Displaying publications 1 - 20 of 64 in total

Abstract:
Sort:
  1. Abbasi IA, Jan SU, Alqahtani AS, Khan AS, Algarni F
    PLoS One, 2024;19(1):e0294429.
    PMID: 38289970 DOI: 10.1371/journal.pone.0294429
    Cloud computing is vital in various applications, such as healthcare, transportation, governance, and mobile computing. When using a public cloud server, it is mandatory to be secured from all known threats because a minor attacker's disturbance severely threatens the whole system. A public cloud server is posed with numerous threats; an adversary can easily enter the server to access sensitive information, especially for the healthcare industry, which offers services to patients, researchers, labs, and hospitals in a flexible way with minimal operational costs. It is challenging to make it a reliable system and ensure the privacy and security of a cloud-enabled healthcare system. In this regard, numerous security mechanisms have been proposed in past decades. These protocols either suffer from replay attacks, are completed in three to four round trips or have maximum computation, which means the security doesn't balance with performance. Thus, this work uses a fuzzy extractor method to propose a robust security method for a cloud-enabled healthcare system based on Elliptic Curve Cryptography (ECC). The proposed scheme's security analysis has been examined formally with BAN logic, ROM and ProVerif and informally using pragmatic illustration and different attacks' discussions. The proposed security mechanism is analyzed in terms of communication and computation costs. Upon comparing the proposed protocol with prior work, it has been demonstrated that our scheme is 33.91% better in communication costs and 35.39% superior to its competitors in computation costs.
    Matched MeSH terms: Confidentiality*
  2. Schröder M, Muller SHA, Vradi E, Mielke J, Lim YMF, Couvelard F, et al.
    Big Data, 2023 Dec;11(6):399-407.
    PMID: 37889577 DOI: 10.1089/big.2022.0178
    Sharing individual patient data (IPD) is a simple concept but complex to achieve due to data privacy and data security concerns, underdeveloped guidelines, and legal barriers. Sharing IPD is additionally difficult in big data-driven collaborations such as Bigdata@Heart in the Innovative Medicines Initiative, due to competing interests between diverse consortium members. One project within BigData@Heart, case study 1, needed to pool data from seven heterogeneous data sets: five randomized controlled trials from three different industry partners, and two disease registries. Sharing IPD was not considered feasible due to legal requirements and the sensitive medical nature of these data. In addition, harmonizing the data sets for a federated data analysis was difficult due to capacity constraints and the heterogeneity of the data sets. An alternative option was to share summary statistics through contingency tables. Here it is demonstrated that this method along with anonymization methods to ensure patient anonymity had minimal loss of information. Although sharing IPD should continue to be encouraged and strived for, our approach achieved a good balance between data transparency while protecting patient privacy. It also allowed a successful collaboration between industry and academia.
    Matched MeSH terms: Confidentiality*
  3. Gupta R, Kanungo P, Dagdee N, Madhu G, Sahoo KS, Jhanjhi NZ, et al.
    Sensors (Basel), 2023 Feb 27;23(5).
    PMID: 36904822 DOI: 10.3390/s23052617
    With continuous advancements in Internet technology and the increased use of cryptographic techniques, the cloud has become the obvious choice for data sharing. Generally, the data are outsourced to cloud storage servers in encrypted form. Access control methods can be used on encrypted outsourced data to facilitate and regulate access. Multi-authority attribute-based encryption is a propitious technique to control who can access encrypted data in inter-domain applications such as sharing data between organizations, sharing data in healthcare, etc. The data owner may require the flexibility to share the data with known and unknown users. The known or closed-domain users may be internal employees of the organization, and unknown or open-domain users may be outside agencies, third-party users, etc. In the case of closed-domain users, the data owner becomes the key issuing authority, and in the case of open-domain users, various established attribute authorities perform the task of key issuance. Privacy preservation is also a crucial requirement in cloud-based data-sharing systems. This work proposes the SP-MAACS scheme, a secure and privacy-preserving multi-authority access control system for cloud-based healthcare data sharing. Both open and closed domain users are considered, and policy privacy is ensured by only disclosing the names of policy attributes. The values of the attributes are kept hidden. Characteristic comparison with similar existing schemes shows that our scheme simultaneously provides features such as multi-authority setting, expressive and flexible access policy structure, privacy preservation, and scalability. The performance analysis carried out by us shows that the decryption cost is reasonable enough. Furthermore, the scheme is demonstrated to be adaptively secure under the standard model.
