Healthcare Security Diagnosis Related Groups payment system
2
作者 Yun-He Hu Ai-Dong Li 《World Journal of Clinical Cases》 SCIE 2024年第20期4174-4179,共6页
BACKGROUND Breast cancer is one of the most common malignant tumors in women worldwide and poses a severe threat to their health.Therefore,this study examined patients who underwent breast cancer surgery,analyzed hosp... BACKGROUND Breast cancer is one of the most common malignant tumors in women worldwide and poses a severe threat to their health.Therefore,this study examined patients who underwent breast cancer surgery,analyzed hospitalization costs and structure,and explored the impact of China Healthcare Security Diagnosis Related Groups(CHS-DRG)management on patient costs.It aimed to provide medical institutions with ways to reduce costs,optimize cost structures,reduce patient burden,and improve service efficiency.AIM To study the CHS-DRG payment system’s impact on breast cancer surgery costs.METHODS Using the CHS-DRG(version 1.1)grouping criteria,4073 patients,who underwent the radical resection of breast malignant tumors from January to December 2023,were included in the JA29 group;1028 patients were part of the CHS-DRG payment system,unlike the rest.Through an independent sample t-test,the length of hospital stay as well as total hospitalization,medicine and consumables,medical,nursing,medical technology,and management expenses were compared.Pearson’s correlation coefficient was used to test the cost correlation.RESULTS In terms of hospitalization expenses,patients in the CHS-DRG payment group had lower medical,nursing,and management expenses than those in the diagnosis-related group(DRG)non-payment group.For patients in the DRG payment group,the factors affecting the total hospitalization cost,in descending order of relevance,were medicine and consumable costs,consumable costs,medicine costs,medical costs,medical technology costs,management costs,nursing costs,and length of hospital stay.For patients in the DRG nonpayment group,the factors affecting the total hospitalization expenses in descending order of relevance were medicines and consumable expenses,consumable expenses,medical technology expenses,the cost of medicines,medical expenses,nursing expenses,length of hospital stay,and management expenses.CONCLUSION The CHS-DRG system can help control and reduce unnecessary medical expenses by controlling medicine costs,medical consumable costs,and the length of hospital stay while ensuring medical safety. 展开更多
关键词 China healthcare security Diagnosis Related Groups Real-world study Radical resection of malignant breast tumors Hospitalization costs Cost structure Average length of stay
下载PDF
Adaptation of Federated Explainable Artificial Intelligence for Efficient and Secure E-Healthcare Systems
3
作者 Rabia Abid Muhammad Rizwan +3 位作者 Abdulatif Alabdulatif Abdullah Alnajim Meznah Alamro Mourade Azrour 《Computers, Materials & Continua》 SCIE EI 2024年第3期3413-3429,共17页
Explainable Artificial Intelligence(XAI)has an advanced feature to enhance the decision-making feature and improve the rule-based technique by using more advanced Machine Learning(ML)and Deep Learning(DL)based algorit... Explainable Artificial Intelligence(XAI)has an advanced feature to enhance the decision-making feature and improve the rule-based technique by using more advanced Machine Learning(ML)and Deep Learning(DL)based algorithms.In this paper,we chose e-healthcare systems for efficient decision-making and data classification,especially in data security,data handling,diagnostics,laboratories,and decision-making.Federated Machine Learning(FML)is a new and advanced technology that helps to maintain privacy for Personal Health Records(PHR)and handle a large amount of medical data effectively.In this context,XAI,along with FML,increases efficiency and improves the security of e-healthcare systems.The experiments show efficient system performance by implementing a federated averaging algorithm on an open-source Federated Learning(FL)platform.The experimental evaluation demonstrates the accuracy rate by taking epochs size 5,batch size 16,and the number of clients 5,which shows a higher accuracy rate(19,104).We conclude the paper by discussing the existing gaps and future work in an e-healthcare system. 展开更多
关键词 Artificial intelligence data privacy federated machine learning healthcare system security
下载PDF
Amassing the Security:An Enhanced Authentication and Key Agreement Protocol for Remote Surgery in Healthcare Environment
4
作者 Tsu-Yang Wu Qian Meng +2 位作者 Lei Yang Saru Kumari Matin Pirouz 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第1期317-341,共25页
