Security Analysis of an IoT Architecture for Healthcare
Security issues of IoT devices are increasing with their massive use in healthcare. Recollection of data from devices is not clear to the users so far, and different problems arise including confidentiality, integrity and availability of the information. We analyze security issues mainly related to...
Saved in:
Published in | Internet of Things. IoT Infrastructures Vol. 169; pp. 454 - 460 |
---|---|
Main Authors | , , , |
Format | Book Chapter |
Language | English |
Published |
Switzerland
Springer International Publishing AG
2016
Springer International Publishing |
Series | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Subjects | |
Online Access | Get full text |
ISBN | 9783319470627 3319470620 |
ISSN | 1867-8211 1867-822X |
DOI | 10.1007/978-3-319-47063-4_48 |
Cover
Abstract | Security issues of IoT devices are increasing with their massive use in healthcare. Recollection of data from devices is not clear to the users so far, and different problems arise including confidentiality, integrity and availability of the information. We analyze security issues mainly related to IoT data storage and transmission in our proposal of healthcare system architecture including cloud services and big data processing of information. We identify protocols needed and security problems including authentication, transmission of data to the cloud, as well as their insufficient anonymization process and the opaque procedure for users in order to control the storage of their data. |
---|---|
AbstractList | Security issues of IoT devices are increasing with their massive use in healthcare. Recollection of data from devices is not clear to the users so far, and different problems arise including confidentiality, integrity and availability of the information. We analyze security issues mainly related to IoT data storage and transmission in our proposal of healthcare system architecture including cloud services and big data processing of information. We identify protocols needed and security problems including authentication, transmission of data to the cloud, as well as their insufficient anonymization process and the opaque procedure for users in order to control the storage of their data. |
Author | Teresa Villalba, M. de Buenaga, Manuel Gachet, Diego Aparicio, Fernando |
Author_xml | – sequence: 1 givenname: M. surname: Teresa Villalba fullname: Teresa Villalba, M. – sequence: 2 givenname: Manuel surname: de Buenaga fullname: de Buenaga, Manuel – sequence: 3 givenname: Diego surname: Gachet fullname: Gachet, Diego email: diego.gachet@uem.es – sequence: 4 givenname: Fernando surname: Aparicio fullname: Aparicio, Fernando |
BookMark | eNpVkM1OAjEUhauiEZA3cDEvUG2nnf4sCREhIXEhJu6aUm5ldDIztmXB21vAmLg6yTn33OR8IzRouxYQuqfkgRIiH7VUmGFGNeaSCIa54eoCTbLNsnny-CUaUiUkVmX5fvUvK-XgL6P0Bo0oEYJKzYi6RZMYPwkhVArKlBwi-QpuH-p0KKatbQ6xjkXnC9sWy25dTIPb1Qlc2gcofBeKBdgm7ZwNcIeuvW0iTH51jN7mT-vZAq9enpez6Qr3JWcJC71l0oK0GrQtK-d16UBWTFilvN1QqLz3WuisomKWew75VCqVZ7At82yMyvPf2Ie6_YBgNl33FQ0l5ojK5N2GmbzcnLCYI6pc4udSH7rvPcRk4Nhy0KZgG7ezfYIQTVUpnbkYrnNPC_YDC-VouA |
ContentType | Book Chapter |
Copyright | ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016 |
Copyright_xml | – notice: ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016 |
DBID | FFUUA |
DEWEY | 4.6779999999999999 |
DOI | 10.1007/978-3-319-47063-4_48 |
DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISBN | 9783319470634 3319470639 |
EISSN | 1867-822X |
Editor | Badra, Mohamad Mitre Campista, Miguel Elias Chaouchi, Hakima Somov, Andrey Cagáňová, Dagmar Mandler, Benny Giordano, Stefano Fazio, Maria Zeadally, Sherali Marquez-Barja, Johann |
Editor_xml | – sequence: 1 fullname: Badra, Mohamad – sequence: 2 fullname: Mitre Campista, Miguel Elias – sequence: 3 fullname: Chaouchi, Hakima – sequence: 4 fullname: Somov, Andrey – sequence: 5 fullname: Cagáňová, Dagmar – sequence: 6 fullname: Mandler, Benny – sequence: 7 fullname: Giordano, Stefano – sequence: 8 fullname: Fazio, Maria – sequence: 9 fullname: Zeadally, Sherali – sequence: 10 fullname: Marquez-Barja, Johann |
EndPage | 460 |
ExternalDocumentID | EBC5589179_493_496 |
GroupedDBID | 0D6 0DA 38. 9-Z AABBV AAMCO AAQZU ABBVZ ABMNI ABOWU ACLMJ ADCXD ADPGQ AEIBC AEJGN AEJLV AEKFX AEZAY AJQNT ALMA_UNASSIGNED_HOLDINGS AORVH BBABE CZZ FFUUA I4C IEZ SBO SWNTM TPJZQ Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 |
ID | FETCH-LOGICAL-p243t-69d37ae7a9e9a25cf92ce7536a88fab1e5fff969e5f653a4f4ea9e7880623d3f3 |
ISBN | 9783319470627 3319470620 |
ISSN | 1867-8211 |
IngestDate | Wed Sep 17 04:52:01 EDT 2025 Thu May 29 16:01:56 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
