Internet of Healthcare Things
Machine Learning for Security and Privacy
Inbunden, Engelska, 2022
Av Kavita Sharma, Yogita Gigras, Vishnu Sharma, D. Jude Hemanth, Ramesh Chandra Poonia, D Jude Hemanth
2 209 kr
Produktinformation
- Utgivningsdatum2022-03-11
- Mått10 x 10 x 10 mm
- Vikt454 g
- FormatInbunden
- SpråkEngelska
- SerieMachine Learning in Biomedical Science and Healthcare Informatics
- Antal sidor304
- FörlagJohn Wiley & Sons Inc
- ISBN9781119791768
Tillhör följande kategorier
Kavita Sharma, PhD is an associate professor in the Department of CSE at Galgotias College of Engineering and Technology, Greater Noida, India. She has 4 patents (2 Granted and 2 published), published 6 books and 50 research articles in international journals and conferences. Her area of interest includes information and cyber security, mobile computing, IoT security, data analytics and machine learning.Yogita Gigras, PhD is an assistant professor in the Department of CSE & IT, School of Engineering & Technology of The North Cap University, Haryana, India. She has published more than 30 research papers in peer-reviewed international journals and conferences and has more than 12 years of teaching experience at both post and undergraduate level. Vishnu Sharma, PhD is Head of Department and Professor in Computer Science and Engineering at Galgotias College of Engineering and Technology Greater Noida, UP, India. He has published more than 50 research papers in international and national journals and conferences as well as two books on mobile computing. He has more than 21 years of teaching experience in engineering institutes and universities. D. Jude Hemanth, PhD is at the Department of ECE, Karunya University, Coimbatore, India. He has authored more than 100 research papers in SCIE/Scopus indexed international journals conferences as well as authored 1 book and edited 11 others. Ramesh Chandra (Poonia), PhD is an associate professor in the Department of Computer Science, CHRIST (Deemed to be University), Bangalore, Karnataka, India. He has authored more than 65 research papers in SCIE/Scopus indexed international journals conferences as well as authored 6 books.
- Preface xiiiSection 1: Security and Privacy Concern in IoHT 11 Data Security and Privacy Concern in the Healthcare System 3Ahuja Sourav1.1 Introduction 31.2 Privacy and Security Concerns on E-Health Data 61.3 Levels of Threat to Information in Healthcare Organizations 61.4 Security and Privacy Requirement 91.5 Security of Healthcare Data 111.5.1 Existing Solutions 111.5.2 Future Challenges in Security and Privacy in the Healthcare Sector 151.5.3 Future Work to be Done in Security and Privacy in the Healthcare Sector 161.6 Privacy-Preserving Methods in Data 181.7 Conclusion 22References 232 Authentication and Authorization Mechanisms for Internet of Healthcare Things 27Srinivasan Lakshmi Narasimhan2.1 Introduction 282.2 Stakeholders in IoHT 292.3 IoHT Process Flow 312.4 Sources of Vulnerability 332.5 Security Features 342.6 Challenges to the Security Fabric 352.7 Security Techniques—User Authentication 362.8 Conclusions 37References 383 Security and Privacy Issues Related to Big Data-Based Ubiquitous Healthcare Systems 41Jaspreet Singh3.1 Introduction 413.2 Big Data Privacy & Security Issues 423.3 Big Data Security Problem 433.3.1 Big Data Security Lifecycle 443.3.2 Threats & Attacks on Big Data 473.3.3 Current Technologies in Use 483.4 Privacy of Big Data in Healthcare 503.4.1 Data Protection Acts 