E-Health Sensitive Data Dissemination Exploiting Trust and Mobility of
Users
- URL: http://arxiv.org/abs/2005.07296v1
- Date: Thu, 14 May 2020 23:37:43 GMT
- Title: E-Health Sensitive Data Dissemination Exploiting Trust and Mobility of
Users
- Authors: Agnaldo Batista, Michele Nogueira and Aldri Santos
- Abstract summary: E-health services handle a massive amount of sensitive data, requiring reliability and privacy.
In this article, we propose STEALTH, a system that employs social trust and communities of interest to address these challenges.
STEALTH has achieved up to 97.14% of reliability in accessing sensitive data with a maximum latency of 170 ms, and up to 100% of availability during emergencies.
- Score: 5.104919259370318
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: E-health services handle a massive amount of sensitive data, requiring
reliability and privacy. The advent of new technologies drives e-health
services into their continuous provision outside traditional care institutions.
This creates uncertain and unreliable conditions, resulting in the challenge of
controlling sensitive user data dissemination. Then, there is a gap in
sensitive data dissemination under situations requiring fast response (e.g.,
cardiac arrest). This obligates networks to provide reliable sensitive data
dissemination under user mobility, dynamic network topology, and occasional
interactions between the devices. In this article, we propose STEALTH, a system
that employs social trust and communities of interest to address these
challenges. STEALTH follows two steps: clustering and dissemination. In the
first, STEALTH groups devices based on the interests of their users, forming
communities of interest. A healthcare urgency launches the second, in which
STEALTH disseminates user sensitive data to devices belonging to specific
communities, subjected to the level of trust between devices. Simulation
results demonstrate that STEALTH ensures data dissemination to people who can
contribute toward an efficient service. STEALTH has achieved up to 97.14% of
reliability in accessing sensitive data with a maximum latency of 170 ms, and
up to 100% of availability during emergencies.
Related papers
- Privacy-aware IoT Fall Detection Services For Aging in Place [1.4061979259370276]
Fall detection is critical to support the growing elderly population, projected to reach 2.1 billion by 2050.<n>We propose a novel IoT-based Fall Detection as a Service framework to assist the elderly in living independently and safely by accurately detecting falls.<n>We design a service-oriented architecture that leverages Ultra-wideband (UWB) radar sensors as an IoT health-sensing service, ensuring privacy and minimal intrusion.
arXiv Detail & Related papers (2025-06-18T03:28:07Z) - Privacy is All You Need: Revolutionizing Wearable Health Data with Advanced PETs [0.0]
We propose a Privacy-Enhancing Technology (PET) framework for wearable devices.
We integrate federated learning, lightweight cryptographic methods, and selectively deployed blockchain technology.
Our framework reduces privacy risks by up to 70 percent while preserving data utility and performance.
arXiv Detail & Related papers (2025-03-05T12:01:22Z) - MisinfoEval: Generative AI in the Era of "Alternative Facts" [50.069577397751175]
We introduce a framework for generating and evaluating large language model (LLM) based misinformation interventions.
We present (1) an experiment with a simulated social media environment to measure effectiveness of misinformation interventions, and (2) a second experiment with personalized explanations tailored to the demographics and beliefs of users.
Our findings confirm that LLM-based interventions are highly effective at correcting user behavior.
arXiv Detail & Related papers (2024-10-13T18:16:50Z) - KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation [0.0]
We propose a knowledge-infused Generative Adversarial Network for generating synthetic network activity data (KiNETGAN)
Our approach enhances the resilience of distributed intrusion detection while addressing privacy concerns.
arXiv Detail & Related papers (2024-05-26T08:02:02Z) - Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems [1.8434042562191815]
The Internet of Medical Things (IoMT) transcends traditional medical boundaries, enabling a transition from reactive treatment to proactive prevention.
Its benefits are countered by significant security challenges that endanger the lives of its users due to the sensitivity and value of the processed data.
A new framework for Intrusion Detection Systems (IDS) is introduced, leveraging Artificial Neural Networks (ANN) for intrusion detection while utilizing Federated Learning (FL) for privacy preservation.
arXiv Detail & Related papers (2024-03-14T11:57:26Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation [0.0]
The integration of Internet of Things (IoT) devices in healthcare applications has revolutionized patient care, monitoring, and data management.
However, the rapid involvement of these devices brings information security concerns that pose critical threats to patient privacy and the integrity of healthcare data.
This paper introduces a novel machine learning (ML) based architecture explicitly designed to address and mitigate security vulnerabilities in IoT devices within healthcare applications.
arXiv Detail & Related papers (2024-01-14T21:01:21Z) - Blockchain-empowered Federated Learning for Healthcare Metaverses:
User-centric Incentive Mechanism with Optimal Data Freshness [66.3982155172418]
We first design a user-centric privacy-preserving framework based on decentralized Federated Learning (FL) for healthcare metaverses.
We then utilize Age of Information (AoI) as an effective data-freshness metric and propose an AoI-based contract theory model under Prospect Theory (PT) to motivate sensing data sharing.
arXiv Detail & Related papers (2023-07-29T12:54:03Z) - Decentralized Privacy-Preserving Proximity Tracing [50.27258414960402]
DP3T provides a technological foundation to help slow the spread of SARS-CoV-2.
System aims to minimise privacy and security risks for individuals and communities.
arXiv Detail & Related papers (2020-05-25T12:32:02Z) - COVI White Paper [67.04578448931741]
Contact tracing is an essential tool to change the course of the Covid-19 pandemic.
We present an overview of the rationale, design, ethical considerations and privacy strategy of COVI,' a Covid-19 public peer-to-peer contact tracing and risk awareness mobile application developed in Canada.
arXiv Detail & Related papers (2020-05-18T07:40:49Z) - Give more data, awareness and control to individual citizens, and they
will help COVID-19 containment [74.10257867142049]
Contact-tracing apps are being proposed for large scale adoption by many countries.
A centralized approach raises concerns about citizens' privacy and needlessly strong digital surveillance.
We advocate a decentralized approach, where both contact and location data are collected exclusively in individual citizens' "personal data stores"
arXiv Detail & Related papers (2020-04-10T20:30:37Z) - DYSAN: Dynamically sanitizing motion sensor data against sensitive
inferences through adversarial networks [0.0]
DySan is a privacy-preserving framework to sanitize motion sensor data against unwanted sensitive inferences.
By learning in a competitive manner several networks, DySan is able to build models that sanitize motion data against inferences on a specified sensitive attribute.
Experiments conducted on real datasets demonstrate that DySan can drasticallylimit the gender inference to 47% while only reducing the accuracy of activity recognition by 3%.
arXiv Detail & Related papers (2020-03-23T15:16:43Z) - Super Low Resolution RF Powered Accelerometers for Alerting on
Hospitalized Patient Bed Exits [3.2654923574107357]
Falls have serious consequences and are prevalent in acute hospitals and nursing homes caring for older people. Technological interventions to mitigate the risk of falling aim to automatically monitor bed-exit events and alert healthcare personnel to provide timely supervisions.
We observe that frequency-domain information related to patient activities exist predominantly in very low frequencies.
We investigate a batteryless sensing modality with low cost wirelessly powered Radio Frequency Identification (RFID) technology with the potential for convenient integration into clothing, such as hospital gowns.
arXiv Detail & Related papers (2020-03-19T00:58:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.