Reference Hub5
Advancements in Data Security and Privacy Techniques Used in IoT-Based Hospital Applications

Advancements in Data Security and Privacy Techniques Used in IoT-Based Hospital Applications

Ankita Tiwari, Raghuvendra Pratap Tripathi, Dinesh Bhatia
Copyright: © 2019 |Pages: 23
ISBN13: 9781522579526|ISBN10: 1522579524|EISBN13: 9781522579533
DOI: 10.4018/978-1-5225-7952-6.ch010
Cite Chapter Cite Chapter

MLA

Tiwari, Ankita, et al. "Advancements in Data Security and Privacy Techniques Used in IoT-Based Hospital Applications." Medical Data Security for Bioengineers, edited by Butta Singh, et al., IGI Global, 2019, pp. 185-207. https://doi.org/10.4018/978-1-5225-7952-6.ch010

APA

Tiwari, A., Tripathi, R. P., & Bhatia, D. (2019). Advancements in Data Security and Privacy Techniques Used in IoT-Based Hospital Applications. In B. Singh, B. Saini, D. Singh, & A. Pandey (Eds.), Medical Data Security for Bioengineers (pp. 185-207). IGI Global. https://doi.org/10.4018/978-1-5225-7952-6.ch010

Chicago

Tiwari, Ankita, Raghuvendra Pratap Tripathi, and Dinesh Bhatia. "Advancements in Data Security and Privacy Techniques Used in IoT-Based Hospital Applications." In Medical Data Security for Bioengineers, edited by Butta Singh, et al., 185-207. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7952-6.ch010

Export Reference

Mendeley
Favorite

Abstract

The risk of encountering new diseases is on the rise in medical centers globally. By employing advancements in medical sensors technology, new health monitoring programs are being developed for continuous monitoring of physiological parameters in patients. Since the stored medical data is personal health record of an individual, it requires delicate and secure handling. In wireless transmission networks, medical data is disposed of to avoid loss due to alteration, eavesdropping, etc. Hence, privacy and security of the medical data are the major considerations during wireless transfer through Medical Sensor Network of MSNs. This chapter delves upon understanding the working of a secure monitoring system wherein the data could be continuously observed with the support of MSNs. Process of sanctioning secure data to authorized users such as physician, clinician, or patient through the key provided to access the file are also explained. Comparative analysis of the encryption techniques such as paillier, RSA, and ELGamal has been included to make the reader aware in selecting a useful technique for a particular hospital application.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.