The development of the Internet of Things has facilitated the rapid development of various industries.With the improvement in people’s living standards,people’s health requirements are steadily improving.However,owi... The development of the Internet of Things has facilitated the rapid development of various industries.With the improvement in people’s living standards,people’s health requirements are steadily improving.However,owing to the scarcity of medical and health care resources in some areas,the demand for remote surgery has gradually increased.In this paper,we investigate remote surgery in the healthcare environment.Surgeons can operate robotic arms to perform remote surgery for patients,which substantially facilitates successful surgeries and saves lives.Recently,Kamil et al.proposed a secure protocol for surgery in the healthcare environment.However,after cryptanalyzing their protocol,we deduced that their protocols are vulnerable to temporary value disclosure and insider attacks.Therefore,we design an improved authentication and key agreement protocol for remote surgeries in the healthcare environment.Accordingly,we adopt the real or random(ROR)model and an automatic verification tool Proverif to verify the security of our protocol.Via security analysis and performance comparison,it is confirmed that our protocol is a relatively secure protocol. 展开更多
关键词 IoT healthcare security analysis AUTHENTICATION robotic arm ROR
下载PDF
Secured Cyber Security Algorithm for Healthcare System Using Blockchain Technology
5
作者 D.Doreen Hephzibah Miriam Deepak Dahiya +1 位作者 Nitin C.R.Rene Robin 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1889-1906,共18页
Blockchain technology is critical in cyber security.The most recent cryptographic strategies may be hacked as efforts are made to build massive elec-tronic circuits.Because of the ethical and legal implications of a p... Blockchain technology is critical in cyber security.The most recent cryptographic strategies may be hacked as efforts are made to build massive elec-tronic circuits.Because of the ethical and legal implications of a patient’s medical data,cyber security is a critical and challenging problem in healthcare.The image secrecy is highly vulnerable to various types of attacks.As a result,designing a cyber security model for healthcare applications necessitates extra caution in terms of data protection.To resolve this issue,this paper proposes a Lionized Golden Eagle based Homomorphic Elapid Security(LGE-HES)algorithm for the cybersecurity of blockchain in healthcare networks.The blockchain algorithm preserves the security of the medical image by performing hash function.The execution of this research is carried out by MATLAB software.The suggested fra-mework was tested utilizing Computed Tumor(CT)pictures and MRI image data-sets,and the simulation results revealed the proposed model’s profound implications.During the simulation,94.9%of malicious communications were recognized and identified effectively,according to the total outcomes statistics.The suggested model’s performance is also compared to that of standard approaches in terms of Root Mean Square Error(RMSE),Peak Signal to Noise Ratio(PSNR),Mean Square Error(MSE),time complexity,and other factors. 展开更多
关键词 healthcare system CYBERsecurity security data sharing blockchain
下载PDF
Medi-Block Record Secure Data Sharing in Healthcare System:Issues,Solutions and Challenges
6
作者 Zuriati Ahmad Zukarnain Amgad Muneer +1 位作者 Nur Atirah Mohamad Nassir Akram A。Almohammedi 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期2725-2740,共16页
With the advancements in the era of artificial intelligence,blockchain,cloud computing,and big data,there is a need for secure,decentralized medical record storage and retrieval systems.While cloud storage solves stor... With the advancements in the era of artificial intelligence,blockchain,cloud computing,and big data,there is a need for secure,decentralized medical record storage and retrieval systems.While cloud storage solves storage issues,it is challenging to realize secure sharing of records over the network.Medi-block record in the healthcare system has brought a new digitalization method for patients’medical records.This centralized technology provides a symmetrical process between the hospital and doctors when patients urgently need to go to a different or nearby hospital.It enables electronic medical records to be available with the correct authentication and restricts access to medical data retrieval.Medi-block record is the consumer-centered healthcare data system that brings reliable and transparent datasets for the medical record.This study presents an extensive review of proposed solutions aiming to protect the privacy and integrity of medical data by securing data sharing for Medi-block records.It also aims to propose a comprehensive investigation of the recent advances in different methods of securing data sharing,such as using Blockchain technology,Access Control,Privacy-Preserving,Proxy Re-Encryption,and Service-On-Chain approach.Finally,we highlight the open issues and identify the challenges regarding secure data sharing for Medi-block records in the healthcare systems. 展开更多
