Security and privacy mechanism for health internet of things

Abstract The rapid development of technologies towards Internet of Things (IoT), has led to new circumstances at all levels of the social environment. In healthcare in particular, the use of IoT concepts and technologies make diagnose and monitor more convenient for the physicians and patients. As mobile applications solutions are widely accepted because the easy to use, secure healthcare service is a new demand for mobile solutions. To protect the privacy and security for patients in the domain of healthcare towards IoT, a systematic mechanism is needed. This article proposes a novel security and privacy mechanism for Health Internet of Things (Health-IoT) to solve above problems. Health-IoT is promising for both traditional healthcare industry and the information and communication technologies (ICTs) industry. From the view of trustworthiness, interactive vector was proposed to communicate the end-devices and application brokers. The aim is to establish a trust IoT application market (IAM), feature of application in marketplace and behavior of applications on end-devices can be exchanged in mathematical value to establish the connection between market and users.

[1]  Qiang Chen,et al.  Design of a terminal solution for integration of in-home health care devices and services towards the Internet-of-Things , 2015, Enterp. Inf. Syst..

[2]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[3]  Jean-Henry Morin,et al.  Toward Internet of Things Application Markets , 2012, 2012 IEEE International Conference on Green Computing and Communications.

[4]  Lirong Zheng,et al.  Ecosystem analysis in the design of open platform-based in-home healthcare terminals towards the internet-of-things , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).

[5]  Patrick D. McDaniel,et al.  Understanding Android Security , 2009, IEEE Security & Privacy Magazine.

[6]  Cong Wang,et al.  An Interactive Trust Model for Application Market of the Internet of Things , 2014, IEEE Transactions on Industrial Informatics.

[7]  Margaret Butler,et al.  Android: Changing the Mobile Landscape , 2011, IEEE Pervasive Computing.

[8]  Byung-Gon Chun,et al.  TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.

[9]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[10]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[11]  Athanasios K. Tsakalidis,et al.  Health Internet of Things: Metrics and methods for efficient data transfer , 2013, Simul. Model. Pract. Theory.