Security and privacy issues in unified IoT-based skin monitoring system

被引:4
作者
Juyal, Shuchi [1 ]
Sharma, Sachin [1 ]
Shukla, Amal Shankar [1 ]
机构
[1] Graph Era, Dept Comp Sci & Engn, Dehra Dun, Uttarakhand, India
关键词
Skincare; IoT; Cloud; Security; Privacy;
D O I
10.1016/j.matpr.2021.01.718
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Healthcare Sector is one of the most benefitted areas among all which gets the benefit of Internet of things. It allows the healthcare industry to work in a system, were it become possible to provide realtime, on demand quick medical care and services based upon individual's requirements. Skin Monitoring is one of the emerging field in healthcare, which is now been taken care of using IoT and Cloud integrated services. The systems permit skincare providers to diagnose and cure the disease by automatically collecting information from the advanced system. Fast decision making and preventive cure based on the data ensure early diagnosis and quick treatment. Connected devices in skin monitoring System can offer many advantages; however, being a part of network there is an increased risk to both to privacy and security. The paper proposes a layered architecture of a unified IoT-based skin monitoring system and discusses different outlooks towards existing security and privacy challenges within the systems. (c) 2021 Elsevier Ltd. All rights reserved. Selection and peer-review under responsibility of the scientific committee of the International Conference on Technological Advancements in Materials Science and Manufacturing.
引用
收藏
页码:10815 / 10820
页数:6
相关论文
共 25 条
[1]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[2]  
[Anonymous], 2014, P 2014 EUR MED TELC
[3]  
Bhadula S., 2020, INT J RECENT TECHNOL, V8
[4]  
Bharathi M. V., 2012, P 2012 IEEE INT C CO
[5]   Self-organized public-key management for mobile ad hoc networks [J].
Capkun, S ;
Buttyán, L ;
Hubaux, JP .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2003, 2 (01) :52-64
[6]   TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks [J].
Chuang, Ming-Chin ;
Lee, Jeng-Farn .
IEEE SYSTEMS JOURNAL, 2014, 8 (03) :749-758
[7]   Taxonomy and analysis of security protocols for Internet of Things [J].
Das, Ashok Kumar ;
Zeadally, Sherali ;
He, Debiao .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 :110-125
[8]  
Juyal S., 2020, P 2020 IEEE INT C EL, P1, DOI 10.1109/ CONECCT50063.2020.9198409
[9]  
Kalnoor G, 2016, PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016)
[10]  
Lu Tan, 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE 2010), P376, DOI 10.1109/ICACTE.2010.5579543