关键词 Medi-block record healthcare system Blockchain technology secure data sharing
下载PDF
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion
7
作者 Musheer Ahmad Reem Ibrahim Alkanhel +3 位作者 Naglaa FSoliman Abeer D.Algarni Fathi E.Abd El-Samie Walid El-Shafai 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2361-2380,共20页
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the ... Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the Internet of Medical Things(IoMT),equipped with cloud computing,has come out to be a beneficial paradigm in the healthcare field.However,the openness of networks and systems leads to security threats and illegal access.Therefore,reliable,fast,and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network.This paper presents an image protection scheme for healthcare applications to protect patients’medical image data exchanged in IoMT networks.The proposed security scheme depends on an enhanced 2D discrete chaotic map and allows dynamic substitution based on an optimized highly-nonlinear S-box and diffusion to gain an excellent security performance.The optimized S-box has an excellent nonlinearity score of 112.The new image protection scheme is efficient enough to exhibit correlation values less than 0.0022,entropy values higher than 7.999,and NPCR values around 99.6%.To reveal the efficacy of the scheme,several comparison studies are presented.These comparison studies reveal that the novel protection scheme is robust,efficient,and capable of securing healthcare imagery in IoMT systems. 展开更多
关键词 secure communication healthcare data encryption Internet of Medical Things(IoMT) discrete chaotic map substitution box(S-box)
下载PDF
Hybrid Security Techniques for Internet of Things Healthcare Applications 被引量:1
8
作者 Lobna Yehia Ayman Khedr Ashraf Darwish 《Advances in Internet of Things》 2015年第3期21-25,共5页
The Internet of Things (IoT) describes the future where every day physical objects will be connected to the internet and be able to identify themselves to other devices. IoT is a new revolution of the Internet and It ... The Internet of Things (IoT) describes the future where every day physical objects will be connected to the internet and be able to identify themselves to other devices. IoT is a new revolution of the Internet and It will effect in a large number of applications such as smart living, smart home, healthcare systems, smart manufacturing, environment monitoring, and smart logistics. This paper provides integration, summarizes and surveys some of the security techniques especially hybrid techniques that can be applied with healthcare applications in IoT environment. 展开更多
关键词 IOT healthcare APPLICATIONS HYBRID security Techniques BODY Area Networks
下载PDF
Healthcare Device Security Assessment through Computational Methodology
9
作者 Masood Ahmad Jehad F.Al-Amri +4 位作者 Ahmad F.Subahi Sabita Khatri Adil Hussain Seh Mohd Nadeem Alka Agrawal 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期811-828,共18页
The current study discusses the different methods used to secure healthcare devices and proposes a quantitative framework to list them in order of significances.The study uses the Hesitant Fuzzy(HF),Analytic Hierarchy... The current study discusses the different methods used to secure healthcare devices and proposes a quantitative framework to list them in order of significances.The study uses the Hesitant Fuzzy(HF),Analytic Hierarchy Process(AHP)integrated with Fuzzy Technical for Order Preference by Similarities to Ideal Solution(TOPSIS)to classify the best alternatives to security techniques for healthcare devices to securing the devices.The technique is enlisted to rate the alternatives based on the degree of satisfaction of their weights.The ranks of the alternatives consequently decide the order of priority for the techniques.A1 was the most probable alternative of all the alternatives,according to the ranks of the alternatives acquired.This means that the security of A2 healthcare devices is the greatest of all the alternatives picked.A corroborative guide for the developers and the makers in quantitatively determining the security of healthcare devices to engineer efficacious devices will be the findings drawn up with the assistance of the proposed framework.The assessments performed using the proposed framework are systematic,precise,and definitive.Therefore,the results of the present empirical analysis are a stronger and accurate choice than the manual assessment of the device’s security. 展开更多