    Matched MeSH terms: Confidentiality*
  4. Almazroi AA, Alqarni MA, Al-Shareeda MA, Manickam S
    PLoS One, 2023;18(10):e0292690.
    PMID: 37889892 DOI: 10.1371/journal.pone.0292690
    The role that vehicular fog computing based on the Fifth Generation (5G) can play in improving traffic management and motorist safety is growing quickly. The use of wireless technology within a vehicle raises issues of confidentiality and safety. Such concerns are optimal targets for conditional privacy-preserving authentication (CPPA) methods. However, current CPPA-based systems face a challenge when subjected to attacks from quantum computers. Because of the need for security and anti-piracy features in fog computing when using a 5G-enabled vehicle system, the L-CPPA scheme is proposed in this article. Using a fog server, secret keys are generated and transmitted to each registered car via a 5G-Base Station (5G-BS) in the proposed L-CPPA system. In the proposed L-CPPA method, the trusted authority, rather than the vehicle's Onboard Unit (OBU), stores the vehicle's master secret data to each fog server. Finally, the computation cost of the suggested L-CPPA system regards message signing, single verification and batch verification is 694.161 ms, 60.118 ms, and 1348.218 ms, respectively. Meanwhile, the communication cost is 7757 bytes.
    Matched MeSH terms: Confidentiality
  5. Almazroi AA, Aldhahri EA, Al-Shareeda MA, Manickam S
    PLoS One, 2023;18(6):e0287291.
    PMID: 37352258 DOI: 10.1371/journal.pone.0287291
    Fifth-generation (5G)-enabled vehicular fog computing technologies have always been at the forefront of innovation because they support smart transport like the sharing of traffic data and cooperative processing in the urban fabric. Nevertheless, the most important factors limiting progress are concerns over message protection and safety. To cope with these challenges, several scholars have proposed certificateless authentication schemes with pseudonyms and traceability. These schemes avoid complicated management of certificate and escrow of key in the public key infrastructure-based approaches in the identity-based approaches, respectively. Nevertheless, problems such as high communication costs, security holes, and computational complexity still exist. Therefore, this paper proposes an efficient certificateless authentication called the ECA-VFog scheme for fog computing with 5G-assisted vehicular systems. The proposed ECA-VFog scheme applied efficient operations based on elliptic curve cryptography that is supported by a fog server through a 5G-base station. This work conducts a safety analysis of the security designs to analysis the viability and value of the proposed ECA-VFog scheme. In the performance ovulation section, the computation costs for signing and verification process are 2.3539 ms and 1.5752 ms, respectively. While, the communication costs and energy consumption overhead of the ECA-VFog are 124 bytes and 25.610432 mJ, respectively. Moreover, comparing the ECA-VFog scheme to other existing schemes, the performance estimation reveals that it is more cost-effective with regard to computation cost, communication cost, and energy consumption.
    Matched MeSH terms: Confidentiality*
  6. Nassiri Abrishamchi MA, Zainal A, Ghaleb FA, Qasem SN, Albarrak AM
    Sensors (Basel), 2022 Nov 07;22(21).
    PMID: 36366261 DOI: 10.3390/s22218564
    Smart home technologies have attracted more users in recent years due to significant advancements in their underlying enabler components, such as sensors, actuators, and processors, which are spreading in various domains and have become more affordable. However, these IoT-based solutions are prone to data leakage; this privacy issue has motivated researchers to seek a secure solution to overcome this challenge. In this regard, wireless signal eavesdropping is one of the most severe threats that enables attackers to obtain residents' sensitive information. Even if the system encrypts all communications, some cyber attacks can still steal information by interpreting the contextual data related to the transmitted signals. For example, a "fingerprint and timing-based snooping (FATS)" attack is a side-channel attack (SCA) developed to infer in-home activities passively from a remote location near the targeted house. An SCA is a sort of cyber attack that extracts valuable information from smart systems without accessing the content of data packets. This paper reviews the SCAs associated with cyber-physical systems, focusing on the proposed solutions to protect the privacy of smart homes against FATS attacks in detail. Moreover, this work clarifies shortcomings and future opportunities by analyzing the existing gaps in the reviewed methods.
    Matched MeSH terms: Confidentiality
  7. Kumar V, Kumar S, AlShboul R, Aggarwal G, Kaiwartya O, Khasawneh AM, et al.
    Sensors (Basel), 2021 Jun 08;21(12).
