Data Security Mechanisms, Approaches, and Challenges for e-Health Smart Systems

被引:5
作者
Rafik, Hamza [1 ]
Maizate, Abderrahim [1 ]
Ettaoufik, Abdelaziz [2 ]
机构
[1] CED ENSEM Hassan II Univ, RITM ESTC, Casablanca, Morocco
[2] FS Ben MSIK Hassan II Univ, LTIM, Casablanca, Morocco
关键词
-Internet of Things (IoT); edge computing; blockchain network; Internet of Medical Things (IoMT); Artificial Intelligence (AI); healthcare data; Machine Learning (ML); Reinforcement Learning (RL); cloud computing; security; CLOUD; EDGE; INTERNET; IOT; TRANSMISSION; TECHNOLOGY; FRAMEWORK; PROTOCOL; MODEL;
D O I
10.3991/ijoe.v19i02.37069
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
the new era, the trend of using wearable devices and smart accessories gained considerable popularity and become a necessity utility for human life due to their major role to keep monitoring health conditions and providing healthcare services. The combination of IoT networks with edge computing paradigms develops an intelligent e-health system that aims to monitor different real-time scenarios. The deployment of an e-health system exposes several challenges regarding the security and privacy aspects, particularly in the case of dealing with an enormous quantity of medical data and the risk presented by exchanging operations with external entities. In this paper a comprehensive presentation covered the basic topics of e-health system layers thus the advantages and limitations in terms of existing challenges has been mentioned, subsequently, adapted to the exposed cyber risk through the traditional systems in exchanging medical data, a discussion of the blockchain technology come over for new application opportunities, where this approach efficiently ensure the security of data transactions over the network, in addition, an overview outlined the main research works related to this technology. Therefore, a presentation study of diverse works reveals different security framework solutions related to e-health system's layers, furthermore, uncovering the benefits of integrating intelligent technologies such as Machine Learning (supervised, and unsupervised types), Deep Learning, and Reinforcement Learning as well as introducing a comparison analysis of multiple AI algorithm models based on their efficiency for future deployment related security purposes to provide a smart healthcare monitoring system that meets patient needs. The end of this review highlighted further research directions and the actual open challenges regarding the e-Health system's limitations.
引用
收藏
页码:42 / 66
页数:25
相关论文
共 72 条
  • [1] MEdge-Chain: Leveraging Edge Computing and Blockchain for Efficient Medical Data Exchange
    Abdellatif, Alaa Awad
    Samara, Lutfi
    Mohamed, Amr
    Erbad, Aiman
    Chiasserini, Carla Fabiana
    Guizani, Mohsen
    O'Connor, Mark Dennis
    Laughton, James
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (21) : 15762 - 15775
  • [2] Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry
    Abrar, Hina
    Hussain, Syed Jawad
    Chaudhry, Junaid
    Saleem, Kashif
    Orgun, Mehmet A.
    Al-Muhtadi, Jalal
    Valli, Craig
    [J]. IEEE ACCESS, 2018, 6 : 19140 - 19150
  • [3] Reinforcement learning approaches for efficient and secure blockchain-powered smart health systems
    Al-Marridi, Abeer Z.
    Mohamed, Amr
    Erbad, Aiman
    [J]. COMPUTER NETWORKS, 2021, 197
  • [4] Internet of Things security: A survey
    Alaba, Fadele Ayotunde
    Othman, Mazliza
    Hashem, Ibrahim Abaker Targio
    Alotaibi, Faiz
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 : 10 - 28
  • [5] Improving security in cloud by formal modeling of IaaS resources
    Amato, Flora
    Moscato, Francesco
    Moscato, Vincenzo
    Colace, Francesco
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 754 - 764
  • [6] [Anonymous], 2015, Comparing supervised learning algorithms
  • [7] A Supervised Intrusion Detection System for Smart Home IoT Devices
    Anthi, Eirini
    Williams, Lowri
    Slowinska, Malgorzata
    Theodorakopoulos, George
    Burnap, Pete
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05): : 9042 - 9053
  • [8] Arora P., 2012, International journal of advanced research in computer science and software engineering, V2
  • [9] Faulty Node Detection in Wireless Sensor Networks using a Recurrent Neural Network'
    Atiga, Jamila
    Mbarki, Nour El Houda
    Ejbali, Ridha
    Zaied, Mourad
    [J]. TENTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2017), 2018, 10696
  • [10] Bach LM, 2018, 2018 41ST INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P1545, DOI 10.23919/MIPRO.2018.8400278