关键词 healthcare devices HF-AHP.TOPSIS device security
下载PDF
A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security Ⅱ:Implementation 被引量:5
10
作者 刘谦 王观海 +2 位作者 翁楚良 骆源 李明禄 《China Communications》 SCIE CSCD 2011年第2期86-94,共9页
This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level securi... This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level security(MLS) in Xen. The Virt-BLP model is the theoretical basis of this MAC framework,and this MAC framework is the implementation of Virt-BLP model. Our last paper focuses on Virt-BLP model,while this paper concentrates on the design and implementation of MAC framework. For there is no MAC framework applicable to MLS in virtual machine system at present,our MAC framework fills the blank by applying Virt-BLP model to Xen,which is better than current researches to guarantee the security of communication between virtual machines(VMs) . The experimental results show that our MAC framework is effective to manage the communication between VMs. 展开更多
关键词 virt-BLP model MAC framework multi-level security XEN
下载PDF
BC-BLPM:A Multi-Level Security Access Control Model Based on Blockchain Technology 被引量:4
11
作者 Xiang Yu Zhangxiang Shu +1 位作者 Qiang Li Jun Huang 《China Communications》 SCIE CSCD 2021年第2期110-135,共26页
Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchai... Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchain is widely used in the field of access control with its decentralization,traceability and non-defective modification.Combining the blockchain technology and the Bell-LaPadula model,we propose a new access control model,named BCBLPM,for MLS environment.The“multi-chain”blockchain architecture is used for dividing resources into isolated access domains,providing a fine-grained data protection mechanism.The access control policies are implemented by smart contracts deployed in each access domain,so that the side chains of different access domains storage access records from outside and maintain the integrity of the records.Finally,we implement the BC-BLPM prototype system using the Hyperledger Fabric.The experimental and analytical results show that the model can adapt well to the needs of multi-level security environment,and it has the feasibility of application in actual scenarios. 展开更多
关键词 multi-level security(MLS) access control blockchain multi-chain smart contract
下载PDF
A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security I: Theory 被引量:1
12
作者 LIU Qian WANG Guanhai WENG Chuliang LUO Yuan LI Minglu 《China Communications》 SCIE CSCD 2010年第4期137-143,共7页
At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access con... At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access control (MAC) and MLS in virtual machine system,this paper designs Virt-BLP model,which is based on BLP model.For the distinction between virtual machine system and non-virtualized system,we build elements and security axioms of Virt-BLP model by modifying those of BLP.Moreover,comparing with BLP,the number of state transition rules of Virt-BLP is reduced accordingly and some rules can only be enforced by trusted subject.As a result,Virt-BLP model supports MAC and partial discretionary access control (DAC),well satisfying the requirement of MLS in virtual machine system.As space is limited,the implementation of our MAC framework will be shown in a continuation. 展开更多
关键词 Virtual Machine System Mandatory Access Control multi-level security Virt-BLP
下载PDF
A Secure and Efficient Signature Scheme for IoT in Healthcare 被引量:1
13
作者 Latika Kakkar Deepali Gupta +5 位作者 Sarvesh Tanwar Sapna Saxena Khalid Alsubhi Divya Anand Irene Delgado Noya Nitin Goyal 《Computers, Materials & Continua》 SCIE EI 2022年第12期6151-6168,共18页
To provide faster access to the treatment of patients,healthcare system can be integrated with Internet of Things to provide prior and timely health services to the patient.There is a huge limitation in the sensing la... To provide faster access to the treatment of patients,healthcare system can be integrated with Internet of Things to provide prior and timely health services to the patient.There is a huge limitation in the sensing layer as the IoT devices here have low computational power,limited storage and less battery life.So,this huge amount of data needs to be stored on the cloud.The information and the data sensed by these devices is made accessible on the internet from where medical staff,doctors,relatives and family members can access this information.This helps in improving the treatment as well as getting faster medical assistance,tracking of routine activities and health