LCCallNum | TK5105.5-5105.9 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p243t-69d37ae7a9e9a25cf92ce7536a88fab1e5fff969e5f653a4f4ea9e7880623d3f3 |
OCLC | 1066179308 |
PQID | EBC5589179_493_496 |
PageCount | 7 |
ParticipantIDs | springer_books_10_1007_978_3_319_47063_4_48 proquest_ebookcentralchapters_5589179_493_496 |
PublicationCentury | 2000 |
PublicationDate | 2016 |
PublicationDateYYYYMMDD | 2016-01-01 |
PublicationDate_xml | – year: 2016 text: 2016 |
PublicationDecade | 2010 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland – name: Cham |
PublicationSeriesTitle | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
PublicationSeriesTitleAlternate | Lect.Notes Social.Inform. |
PublicationSubtitle | Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I |
PublicationTitle | Internet of Things. IoT Infrastructures |
PublicationYear | 2016 |
Publisher | Springer International Publishing AG Springer International Publishing |
Publisher_xml | – name: Springer International Publishing AG – name: Springer International Publishing |
RelatedPersons | Dressler, Falko Xiaohua, Jia Shen, Xuemin Sherman Ferrari, Domenico Kobayashi, Hisashi Cao, Jiannong Palazzo, Sergio Coulson, Geoffrey Stan, Mircea Gerla, Mario Akan, Ozgur Bellavista, Paolo Zomaya, Albert Y. Sahni, Sartaj |
RelatedPersons_xml | – sequence: 1 givenname: Ozgur surname: Akan fullname: Akan, Ozgur – sequence: 2 givenname: Paolo surname: Bellavista fullname: Bellavista, Paolo – sequence: 3 givenname: Jiannong surname: Cao fullname: Cao, Jiannong – sequence: 4 givenname: Geoffrey surname: Coulson fullname: Coulson, Geoffrey – sequence: 5 givenname: Falko surname: Dressler fullname: Dressler, Falko – sequence: 6 givenname: Domenico surname: Ferrari fullname: Ferrari, Domenico – sequence: 7 givenname: Mario surname: Gerla fullname: Gerla, Mario – sequence: 8 givenname: Hisashi surname: Kobayashi fullname: Kobayashi, Hisashi – sequence: 9 givenname: Sergio surname: Palazzo fullname: Palazzo, Sergio – sequence: 10 givenname: Sartaj surname: Sahni fullname: Sahni, Sartaj – sequence: 11 givenname: Xuemin Sherman surname: Shen fullname: Shen, Xuemin Sherman – sequence: 12 givenname: Mircea surname: Stan fullname: Stan, Mircea – sequence: 13 givenname: Jia surname: Xiaohua fullname: Xiaohua, Jia – sequence: 14 givenname: Albert Y. surname: Zomaya fullname: Zomaya, Albert Y. |
SSID | ssj0001761387 ssib023167542 ssj0000608566 |
Score | 1.8421004 |
Snippet | Security issues of IoT devices are increasing with their massive use in healthcare. Recollection of data from devices is not clear to the users so far, and... |
SourceID | springer proquest |
SourceType | Publisher |
StartPage | 454 |
SubjectTerms | Expert systems / knowledge-based systems Healthcare Internet of Things Network hardware Privacy Security User interface design & usability Wearable |
Title | Security Analysis of an IoT Architecture for Healthcare |
URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=5589179&ppg=496 http://link.springer.com/10.1007/978-3-319-47063-4_48 |
Volume | 169 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Nc9MwENWk4QIcgAJDaWF04JZxJrFkyzr0UEohdJpecDu9aWRb6nSGsZkmufBz-SWsvmwl9FIOcRJHcezdzeppvbsPoU91ncpZlTZJVjU8obVUCeeKJFQ2sAjShDW2XGx5mS-u6PlNdjMa_Ymyljbralr_frCu5H-0CvtAr6ZK9hGa7Q8KO-A16Be2oGHY7oDf7TDrkC7YKnsn37FvTiffuxL-8fpeurawm_shQ7BU8EZOrg3L0M_KQsblNHzYqMnnjWqli7IuZbtRfebFN9Py2brqL3fqtustxNAX1nc20uqD0V1sfz88Md5W2xNwJuYUT-K7FybPcdFnoTkvZ7ovr44v_IjLbu1a47pMz5DdYL4YSCmCj7JW6UuOfaVV34e6NJQ_cT3MKu7GGIc_5rvhjxD-3AmgDjG8rfUyAYdDmenMHLn8AqaKIvUuX8X7LNF7cO3UNbv2KIE6FoR_JqA458TUh5lfA8sXtNhDe6ygY_Tk5Oz84jr4vNR0IggkxA49AAj2ENvGCRkALsvz2J-oKVEKF-Lblg0XFpWHPnQWWwupnXv_FlKVL9FzU2aDTf0LiPQVGql2H70I-sRen_voWaSj14gFs8LBrHCnsWwxmBWOzQqD7vFgVm_Q1dez8nSReO6P5FdKyTrJeUOYVExyxWWa1ZqntYKldS6LQstqrjKtNc85POcZkVRTBUMZzEaA5xuiyVs0brtWvUMYoMCsYsTSdNEi45zOixngDVVwOHBGD1ASRCJshoJPi66dAFYiM8ybjAvKCTzyAzQJchNm-EqE1t8gcEEECFxYgQsj8PePGn2Ing5GfoTG4CzUB0C96-qjN5y_SK-mBg |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Internet+of+Things.+IoT+Infrastructures&rft.au=Teresa+Villalba%2C+M.&rft.au=de+Buenaga%2C+Manuel&rft.au=Gachet%2C+Diego&rft.au=Aparicio%2C+Fernando&rft.atitle=Security+Analysis+of+an+IoT+Architecture+for+Healthcare&rft.series=Lecture+Notes+of+the+Institute+for+Computer+Sciences%2C+Social+Informatics+and+Telecommunications+Engineering&rft.date=2016-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319470627&rft.issn=1867-8211&rft.eissn=1867-822X&rft.spage=454&rft.epage=460&rft_id=info:doi/10.1007%2F978-3-319-47063-4_48 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F5589179-l.jpg |