503.4.1.1 HIPAA Compliance 503.4.1.2 HIPAA Five Rules 533.5 Privacy Conserving Methods in Big Data 563.6 Conclusion 60References 61Section 2: Application of Machine Learning, Blockchain and Fog Computing on IoHT 654 Machine Learning Aspects for Trustworthy Internet of Healthcare Things 67Pradeep Bedi, S.B. Goyal, Jugnesh Kumar and Preetishree Patnaik4.1 Introduction 684.2 Overview of Internet of Things 694.2.1 Application Area of IoT 724.2.1.1 Wearable Devices 734.2.1.2 Smart Home Applications 734.2.1.3 Healthcare IoT Applications 734.2.1.4 Smart Cities 734.2.1.5 Smart Agriculture 744.2.1.6 Industrial Internet of Things 744.3 Security Issues of IoT 744.3.1 Authentication 754.3.2 Integrity 754.3.3 Confidentiality 754.3.4 Non-Repudiation 754.3.5 Authorization 764.3.6 Availability 764.3.7 Forward Secrecy 764.3.8 Backward Secrecy 764.4 Internet of Healthcare Things (IoHT): Architecture and Challenges 764.4.1 IoHT Support 774.4.2 IoHT Architecture and Data Processing Stages 784.4.3 Benefits Associated With Healthcare Based on the IoT 804.4.4 Challenges Faced by IoHT 814.4.5 Needs in IoHT 814.5 Security Protocols in IoHT 824.5.1 Key Management 834.5.2 User/Device Authentication 834.5.3 Access Control/User Access Control 834.5.4 Intrusion Detection 834.6 Application of Machine Learning for Intrusion Detection in IoHT 844.7 Proposed Framework 864.8 Conclusion 90References 905 Analyzing Recent Trends and Public Sentiment for Internet of Healthcare Things and Its Impacton Future Health Crisis 95Upendra Dwivedi5.1 Introduction 965.2 Literature Review 975.3 Overview of the Internet of Healthcare Things 1005.4 Performing Topic Modeling on IoHTs Dataset 1045.5 Performing Sentiment Analysis on IoHTs Dataset 1075.6 Conclusion and Future Scope 110References 1116 Rise of Telemedicine in Healthcare Systems Using Machine Learning: A Key Discussion 113Shaweta Sachdeva and Aleem Ali6.1 Introduction 1146.2 Types of Machine Learning 1156.3 Telemedicine Advantages 1156.4 Telemedicine Disadvantages 1166.5 Review of Literature 1166.6 Fundamental Key Components Needed to Begin Telemedicine 1186.6.1 Collaboration Instruments 1186.6.2 Clinical Peripherals 1196.6.3 Work Process 1196.6.4 Cloud-Based Administrations 1196.7 Types of Telemedicine 1196.7.1 Store-and-Forward Method 1196.7.1.1 Telecardiology 1206.7.1.2 Teleradiology 1216.7.1.3 Telepsychiatry 1216.7.1.4 Telepharmacy 1216.7.2 Remote Monitoring 1236.7.3 Interactive Services 1236.8 Benefits of Telemedicine 1246.9 Application of Telemedicine Using Machine Learning 1256.10 Innovation Infrastructure of Telemedicine 1256.11 Utilization of Mobile Wireless Devices in Telemedicine 1266.12 Conclusion 127References 1287 Trusted Communication in the Healthcare Sector Using Blockchain 131Balasamy K.7.1 Introduction 1317.2 Overview of Blockchain 1337.3 Medical IoT Concerns 1347.3.1 Security Concerns 1347.3.2 Privacy Concerns 1357.3.3 Trust Concerns 1357.4 Needs for Security in Medical IoT 1357.5 Uses of Blockchain in Healthcare 1377.6 Solutions for IoT Healthcare Cyber-Security 1387.6.1 Architecture of the Smart Healthcare System 1397.6.1.1 Data Perception Layer 1397.6.1.2 Data Communication Layer 1407.6.1.3 Data Storage Layer 1407.6.1.4 Data Application Layer 1407.7 Executions of Trusted Environment 1407.7.1 Root of Trust Security Services 1417.7.2 Chain of Trust Security Services 1437.8 Patient Registration Using Medical IoT Devices 1447.8.1 Encryption 1457.8.2 Key Generation 1467.8.3 Security by Isolation 1467.8.4 Virtualization 