focus of elderly people on frequent basis.However,the data transmission from IoT devices to the cloud faces many security challenges and is vulnerable to different security and privacy threats during the transmission path.The purpose of this research is to design a Certificateless Secured Signature Scheme that will provide a magnificent amount of security during the transmission of data.Certificateless signature,that removes the intricate certificate management and key escrow problem,is one of the practical methods to provide data integrity and identity authentication for the IoT.Experimental result shows that the proposed scheme performs better than the existing certificateless signature schemes in terms of computational cost,encryption and decryption time.This scheme is the best combination of high security and cost efficiency and is further suitable for the resource constrained IoT environment. 展开更多
关键词 CSSS digital signature ECC IOT security SIGNCRYPTION smart healthcare system
下载PDF
A Usability Management Framework for Securing Healthcare Information System
14
作者 Hosam Alhakami Abdullah Baz +3 位作者 Wajdi Alhakami Abhishek Kumar Pandey Alka Agrawal Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2022年第9期1015-1030,共16页
Transformation from conventional business management systems tosmart digital systems is a recurrent trend in the current era. This has led to digitalrevolution, and in this context, the hardwired technologies in the s... Transformation from conventional business management systems tosmart digital systems is a recurrent trend in the current era. This has led to digitalrevolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remainsa serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses andcompromising software usability as well. Most of the data breaches are financiallymotivated, especially in the healthcare sector. The cyber invaders continuouslypenetrate the E- Health data because of the high cost of the data on the darkweb. Therefore, security assessment of healthcare web-based applicationsdemands immediate intervention mechanisms to weed out the threats of cyberattacks for the sake of software usability. The proposed disclosure is a unique process of three phases that are combined by researchers in order to produce andmanage usability management framework for healthcare information system. Inthis most threatened time of digital era where, Healthcare data industry has bornethe brunt of the highest number of data breach episodes in the last few years. Thekey reason for this is attributed to the sensitivity of healthcare data and the highcosts entailed in trading the data over the dark web. Hence, usability managementof healthcare information systems is the need of hour as to identify the vulnerabilities and provide preventive measures as a shield against the breaches. The proposed unique developed model of usability management workflow is preparedby associating steps like learn;analyze and manage. All these steps gives an allin one package for the healthcare information management industry because thereis no systematic model available which associate identification to implementationsteps with different evaluation steps. 展开更多
关键词 Smart healthcare healthcare industry USABILITY security
下载PDF
Literature Review of Multi-illar Multi-level Old-age Security System
15
作者 GONG YiJing 《International English Education Research》 2018年第1期1-3,共3页
Since the 1970s, according to the international pension system reform trend for old-age social security system, no single institutional arrangement can ensure the functions of endowment security system to achieve the ... Since the 1970s, according to the international pension system reform trend for old-age social security system, no single institutional arrangement can ensure the functions of endowment security system to achieve the optimal.Therefore,how to based on the present situation of development, and to accurately, thus promote the resources integration, comprehensive build multi-level old-age security system, has important policy and practice significance. 展开更多
关键词 PENSION security multi-level Literature review
下载PDF
Optimal Confidential Mechanisms in Smart City Healthcare 被引量:4
16
作者 R.Gopi P.Muthusamy +4 位作者 P.Suresh C.G.Gabriel Santhosh Kumar Irina V.Pustokhina Denis A.Pustokhin K.Shankar 《Computers, Materials & Continua》 SCIE EI 2022年第3期4883-4896,共14页