    PMID: 34201100 DOI: 10.3390/s21123948
    Recently, green computing has received significant attention for Internet of Things (IoT) environments due to the growing computing demands under tiny sensor enabled smart services. The related literature on green computing majorly focuses on a cover set approach that works efficiently for target coverage, but it is not applicable in case of area coverage. In this paper, we present a new variant of a cover set approach called a grouping and sponsoring aware IoT framework (GS-IoT) that is suitable for area coverage. We achieve non-overlapping coverage for an entire sensing region employing sectorial sensing. Non-overlapping coverage not only guarantees a sufficiently good coverage in case of large number of sensors deployed randomly, but also maximizes the life span of the whole network with appropriate scheduling of sensors. A deployment model for distribution of sensors is developed to ensure a minimum threshold density of sensors in the sensing region. In particular, a fast converging grouping (FCG) algorithm is developed to group sensors in order to ensure minimal overlapping. A sponsoring aware sectorial coverage (SSC) algorithm is developed to set off redundant sensors and to balance the overall network energy consumption. GS-IoT framework effectively combines both the algorithms for smart services. The simulation experimental results attest to the benefit of the proposed framework as compared to the state-of-the-art techniques in terms of various metrics for smart IoT environments including rate of overlapping, response time, coverage, active sensors, and life span of the overall network.
    Matched MeSH terms: Confidentiality
  8. Hussien HM, Yasin SM, Udzir NI, Ninggal MIH
    Sensors (Basel), 2021 Apr 02;21(7).
    PMID: 33918266 DOI: 10.3390/s21072462
    Blockchain technology provides a tremendous opportunity to transform current personal health record (PHR) systems into a decentralised network infrastructure. However, such technology possesses some drawbacks, such as issues in privacy and storage capacity. Given its transparency and decentralised features, medical data are visible to everyone on the network and are inappropriate for certain medical applications. By contrast, storing vast medical data, such as patient medical history, laboratory tests, X-rays, and MRIs, significantly affect the repository storage of blockchain. This study bridges the gap between PHRs and blockchain technology by offloading the vast medical data into the InterPlanetary File System (IPFS) storage and establishing an enforced cryptographic authorisation and access control scheme for outsourced encrypted medical data. The access control scheme is constructed on the basis of the new lightweight cryptographic concept named smart contract-based attribute-based searchable encryption (SC-ABSE). This newly cryptographic primitive is developed by extending ciphertext-policy attribute-based encryption (CP-ABE) and searchable symmetric encryption (SSE) and by leveraging the technology of smart contracts to achieve the following: (1) efficient and secure fine-grained access control of outsourced encrypted data, (2) confidentiality of data by eliminating trusted private key generators, and (3) multikeyword searchable mechanism. Based on decisional bilinear Diffie-Hellman hardness assumptions (DBDH) and discrete logarithm (DL) problems, the rigorous security indistinguishability analysis indicates that SC-ABSE is secure against the chosen-keyword attack (CKA) and keyword secrecy (KS) in the standard model. In addition, user collusion attacks are prevented, and the tamper-proof resistance of data is ensured. Furthermore, security validation is verified by simulating a formal verification scenario using Automated Validation of Internet Security Protocols and Applications (AVISPA), thereby unveiling that SC-ABSE is resistant to man-in-the-middle (MIM) and replay attacks. The experimental analysis utilised real-world datasets to demonstrate the efficiency and utility of SC-ABSE in terms of computation overhead, storage cost and communication overhead. The proposed scheme is also designed and developed to evaluate throughput and latency transactions using a standard benchmark tool known as Caliper. Lastly, simulation results show that SC-ABSE has high throughput and low latency, with an ultimate increase in network life compared with traditional healthcare systems.
    Matched MeSH terms: Confidentiality
  9. Ahmed Tharbe IH, Kamaruddin MKA, Sumari M, Chong IM
    Data Brief, 2021 Apr;35:106804.
