Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments

Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo

Abstract:

This paper presents an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.

Keywords: Cloud, enhancing security, Fog, IoT, telehealth.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 61

References:


[1] Atlam, H. F., Walters, R. J., and Wills, G. B. (2018). Fog computing and the internet of things: A review. Big Data and Cognitive Computing, 2(2):10, DOI:10.3390/bdcc202001.
[2] Wootton, R. (2012). Telemedicine. British Journal of Hospital Medicine, 73(9), 504-507.
[3] Smith, M., & Chan, S. (2016). Security of Things: A Study of Security Concerns in the Internet of Things. Procedia Computer Science, 83, 784–789.
[4] Yi, S., Hao, Z., & Qin, Z. (2015). Fog Computing: Platform and Applications. Proceedings of the 2015 Workshop on Mobile Big Data, 13–18.
[5] Kshetri, N. (2019). Cloud Computing in Healthcare. In The Cloud, Privacy and the Future of the Internet Economy (pp. 125–148). Palgrave Macmillan.
[6] Elmisery, A. M., & Abd Elaziz, M. (2018). A systematic review on securing data in Internet of Things: The case of cloud-centric and fog-centric computing. Journal of Network and Computer Applications, 103, 1–20.
[7] Zhang, X., Wang, Y., & Ahmad, I. (2017). Security Models and Solutions for Mobile Healthcare Systems: A Review. Journal of Medical Systems, 41(8), 123.
[8] Alaba, F. A., Othman, M., Hashem, I. A. T., Alotaibi, F., & Zomaya, A. Y. (2017). Internet of Things Security: A Review. Journal of Computer and System Sciences, 89, 422–434.
[9] Suo, H., Wan, J., Zou, C., & Liu, J. (2012). Security in the Internet of Things: A Review. Journal of Computer Science and Technology, 27(3), 467–484.
[10] Dorri, A., Kanhere, S. S., & Jurdak, R. (2017). Blockchain in Internet of Things: Challenges and Solutions. CoRR, abs/1708.05822.
[11] Shu, L., Zhang, D., & Wang, S. (2017). Fog Computing for Sustainable Smart Cities: A Survey. ACM Computing Surveys, 50(3), 32.
[12] Rahmani, A. M., Gia, T. N., Negash, B., Anzanpour, A., Azimi, I., & Jiang, M. (2018). Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach. Future Generation Computer Systems, 78, 641–658.
[13] Khan, R., & Khan, S. U. (2017). A comprehensive review on smart e-Healthcare system: framework, architecture, and state-of-the-art. IEEE Transactions on Industrial Informatics, 13(1), 575–582.
[14] Bertino, E., Sandhu, R. (2005). A Survey of Role Based Access Control. IEEE Communications Surveys & Tutorials, 7(2), 51-55.
[15] Yaqoob, I., Hashem, I. A. T., Inayat, Z., et al. (2017). Internet of Things Forensics: Recent Advances, Taxonomy, Requirements, and Open Challenges. IEEE Communications Surveys & Tutorials, 19(4), 2396–2420.
[16] Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of Things: Vision, Applications and Research Challenges. Ad Hoc Networks, 10(7), 1497–1516.
[17] Yi, S., Hao, Z., & Qin, Z. (2019). Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions. IEEE Access, 7, 92528–92552.