Smart City Healthcare(SHC2)system is applied in monitoring the patient at home while it is also expected to react to their needs in a timely manner.The system also concedes the freedom of a patient.IoT is a part of th... Smart City Healthcare(SHC2)system is applied in monitoring the patient at home while it is also expected to react to their needs in a timely manner.The system also concedes the freedom of a patient.IoT is a part of this system and it helps in providing care to the patients.IoTbased healthcare devices are trustworthy since it almost certainly recognizes the potential intensifications at very early stage and alerts the patients and medical experts to such an extent that they are provided with immediate care.Existing methodologies exhibit few shortcomings in terms of computational complexity,cost and data security.Hence,the current research article examines SHC2 security through LightWeight Cipher(LWC)with Optimal S-Box model in PRESENT cipher.This procedure aims at changing the sub bytes in which a single function is connected with several bytes’information to upgrade the security level through Swam optimization.The key contribution of this research article is the development of a secure healthcare model for smart city using SHC2 security via LWC and Optimal S-Box models.The study used a nonlinear layer and single 4-bit S box for round configuration after verifying SHC2 information,constrained by Mutual Authentication(MA).The security challenges,in healthcare information systems,emphasize the need for a methodology that immovably concretes the establishments.The methodology should act practically,be an effective healthcare framework that depends on solidarity and adapts to the developing threats.Healthcare service providers integrated the IoT applications and medical services to offer individuals,a seamless technology-supported healthcare service.The proposed SHC^(2) was implemented to demonstrate its security levels in terms of time and access policies.The model was tested under different parameters such as encryption time,decryption time,access time and response time inminimum range.Then,the level of the model and throughput were analyzed by maximum value i.e.,50Mbps/sec and 95.56%for PRESENT-Authorization cipher to achieve smart city security.The proposed model achieved better results than the existing methodologies. 展开更多
关键词 Smart city healthcare security block cipher LWC
下载PDF
Fighting COVID-19 and Future Pandemics With the Internet of Things:Security and Privacy Perspectives 被引量:2
17
作者 Mohamed Amine Ferrag Lei Shu Kim-Kwang Raymond Choo 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第9期1477-1499,共23页
The speed and pace of the transmission of severe acute respiratory syndrome coronavirus 2(SARS-CoV-2;also referred to as novel Coronavirus 2019 and COVID-19)have resulted in a global pandemic,with significant health,f... The speed and pace of the transmission of severe acute respiratory syndrome coronavirus 2(SARS-CoV-2;also referred to as novel Coronavirus 2019 and COVID-19)have resulted in a global pandemic,with significant health,financial,political,and other implications.There have been various attempts to manage COVID-19 and other pandemics using technologies such as Internet of Things(IoT)and 5G/6G communications.However,we also need to ensure that IoT devices used to facilitate COVID-19 monitoring and treatment(e.g.,medical IoT devices)are secured,as the compromise of such devices can have significant consequences(e.g.,life-threatening risks to COVID-19 patients).Hence,in this paper we comprehensively survey existing IoT-related solutions,potential security and privacy risks and their requirements.For example,we classify existing security and privacy solutions into five categories,namely:authentication and access control solutions,key management and cryptography solutions,blockchain-based solutions,intrusion detection systems,and privacy-preserving solutions.In each category,we identify the associated challenges.We also identify a number of recommendations to inform future research. 展开更多
关键词 Blockchain COVID-19 healthcare PRIVACY SARS-CoV-2 security
下载PDF
Blockchain-as-a-Utility for Next-Generation Healthcare Internet of Things 被引量:1
18
作者 Alaa Omran Almagrabi Rashid Ali +2 位作者 Daniyal Alghazzawi Abdullah AlBarakati Tahir Khurshaid 《Computers, Materials & Continua》 SCIE EI 2021年第7期359-376,共18页