    PMID: 33604426 DOI: 10.1016/j.dib.2021.106804
    The data presented in this article examine the relationship between the subcomponents of emotional intelligence (emotional perception and expression, emotional facilitation of thinking, emotional understanding and emotional management) and the stages of change (pre-contemplation, contemplation, action and maintenance). The final data were obtained from 429 Malaysian inmates (374 male and 55 female) recruited from eight Malaysian prisons in four different zones. The two instruments used were the Self-Rated Malaysian Emotional Intelligence Scale (SRMEIS) and the University Rhodes Island Change Assessment Scale (URICA). Both instruments underwent expert validation through construct and test-retest validity. The researcher randomly distributed a total of 550 questionnaires, of which 429 were accepted and 121 were rejected due to missing data and outliers, resulting in 78% of participants providing data that could be used in the analyses. All participants were informed of the confidentiality of their data, and their participation was voluntary. SPSS and Excel files are provided as supplementary material.
    Matched MeSH terms: Confidentiality
  10. Khalid H, Hashim SJ, Ahmad SMS, Hashim F, Chaudhary MA
    Sensors (Basel), 2021 Feb 18;21(4).
    PMID: 33670675 DOI: 10.3390/s21041428
    The development of the industrial Internet of Things (IIoT) promotes the integration of the cross-platform systems in fog computing, which enable users to obtain access to multiple application located in different geographical locations. Fog users at the network's edge communicate with many fog servers in different fogs and newly joined servers that they had never contacted before. This communication complexity brings enormous security challenges and potential vulnerability to malicious threats. The attacker may replace the edge device with a fake one and authenticate it as a legitimate device. Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. The scheme was tested for its security analysis using the formal security verification under the widely accepted AVISPA tool. We proved our scheme using Burrows Abdi Needham's logic (BAN logic) to prove secure mutual authentication. The results show that the SELAMAT scheme provides better security, functionality, communication, and computation cost than the existing schemes.
    Matched MeSH terms: Confidentiality
  11. Pius Owoh N, Mahinderjit Singh M
    Sensors (Basel), 2020 Jun 09;20(11).
    PMID: 32526843 DOI: 10.3390/s20113280
    The proliferation of mobile devices such as smartphones and tablets with embedded sensors and communication features has led to the introduction of a novel sensing paradigm called mobile crowd sensing. Despite its opportunities and advantages over traditional wireless sensor networks, mobile crowd sensing still faces security and privacy issues, among other challenges. Specifically, the security and privacy of sensitive location information of users remain lingering issues, considering the "on" and "off" state of global positioning system sensor in smartphones. To address this problem, this paper proposes "SenseCrypt", a framework that automatically annotates and signcrypts sensitive location information of mobile crowd sensing users. The framework relies on K-means algorithm and a certificateless aggregate signcryption scheme (CLASC). It incorporates spatial coding as the data compression technique and message query telemetry transport as the messaging protocol. Results presented in this paper show that the proposed framework incurs low computational cost and communication overhead. Also, the framework is robust against privileged insider attack, replay and forgery attacks. Confidentiality, integrity and non-repudiation are security services offered by the proposed framework.
    Matched MeSH terms: Confidentiality
  12. Daphne Clemente, Nurul Amiella Abdullah, ZurianahJusmin Jasmin, Muhammad Syafiq Abdullah, Helen Benedict Lasimbang, Wendy Diana Shoesmith, et al.
    MyJurnal
    Introduction: Continuous quality improvement of system is essential to improve efficiency of working environ- ment. Limited financial allocation in low resource setting results in the vicious circle of having inadequate money to purchase a new system and print paper documents that are required for the operation of clinic. A staff-initiated system improvement with the name of “PRW UMS Staff Portal” was attempted to break-free from the vicious cycle. Methods: An online system covering different aspects of routine clinical work of healthcare workers was created in Dec 2019 and implemented in Feb 2020 using Google SiteTM by the nurses of a local university community clinic, which included: submission of daily reports of nurses and assistant medical officers, submission of reports of all programmes conducted by the clinic, surveillance of health status of working staffs, announcement and request of working roster, archiving of documents, and medication inventory. The system could only be accessed using official working email for general documents while accesses to sensitive documents were restricted to relevant staffs to pro- tect privacy and confidentiality of information. Qualitative interviews were performed with all nursing staff involved. Results: Qualitative feeling of improvement in coordination of workflow was reported by all 23 staffs working in the clinic in view of the easy access of system using smartphone and computer at workstation. It also reduced the need to move away from the working station in order to access, replenish, or submit the printed documents and reports. Significant amount of paper and printing were saved monthly. Conclusions: Despite positive feedback from the staffs, the system requires further improvement in terms of function and security. Further evaluation on cost-efficiency of the system can be done to promote the system to other universities.

