eHealth: A survey of architectures, developments in mHealth, security concerns and solutions

CO Alenoghena, AJ Onumanyi, HO Ohize… - International Journal of …, 2022 - mdpi.com
The ramifications of the COVID-19 pandemic have contributed in part to a recent upsurge in
the study and development of eHealth systems. Although it is almost impossible to cover all …

Exploitation of emerging technologies and advanced networks for a smart healthcare system

GM Minopoulos, VA Memos, CL Stergiou… - Applied Sciences, 2022 - mdpi.com
Current medical methods still confront numerous limitations and barriers to detect and fight
against illnesses and disorders. The introduction of emerging technologies in the healthcare …

PRMS: design and development of patients' E-healthcare records management system for privacy preservation in third party cloud platforms

K Zala, HK Thakkar, R Jadeja, P Singh… - IEEE …, 2022 - ieeexplore.ieee.org
In the current digital era, personal data storage on public platforms is a major cause of
concern with severe security and privacy ramifications. This is true especially in e-health …

A secure blockchain-assisted access control scheme for smart healthcare system in fog computing

J Li, D Li, X Zhang - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
IoT-based smart healthcare system (SHS) allows doctors to monitor and diagnose patients
remotely, which can greatly ease overcrowding in the hospitals and disequilibrium of …

Smart fog-based video surveillance with privacy preservation based on blockchain

M Dave, V Rastogi, M Miglani, P Saharan… - Wireless Personal …, 2022 - Springer
Security surveillance of home or office premises is usually performed by deploying a number
of video cameras to continuously monitor the environment. Such monitoring has a potential …

Security analysis of fog computing environment for ensuring the security and privacy of information

KK Gola, S Arya, G Khan, C Devkar… - Transactions on …, 2023 - Wiley Online Library
In fog computing, the management, measurement, configuration, control, communication,
and storage tasks are carried out collaboratively by one or more near‐user or end users …

RETRACTED ARTICLE: An hybrid security framework using internet of things for healthcare system

SS Kumar, MS Koti - Network Modeling Analysis in Health Informatics and …, 2021 - Springer
In recent decades, broad range of Internet of Things (IoT) technologies are deployed such
as machine to machine communication, Internet Technologies (IT), robots, smart devices …

Efficient resource allocation and management by using load balanced multi-dimensional bin packing heuristic in cloud data centers

P Nehra, N Kesswani - The Journal of Supercomputing, 2023 - Springer
Resource optimization is becoming a prime factor in the progress of Internet-based
technology, Cloud Computing. A resource management model is highly required in cloud …

A linear probabilistic resilience model for securing critical infrastructure in industry 5.0

KA Abuhasel - IEEE Access, 2023 - ieeexplore.ieee.org
Critical infrastructures are designed for securing interconnecting networks from different
influencing factors such as adversaries, unauthorized platoons, cyber threats, etc. These …

Internet-of-Things-Enabled infrastructure against infectious diseases

VA Memos, G Minopoulos, KD Stergiou… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Nowadays, unfortunately, it is more than obvious that conventional medical methods are
struggling to find a treatment for infectious diseases, like the novel Coronavirus, COVID-19 …