1467.9 Trusted Communications Using Blockchain 1497.9.1 Record Creation Using IoT Gateways 1507.9.2 Accessibility to Patient Medical History 1517.9.3 Patient Enquiry With the Hospital Authority 1517.9.4 Blockchain-Based IoT System Architecture 1517.9.4.1 First Layer 1517.9.4.2 Second Layer 1527.9.4.3 Third Layer 1527.10 Combined Workflows 1527.10.1 Layer 1: The Gateway Collects IoT Data and Generates a New Record 1527.10.2 Layer 2: Gateway/Authority Want to Access Patient’s Medical Record 1537.10.3 Layer 3: Patient Visits and Interact With an Authority 1537.11 Conclusions 154References 1548 Blockchain in Smart Healthcare Management 161Jayant Barak, Harshwardhan Chaudhary, Rakshit Mangal, Aarti Goel and Deepak Kumar Sharma8.1 Introduction 1628.2 Healthcare Industry 1638.2.1 Classification of Healthcare Services 1638.2.2 Health Information Technology (HIT) 1648.2.3 Issues and Challenges Faced by Major Stakeholders in the Healthcare Industry 1658.2.3.1 The Patient 1668.2.3.2 The Pharmaceutical Industry 1668.2.3.3 The Healthcare Service Providers 1668.2.3.4 The Government 1678.2.3.5 Insurance Company 1678.3 Blockchain Technology 1688.3.1 Important Terms 1688.3.2 Features of Blockchain 1708.3.2.1 Decentralization 1708.3.2.2 Immutability 1708.3.2.3 Transparency 1718.3.2.4 Smart Contracts 1718.3.3 Workings of a Blockchain System 1718.3.4 Applications of Blockchain 1738.3.4.1 Financial Services 1738.3.4.2 Healthcare 1738.3.4.3 Supply Chain 1738.3.4.4 Identity Management 1738.3.4.5 Voting 1738.3.5 Challenges and Drawbacks of Blockchain 1748.4 Applications of Blockchain in Healthcare 1768.4.1 Electronic Medical Records (EMR) and Electronic Health Records (EHR) 1768.4.2 Management System 1778.4.3 Remote Monitoring/IoMT 1788.4.4 Insurance Industry 1798.4.5 Drug Counterfeiting 1808.4.6 Clinical Trials 1828.4.7 Public Health Management 1828.5 Challenges of Blockchain in Healthcare 1838.6 Future Research Directions 1848.7 Conclusion 185References 186Section 3: Case Studies of Healthcare 1899 Organ Trafficking on the Dark Web—The Data Security and Privacy Concern in Healthcare Systems 191Romil Rawat, Bhagwati Garg, Vinod Mahor, Shrikant Telang, Kiran Pachlasiya and Mukesh Chouhan9.1 Introduction 1929.2 Inclination for Cybersecurity Web Peril 1949.3 Literature Review 1979.4 Market Paucity or Organ Donors 1999.5 Organ Harvesting and Transplant Tourism Revenue 2039.6 Social Web Net Crimes 2049.7 DW—Frontier of Illicit Human Harvesting 2099.8 Organ Harvesting Apprehension 2099.9 Result and Discussions 2129.10 Conclusions 212References 21310 Deep Learning Techniques for Data Analysis Prediction in the Prevention of Heart Attacks 217C.V. Aravinda, Meng Lin, Udaya Kumar, Reddy K.R. and G. Amar PrabhuAbbreviations 21810.1 Introduction 21810.2 Literature Survey 21910.3 Materials and Method 22110.3.1 Cohort Study 22210.4 Training Models 22210.4.1 Artificial Neural Network (ANN) 22210.4.2 K-Nearest Neighbor Classifier 22410.4.3 Naïve Bayes Classifier 22510.4.4 Decision Tree Classifier (DTC) 22610.4.5 Random Forest Classifier (RFC) 22610.4.6 Neural Network Implementation 22610.5 Data Preparation 22710.5.1 Multi-Layer Perceptron Neural Network (MLPNN) Algorithm and Prediction 22710.6 Results Obtained 22810.6.1 Accuracy 22810.6.2 Data Analysis 22810.7 Conclusion 236References 23611 Supervising Healthcare Schemes Using Machine Learning in Breast Cancer and Internet of Things (SHSMLIoT) 241Monika Lamba, Geetika Munjal and Yogita Gigras11.1 Introduction 24211.2 