    Matched MeSH terms: Confidentiality
  13. Patricia Sator
    MyJurnal
    Introduction: Nursing is a regulated profession. Hence, the global commitment for nurses to maintain standards of practice is vital to deliver safe and competent care. Written policies will eliminate uncertainty, ambiguity, and legal issues. For this study, it focused on the importance of the nursing students to understand and practice the regulation on patient’s confidentiality in healthcare setting with the usage of technology such as social media. There is a case like nursing student infringe the privacy of patients with the information they posted on social media, such as posting a patient’s photos or videos without valid consent. Methods: This study is a quantitative, cross-sectional survey de- sign. The respondents were selected as convenience sampling of 120 nursing students from the Faculty of Medicine and Health Sciences, Universiti Malaysia Sabah (FMHS, UMS). Results: There are 7.4% nursing students intention- ally posted in social media, 18.0% maybe and 73.8% unintentionally. And for their guilty feeling after committing confidentially policy breach on patient, there are 8.2% said NO, 32.8% said MAYBE and 59% said YES. Overall, the nursing students are aware of the patient’s confidentiality but there is still a leakage in practicing full nursing standards and regulation. Further study recommended to explore more on this issue. Conclusion: As a conclusion, this study is relevant to conduct among the nursing students to gain their understanding regarding the responsibilities as a future nurse in maintaining the patient’s confidentiality as one of the most important nursing practices to ensure quality of care and continuation of professional service of nursing profession.
    Matched MeSH terms: Confidentiality
  14. Chung Su Chin, Pauline Stitt
    MyJurnal
    Introduction: During resuscitation efforts, patients’ families are routinely barred from the resuscitation area. Even there is an increased in demand from the family members requesting to be present during resuscitation of their loved one, health care providers not always offer the option for family presence. The major concerns of health care providers who are opposed to family presence during resuscitation (FPDR) were fear of psychological trauma to family members who witnessed the resuscitation. This study aimed to examine the critical care nurses’ perception and attitudes towards the presence of patients’ family members during resuscitation in adult critical care units. Methods: Study papers included were narrowed to primary study, published within 2003-2014, describing nurses’ perceptions and attitudes on an adult inpatient family witnessed resuscitation in critical care units. Results: Seven studies included, and four main themes emerged mainly samples population, nurses’ experiences of FPDR, nurses’ responses toward FPDR and factor predicting nurses’ attitudes toward FPDR. 20% - 42.2% of nurses had experienced FPDR. Only 4% - 6% of study participants working in hospital with established policy and 95% - 100% had not invited family members to witnessed resuscitation. Nurses would consider the option if family members are accompanied by trained staff. Nurses concern included difficult to concentrate, negatively affecting their per- formance, increased rate of legal action, inadequate staff and limited space. Concerns on family members included too distressing event, negative psychological impact argue and interfere with staff. Concerns on patient would be breach of confidentiality. Conclusion: Adult critical care nurses demonstrated negative perceptions and attitudes towards FPDR. Study participants in this review are not familiar with the concept of FPDR. There is a need for policy development and education on FPDR.
    Matched MeSH terms: Confidentiality
  15. Alnajrani HM, Norman AA, Ahmed BH
    PLoS One, 2020;15(6):e0234312.
    PMID: 32525944 DOI: 10.1371/journal.pone.0234312
    As a result of a shift in the world of technology, the combination of ubiquitous mobile networks and cloud computing produced the mobile cloud computing (MCC) domain. As a consequence of a major concern of cloud users, privacy and data protection are getting substantial attention in the field. Currently, a considerable number of papers have been published on MCC with a growing interest in privacy and data protection. Along with this advance in MCC, however, no specific investigation highlights the results of the existing studies in privacy and data protection. In addition, there are no particular exploration highlights trends and open issues in the domain. Accordingly, the objective of this paper is to highlight the results of existing primary studies published in privacy and data protection in MCC to identify current trends and open issues. In this investigation, a systematic mapping study was conducted with a set of six research questions. A total of 1711 studies published from 2009 to 2019 were obtained. Following a filtering process, a collection of 74 primary studies were selected. As a result, the present data privacy threats, attacks, and solutions were identified. Also, the ongoing trends of data privacy exercise were observed. Moreover, the most utilized measures, research type, and contribution type facets were emphasized. Additionally, the current open research issues in privacy and data protection in MCC were highlighted. Furthermore, the results demonstrate the current state-of-the-art of privacy and data protection in MCC, and the conclusion will help to identify research trends and open issues in MCC for researchers and offer useful information in MCC for practitioners.
