IoT Performability for Medical Wearable Device by Data Privacy and Fault Tolerance

[1]  Leandro Navarro-Moldes,et al.  5G and the Internet of EveryOne: Motivation, Enablers, and Research Agenda , 2018, 2018 European Conference on Networks and Communications (EuCNC).

[2]  Vipin Kumar,et al.  Mining Electronic Health Records: A Survey , 2017, 1702.03222.

[3]  Josep Domingo-Ferrer,et al.  Local synthesis for disclosure limitation that satisfies probabilistic k-anonymity criterion , 2017, Trans. Data Priv..

[4]  K. S. Angel Viji,et al.  A Comprehensive Cloud Security Model with Enhanced Key Management, Access Control and Data Anonymization Features , 2017, Int. J. Commun. Networks Inf. Secur..

[5]  Zaigham Mahmood,et al.  Connectivity Frameworks for Smart Devices: The Internet of Things from a Distributed Computing Perspective , 2016 .

[6]  Prem Prakash Jayaraman,et al.  Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation , 2017, Future Gener. Comput. Syst..

[7]  P. Deepa Shenoy,et al.  Generic CBTS: Correlation based Transformation Strategy for Privacy Preserving Data Mining , 2017 .

[8]  Fabian Prasser,et al.  SafePub: A Truthful Data Anonymization Algorithm With Strong Privacy Guarantees , 2018, Proc. Priv. Enhancing Technol..

[9]  Qiang Ni,et al.  A K-Anonymity Based Schema for Location Privacy Preservation , 2019, IEEE Transactions on Sustainable Computing.

[10]  George Pallis,et al.  Healthcare Informatics and Privacy , 2018, IEEE Internet Comput..

[11]  Qing-Qing Xie,et al.  Personalized extended (α, k)‐anonymity model for privacy‐preserving data publishing , 2017, Concurr. Comput. Pract. Exp..

[12]  George Suciu,et al.  Analysis of the security solutions implemented in current Internet of Things platforms , 2015, 2015 Conference Grid, Cloud & High Performance Computing in Science (ROLCG).

[13]  Simson L. Garfinkel,et al.  De-Identification of Personal Information , 2015 .

[14]  Akihiko Ohsuga,et al.  Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness , 2019, IEEE Transactions on Dependable and Secure Computing.

[15]  Joshua Snoke,et al.  General and specific utility measures for synthetic data , 2016, 1604.06651.

[16]  Matthias Templ,et al.  Statistical Disclosure Control for Microdata: Methods and Applications in R , 2017 .

[17]  Philip S. Yu,et al.  Privacy Preserving Utility Mining: A Survey , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[18]  Zaigham Mahmood Connectivity Frameworks for Smart Devices , 2016, Computer Communications and Networks.

[19]  Raluca Maria Aileni,et al.  Chapter 10 – Wearable Electronics for Elderly Health Monitoring and Active Living , 2017 .

[20]  Kuo-Hui Yeh,et al.  Novel Authentication Schemes for IoT Based Healthcare Systems , 2015, Int. J. Distributed Sens. Networks.

[21]  Pierangela Samarati,et al.  Cloud Security: Issues and Concerns , 2016 .

[22]  Sherali Zeadally,et al.  Privacy in a Digital, Networked World: Technologies, Implications and Solutions , 2015 .

[23]  Fabian Prasser,et al.  A Scalable and Pragmatic Method for the Safe Sharing of High-Quality Health Data , 2018, IEEE Journal of Biomedical and Health Informatics.

[24]  Victor I. Chang,et al.  Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare , 2018, Future Gener. Comput. Syst..

[25]  Amit P. Sheth,et al.  Toward Practical Privacy-Preserving Analytics for IoT and Cloud-Based Healthcare Systems , 2018, IEEE Internet Computing.

[26]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[27]  Josep Domingo-Ferrer,et al.  Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections , 2016, Database Anonymization.

[28]  Fang Liu,et al.  Security and Privacy in the Medical Internet of Things: A Review , 2018, Secur. Commun. Networks.

[29]  Baoli Ma,et al.  Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT , 2018, IEEE Internet of Things Journal.

[30]  Gauri Sankar Datta,et al.  Statistical disclosure control via sufficiency under the multiple linear regression model , 2018 .

[31]  Xiaolei Dong,et al.  Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.

[32]  Fabian Prasser,et al.  A Generic Method for Assessing the Quality of De-Identified Health Data , 2016, MIE.

[33]  Fabian Prasser,et al.  A Tool for Optimizing De-identified Health Data for Use in Statistical Classification , 2017, 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS).

[34]  Hwaiyu Geng,et al.  Internet of Things and Data Analytics Handbook , 2017 .

[35]  Sherali Zeadally,et al.  Privacy in a Digital, Networked World , 2015, Computer Communications and Networks.

[36]  Fabian Prasser,et al.  An Experimental Comparison of Quality Models for Health Data De-Identification , 2017, MedInfo.