Related Work 24511.3 IoT and Disease 25011.4 Research Materials and Methods 25111.4.1 Dataset 25111.4.2 Data Pre-Processing 25211.4.3 Classification Algorithms 25211.5 Experimental Outcomes 25311.6 Conclusion 257References 25812 Perspective-Based Studies of Trust in IoHT and Machine Learning-Brain Cancer 265Sweta Kumari, Akhilesh Kumar Sharma, Sandeep Chaurasia and Shamik Tiwari12.1 Introduction 26612.2 Literature Survey 26712.3 Illustration of Brain Cancer 26812.3.1 Brain Tumor 26812.3.2 Types of Brain Tumors 26912.3.3 Grades of Brain Tumors 27012.3.4 Symptoms of Brain Tumors 27112.4 Sleuthing and Classification of Brain Tumors 27312.4.1 Sleuthing of Brain Tumors 27312.4.2 Challenges During Classification of Brain Tumors 27412.5 Survival Rate of Brain Tumors 27412.6 Conclusion 278References 279Index 281
Du kanske också är intresserad av
Computational Intelligence and Healthcare Informatics
Om Prakash Jena, Alok Ranjan Tripathy, Ahmed A. Elngar, Zdzislaw Polkowski, India) Jena, Om Prakash (Ravenshaw University, India) Tripathy, Alok Ranjan (Ravenshaw University, Egypt) Elngar, Ahmed A. (Beni-Suef University, Poland) Polkowski, Zdzislaw (Jan Wyzykowski University, Ahmed A Elngar
3 169 kr
Wellness Management Powered by AI Technologies
Bharat Bhushan, Akib Khanday, Khursheed Aurangzeb, Sudhir Kumar Sharma, Parma Nand, India) Bhushan, Bharat (School of Engineering Technology, Sharda University, Greater Noida, Uzbekistan) Khanday, Akib (United Arab Emirates University, UAE; Samarkand International University of Technology, Samarkand, Kingdom of Saudi Arabia) Aurangzeb, Khursheed (King Saud University, Riyadh, India) Sharma, Sudhir Kumar (KIET Group of Institutions, Delhi-NCR, Ghaziabad, India) Nand, Parma (School of Engineering Technology, Sharda University, Greater Noida
3 169 kr
Impact of Algorithmic Technologies on Healthcare
Parul Dubey, Mangala Madankar, Pushkar Dubey, Bui Thanh Hung, India) Dubey, Parul (Symbiosis Institute of Technology, Nagpur Campus, Symbiosis International (Deemed University), Pune, India) Madankar, Mangala (G H Raisoni College of Engineering, Nagpur, India) Dubey, Pushkar (Pandit Sundarlal Sharma (Open) University, Chhattisgarh, Vietnam) Hung, Bui Thanh (Industrial University of Ho Chi Minh City
3 169 kr
Handbook on Intelligent Healthcare Analytics
A. Jaya, K. Kalaiselvi, Dinesh Goyal, Dhiya Al-Jumeily, India) Jaya, A. (B. S. Abdur Rahman Crescent Institute of Science and Technology, India) Kalaiselvi, K. (Vels Institute of Science, Technology and Advanced Studies, Chennai, India) Goyal, Dinesh (Poornima Institute of Engineering & Technology, Jaipur, UK) Al-Jumeily, Dhiya (Liverpool John Moores University
2 919 kr
Medical Analytics for Clinical and Healthcare Applications
Kanak Kalita, Divya Zindani, Narayanan Ganesh, Xiao-Zhi Gao, India) Kalita, Kanak (Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India) Zindani, Divya (Sri Sivasubramaniya Nadar College of Engineering, India) Ganesh, Narayanan (Vellore Institute of Technology Chennai Campus, Xiao-Zhi (University of Eastern Finland) Gao
2 599 kr
Securing the Digital Frontier
Kavita Sharma, Vishnu Sharma, Parma Nand, Anil Kumar Sagar, Gulshan Shrivastava, India) Sharma, Kavita (Galgotias College of Engineering and Technology, India) Sharma, Vishnu (Galgotias College of Engineering and Technology, India) Nand, Parma (Sharda University, India) Sagar, Anil Kumar (Sharda University, India) Shrivastava, Gulshan (Galgotias College of Engineering and Technology
3 239 kr