    Matched MeSH terms: Confidentiality
  16. Lee JY, Chan CKY, Chua SS, Paraidathathu T, Lee KK, Tan CSS, et al.
    BMJ Open, 2019 Oct 22;9(10):e026575.
    PMID: 31640990 DOI: 10.1136/bmjopen-2018-026575
    OBJECTIVE: Telemedicine has been promoted as an economical and effective way to enhance patient care, but its acceptance among patients in low-income and middle-income countries is poorly understood. This study is aimed to explore the experiences and perspectives of people with type 2 diabetes mellitus that used telemedicine to manage their condition.

    DESIGN: In-depth and focus group interviews were conducted with participants who have engaged in telemedicine. Questions included were participants' perception on the programme being used, satisfaction as well as engagement with the telemedicine programme. All interviews and focus groups were audio-recorded and transcribed verbatim. Data were analysed using a thematic approach.

    PARTICIPANTS AND SETTING: People with type 2 diabetes (n=48) who participated in a randomised controlled study which examined the use of telemedicine for diabetes management were recruited from 11 primary care clinics located within the Klang Valley.

    RESULTS: Twelve focus groups and two in-depth interviews were conducted. Four themes emerged from the analysis: (1) generational difference; (2) independence and convenience, (3) sharing of health data and privacy and (4) concerns and challenges. The main obstacles found in patients using the telemedicine systems were related to internet connectivity and difficulties experienced with system interface. Cost was also another significant concern raised by participants. Participants in this study were primarily positive about the benefits of telemedicine, including its ability to provide real-time data and disease monitoring and the reduction in clinic visits.

    CONCLUSION: Despite the potential benefits of telemedicine in the long-term care of diabetes, there are several perceived barriers that may limit the effectiveness of this technology. As such, collaboration between educators, healthcare providers, telecommunication service providers and patients are required to stimulate the adoption and the use of telemedicine.NCT0246680.

    Matched MeSH terms: Confidentiality
  17. Da Silva RD, Leow JJ, Abidin ZA, Linden-Castro E, Castro EIB, Blanco LT, et al.
    Int Braz J Urol, 2019 10 19;45(5):882-888.
    PMID: 31626517 DOI: 10.1590/S1677-5538.IBJU.2019.05.04
    Matched MeSH terms: Confidentiality
  18. Hussien HM, Yasin SM, Udzir SNI, Zaidan AA, Zaidan BB
    J Med Syst, 2019 Sep 14;43(10):320.
    PMID: 31522262 DOI: 10.1007/s10916-019-1445-8
    Blockchain in healthcare applications requires robust security and privacy mechanism for high-level authentication, interoperability and medical records sharing to comply with the strict legal requirements of the Health Insurance Portability and Accountability Act of 1996. Blockchain technology in the healthcare industry has received considerable research attention in recent years. This study conducts a review to substantially analyse and map the research landscape of current technologies, mainly the use of blockchain in healthcare applications, into a coherent taxonomy. The present study systematically searches all relevant research articles on blockchain in healthcare applications in three accessible databases, namely, ScienceDirect, IEEE and Web of Science, by using the defined keywords 'blockchain', 'healthcare' and 'electronic health records' and their variations. The final set of collected articles related to the use of blockchain in healthcare application is divided into three categories. The first category includes articles (i.e. 43/58 scientific articles) that attempted to develop and design healthcare applications integrating blockchain, particularly those on new architecture, system designs, framework, scheme, model, platform, approach, protocol and algorithm. The second category includes studies (i.e., 6/58 scientific articles) that attempted to evaluate and analyse the adoption of blockchain in the healthcare system. Finally, the third category comprises review and survey articles (i.e., 6/58 scientific articles) related to the integration of blockchain into healthcare applications. The final articles for review are discussed on the basis of five aspects: (1) year of publication, (2) nationality of authors, (3) publishing house or journal, (4) purpose of using blockchain in health applications and the corresponding contributions and (5) problem types and proposed solutions. Additionally, this study provides identified motivations, open challenges and recommendations on the use of blockchain in healthcare applications. The current research contributes to the literature by providing a detailed review of feasible alternatives and identifying the research gaps. Accordingly, researchers and developers are provided with appealing opportunities to further develop decentralised healthcare applications through a comprehensive discussion of about the importance of blockchain and its integration into various healthcare applications.