The scope of the Internet of Things(IoT)applications varies from strategic applications,such as smart grids,smart transportation,smart security,and smart healthcare,to industrial applications such as smart manufacturi... The scope of the Internet of Things(IoT)applications varies from strategic applications,such as smart grids,smart transportation,smart security,and smart healthcare,to industrial applications such as smart manufacturing,smart logistics,smart banking,and smart insurance.In the advancement of the IoT,connected devices become smart and intelligent with the help of sensors and actuators.However,issues and challenges need to be addressed regarding the data reliability and protection for signicant nextgeneration IoT applications like smart healthcare.For these next-generation applications,there is a requirement for far-reaching privacy and security in the IoT.Recently,blockchain systems have emerged as a key technology that changes the way we exchange data.This emerging technology has revealed encouraging implementation scenarios,such as secured digital currencies.As a technical advancement,the blockchain network has the high possibility of transforming various industries,and the next-generation healthcare IoT(HIoT)can be one of those applications.There have been several studies on the integration of blockchain networks and IoT.However,blockchain-as-autility(BaaU)for privacy and security in HIoT systems requires a systematic framework.This paper reviews blockchain networks and proposes BaaU as one of the enablers.The proposed BaaU-based framework for trustworthiness in the next-generation HIoT systems is divided into two scenarios.The rst scenario suggests that a healthcare service provider integrates IoT sensors such as body sensors to receive and transmit information to a blockchain network on the IoT devices.The second proposed scenario recommends implementing smart contracts,such as Ethereum,to automate and control the trusted devices’subscription in the HIoT services. 展开更多
关键词 blockchain next-generation IoT privacy and security healthcare IoT complex healthcare applications
下载PDF
Hybrid Computational Modeling for Web Application Security Assessment 被引量:1
19
作者 Adil Hussain Seh Jehad F.Al-Amri +4 位作者 Ahmad F.Subahi Md Tarique Jamal Ansari Rajeev Kumar Mohammad Ubaidullah Bokhari Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2022年第1期469-489,共21页
Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era.This has led to digital revolution,and in this context,the hardwired technologies in the so... Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era.This has led to digital revolution,and in this context,the hardwired technologies in the software industry play a significant role However,from the beginning,software security remains a serious issue for all levels of stakeholders.Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data,compromising the organizations’reputation that translates into,financial losses as well.Most of the data breaches are financially motivated,especially in the healthcare sector.The cyber invaders continuously penetrate the E-Health data because of the high cost of the data on the dark web.Therefore,security assessment of healthcare web-based applications demands immediate intervention mechanisms to weed out the threats of cyber-attacks.The aim of this work is to provide efficient and effective healthcare web application security assessment.The study has worked with the hybrid computational model of Multi-Criteria Decision Making(MCDM)based on Analytical Hierarchy Process(AHP)and Technique for Order of Preference by Similarity to Ideal-Solutions(TOPSIS)under the Hesitant Fuzzy(HF)environment.Hesitant fuzzy sets provide effective solutions to address decision making problems where experts counter hesitation to make a decision.The proposed research endeavor will support designers and developers in identifying,selecting and prioritizing the best security attributes for web applications’development.The empirical analysis concludes that Robustness got highest priority amongst the assessed security attributes set followed by Encryption,Authentication,Limit Access,Revoke Access,Data Validation,and Maintain Audit Trail.The results of this research endeavor depict that this proposed computational procedure would be the most conversant mechanism for determining the web application security.The study also establishes guidelines which the developers can refer for the identification and prioritization of security attributes to build more secure and trustworthy web-based applications. 展开更多
关键词 healthcare web application security assessment hesitant fuzzy sets AHP-TOPSIS
下载PDF
Sensors Applied in Healthcare Environments
20
作者 Wei Vivien Shi 《Journal of Computer and Communications》 2016年第5期99-106,共8页
In this paper, the recent advances of sensors applied in healthcare environments are presented. Based on the function and operation of modern health and wellness measurement and monitoring and mHealth solutions, a var... In this paper, the recent advances of sensors applied in healthcare environments are presented. Based on the function and operation of modern health and wellness measurement and monitoring and mHealth solutions, a variety of sensors are described with their features and applications. Further improvements and future trend are pointed out and discussed. 展开更多
关键词 healthcare SENSORS MHEALTH security
下载PDF
上一页 1 2 12 下一页 到第
使用帮助 返回顶部