IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Advancements in Data Security and Privacy Techniques Used in IoT-Based Hospital Applications

Advancements in Data Security and Privacy Techniques Used in IoT-Based Hospital Applications
View Sample PDF
Author(s): Ankita Tiwari (Amity University, India), Raghuvendra Pratap Tripathi (Amity University, India)and Dinesh Bhatia (North Eastern Hill University, India)
Copyright: 2019
Pages: 23
Source title: Medical Data Security for Bioengineers
Source Author(s)/Editor(s): Butta Singh (Guru Nanak Dev University, India), Barjinder Singh Saini (Dr. B. R. Ambedkar National Institute of Technology, India), Dilbag Singh (Dr. B. R. Ambedkar National Institute of Technology, India)and Anukul Pandey (Dumka Engineering College, India)
DOI: 10.4018/978-1-5225-7952-6.ch010

Purchase

View Advancements in Data Security and Privacy Techniques Used in IoT-Based Hospital Applications on the publisher's website for pricing and purchasing information.

Abstract

The risk of encountering new diseases is on the rise in medical centers globally. By employing advancements in medical sensors technology, new health monitoring programs are being developed for continuous monitoring of physiological parameters in patients. Since the stored medical data is personal health record of an individual, it requires delicate and secure handling. In wireless transmission networks, medical data is disposed of to avoid loss due to alteration, eavesdropping, etc. Hence, privacy and security of the medical data are the major considerations during wireless transfer through Medical Sensor Network of MSNs. This chapter delves upon understanding the working of a secure monitoring system wherein the data could be continuously observed with the support of MSNs. Process of sanctioning secure data to authorized users such as physician, clinician, or patient through the key provided to access the file are also explained. Comparative analysis of the encryption techniques such as paillier, RSA, and ELGamal has been included to make the reader aware in selecting a useful technique for a particular hospital application.

Related Content

Shweta Arun Avhad. © 2023. 21 pages.
Majorie Moraa Nyasani, Victor Odhiambo Shikuku. © 2023. 10 pages.
Prashant Kumar, Sunil Kumar Verma. © 2023. 12 pages.
Sunil Kumar Verma, Prashant Kumar. © 2023. 21 pages.
Kannadhasan S., Nagarajan R.. © 2023. 10 pages.
Kondapalli Vamsi Krishna, Sompalli Bhavana, Koushik Koujalagi, Alok Malaviya. © 2023. 44 pages.
Bela Khiratkar, Shankar Mukundrao Khade, Abhishek Dutt Tripathi. © 2023. 10 pages.
Body Bottom