    Matched MeSH terms: Confidentiality
  19. Cheung ML, Chau KY, Lam MHS, Tse G, Ho KY, Flint SW, et al.
    Int J Environ Res Public Health, 2019 Jun 26;16(13).
    PMID: 31247962 DOI: 10.3390/ijerph16132257
    With the advancement of information technology, wearable healthcare technology has emerged as one of the promising technologies to improve the wellbeing of individuals. However, the adoption of wearable healthcare technology has lagged when compared to other well-established durable technology products, such as smartphones and tablets, because of the inadequate knowledge of the antecedents of adoption intention. The aim of this paper is to address an identified gap in the literature by empirically testing a theoretical model for examining the impact of consumers' health beliefs, health information accuracy, and the privacy protection of wearable healthcare technology on perceived usefulness. Importantly, this study also examines the influences of perceived usefulness, consumer innovativeness, and reference group influence on the adoption intention of wearable healthcare technology. The model seeks to enhance understanding of the influential factors in adopting wearable healthcare technology. Finally, suggestions for future research for the empirical investigation of the model are provided.
    Matched MeSH terms: Confidentiality
  20. Talal M, Zaidan AA, Zaidan BB, Albahri AS, Alamoodi AH, Albahri OS, et al.
    J Med Syst, 2019 Jan 15;43(3):42.
    PMID: 30648217 DOI: 10.1007/s10916-019-1158-z
    The Internet of Things (IoT) has been identified in various applications across different domains, such as in the healthcare sector. IoT has also been recognised for its revolution in reshaping modern healthcare with aspiring wide range prospects, including economical, technological and social. This study aims to establish IoT-based smart home security solutions for real-time health monitoring technologies in telemedicine architecture. A multilayer taxonomy is driven and conducted in this study. In the first layer, a comprehensive analysis on telemedicine, which focuses on the client and server sides, shows that other studies associated with IoT-based smart home applications have several limitations that remain unaddressed. Particularly, remote patient monitoring in healthcare applications presents various facilities and benefits by adopting IoT-based smart home technologies without compromising the security requirements and potentially large number of risks. An extensive search is conducted to identify articles that handle these issues, related applications are comprehensively reviewed and a coherent taxonomy for these articles is established. A total number of (n = 3064) are gathered between 2007 and 2017 for most reliable databases, such as ScienceDirect, Web of Science and Institute of Electrical and Electronic Engineer Xplore databases. Then, the articles based on IoT studies that are associated with telemedicine applications are filtered. Nine articles are selected and classified into two categories. The first category, which accounts for 22.22% (n = 2/9), includes surveys on telemedicine articles and their applications. The second category, which accounts for 77.78% (n = 7/9), includes articles on the client and server sides of telemedicine architecture. The collected studies reveal the essential requirement in constructing another taxonomy layer and review IoT-based smart home security studies. Therefore, IoT-based smart home security features are introduced and analysed in the second layer. The security of smart home design based on IoT applications is an aspect that represents a crucial matter for general occupants of smart homes, in which studies are required to provide a better solution with patient security, privacy protection and security of users' entities from being stolen or compromised. Innovative technologies have dispersed limitations related to this matter. The existing gaps and trends in this area should be investigated to provide valuable visions for technical environments and researchers. Thus, 67 articles are obtained in the second layer of our taxonomy and are classified into six categories. In the first category, 25.37% (n = 17/67) of the articles focus on architecture design. In the second category, 17.91% (n = 12/67) includes security analysis articles that investigate the research status in the security area of IoT-based smart home applications. In the third category, 10.44% (n = 7/67) includes articles about security schemes. In the fourth category, 17.91% (n = 12/67) comprises security examination. In the fifth category, 13.43% (n = 9/67) analyses security protocols. In the final category, 14.92% (n = 10/67) analyses the security framework. Then, the identified basic characteristics of this emerging field are presented and provided in the following aspects. Open challenges experienced on the development of IoT-based smart home security are addressed to be adopted fully in telemedicine applications. Then, the requirements are provided to increase researcher's interest in this study area. On this basis, a number of recommendations for different parties are described to provide insights on the next steps that should be considered to enhance the security of smart homes based on IoT. A map matching for both taxonomies is developed in this study to determine the novel risks and benefits of IoT-based smart home security for real-time remote health monitoring within client and server sides in telemedicine applications.
    Matched MeSH terms: Confidentiality
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links