22,069 research outputs found
Developing a Framework for Creating mHealth Surveys
Various issues in the design of surveys for mobile health (mHealth) research projects yet exist. As mHealth solutions become more popular, new issues are brought into consideration. Researchers need to collect some critical information from participants in these mHealth studies. These mHealth studies require a specialized framework to create surveys, track progress and analyze user data. In these procedures, mHealth’s needs differ from other studies. Therefore, there has to be a new framework that satisfies needs of mHealth research studies. Although there are studies for creating efficient, robust and user-friendly surveys, there is no solution or study, which is specialized in mHealth area and solves specific problems of mHealth research studies. mHealth research studies sometimes require real-time access to user data. Reward systems may play a key role in their study. Most importantly, storing user information securely plays a key role in these studies. There is no such solution or study, which covers all these areas. In this thesis, we present guidelines for developing a framework for creating mHealth surveys. In doing this, we hope that we propose a solution for problems of creating and using of surveys in mHealth studies
Secure-Medishare: A Comprehensive Secure Medical Data-Sharing System Using Blockchain, Watermarking, Steganography, And Optimized Hybrid Cryptography
Medical data plays a crucial role in healthcare, enabling accurate diagnosis, treatment planning, and research. However, the secure sharing of sensitive medical data and images remains a significant challenge. Existing techniques often fall short in terms of protecting data integrity, confidentiality, and authenticity. To address these limitations, this paper introduces Secure-Medishare, a novel secure medical data-sharing system that integrates blockchain technology, watermarking, steganography, and enhanced cryptography. The proposed Secure-Medishare system aims to provide robust security mechanisms for medical data sharing. Unlike centralized systems, which are susceptible to single points of failure and unauthorized access, Secure-Medishare utilizes blockchain technology to ensure decentralized and tamper-resistant storage and sharing of medical data. Secure-Medishare employs watermarking for data integrity and authentication and steganography for confidential transmission of metadata, ensuring authenticity, privacy, and confidentiality of medical data. Furthermore, an optimized hybrid cryptography technique is implemented to secure the transmission and storage of medical data, safeguarding confidentiality and privacy. Secure-Medishare offers several advantages over existing techniques. It provides enhanced security and privacy protection, efficient data sharing and retrieval, and improved trust among healthcare providers. The system ensures the integrity and authenticity of medical data, preventing unauthorized modifications or tampering. Additionally, the decentralized nature of blockchain technology reduces the risk of data breaches and single points of failure. Experimental results show that Secure-Medishare generates hashes quickly, taking only 65 milliseconds for 100 blocks. Optimized hybrid cryptography used in Secure-Medishare also outperforms other cryptography combinations, with encryption and decryption times of 5.635 seconds for 96-bit data. These findings highlight the efficiency and effectiveness of Secure-Medishare for secure medical data and image sharing. The experimental evaluation confirms that Secure-Medishare is a reliable and robust solution for secure medical data sharing in healthcare environments
Federated Learning for Medical Applications: A Taxonomy, Current Trends, Challenges, and Future Research Directions
With the advent of the IoT, AI, ML, and DL algorithms, the landscape of
data-driven medical applications has emerged as a promising avenue for
designing robust and scalable diagnostic and prognostic models from medical
data. This has gained a lot of attention from both academia and industry,
leading to significant improvements in healthcare quality. However, the
adoption of AI-driven medical applications still faces tough challenges,
including meeting security, privacy, and quality of service (QoS) standards.
Recent developments in \ac{FL} have made it possible to train complex
machine-learned models in a distributed manner and have become an active
research domain, particularly processing the medical data at the edge of the
network in a decentralized way to preserve privacy and address security
concerns. To this end, in this paper, we explore the present and future of FL
technology in medical applications where data sharing is a significant
challenge. We delve into the current research trends and their outcomes,
unravelling the complexities of designing reliable and scalable \ac{FL} models.
Our paper outlines the fundamental statistical issues in FL, tackles
device-related problems, addresses security challenges, and navigates the
complexity of privacy concerns, all while highlighting its transformative
potential in the medical field. Our study primarily focuses on medical
applications of \ac{FL}, particularly in the context of global cancer
diagnosis. We highlight the potential of FL to enable computer-aided diagnosis
tools that address this challenge with greater effectiveness than traditional
data-driven methods. We hope that this comprehensive review will serve as a
checkpoint for the field, summarizing the current state-of-the-art and
identifying open problems and future research directions.Comment: Accepted at IEEE Internet of Things Journa
A Privacy Preserving Framework for RFID Based Healthcare Systems
RFID (Radio Frequency IDentification) is anticipated to be a core technology that will be used in many practical applications of our life in near future. It has received considerable attention within the healthcare for almost a decade now. The technology’s promise to efficiently track hospital supplies, medical equipment, medications and patients is an attractive proposition to the healthcare industry. However, the prospect of wide spread use of RFID tags in the healthcare area has also triggered discussions regarding privacy, particularly because RFID data in transit may easily be intercepted and can be send to track its user (owner). In a nutshell, this technology has not really seen its true potential in healthcare industry since privacy concerns raised by the tag bearers are not properly addressed by existing identification techniques. There are two major types of privacy preservation techniques that are required in an RFID based healthcare system—(1) a privacy preserving authentication protocol is required while sensing RFID tags for different identification and monitoring purposes, and (2) a privacy preserving access control mechanism is required to restrict unauthorized access of private information while providing healthcare services using the tag ID. In this paper, we propose a framework (PriSens-HSAC) that makes an effort to address the above mentioned two privacy issues. To the best of our knowledge, it is the first framework to provide increased privacy in RFID based healthcare systems, using RFID authentication along with access control technique
Trustworthy Federated Learning: A Survey
Federated Learning (FL) has emerged as a significant advancement in the field
of Artificial Intelligence (AI), enabling collaborative model training across
distributed devices while maintaining data privacy. As the importance of FL
increases, addressing trustworthiness issues in its various aspects becomes
crucial. In this survey, we provide an extensive overview of the current state
of Trustworthy FL, exploring existing solutions and well-defined pillars
relevant to Trustworthy . Despite the growth in literature on trustworthy
centralized Machine Learning (ML)/Deep Learning (DL), further efforts are
necessary to identify trustworthiness pillars and evaluation metrics specific
to FL models, as well as to develop solutions for computing trustworthiness
levels. We propose a taxonomy that encompasses three main pillars:
Interpretability, Fairness, and Security & Privacy. Each pillar represents a
dimension of trust, further broken down into different notions. Our survey
covers trustworthiness challenges at every level in FL settings. We present a
comprehensive architecture of Trustworthy FL, addressing the fundamental
principles underlying the concept, and offer an in-depth analysis of trust
assessment mechanisms. In conclusion, we identify key research challenges
related to every aspect of Trustworthy FL and suggest future research
directions. This comprehensive survey serves as a valuable resource for
researchers and practitioners working on the development and implementation of
Trustworthy FL systems, contributing to a more secure and reliable AI
landscape.Comment: 45 Pages, 8 Figures, 9 Table
Fog Computing in Medical Internet-of-Things: Architecture, Implementation, and Applications
In the era when the market segment of Internet of Things (IoT) tops the chart
in various business reports, it is apparently envisioned that the field of
medicine expects to gain a large benefit from the explosion of wearables and
internet-connected sensors that surround us to acquire and communicate
unprecedented data on symptoms, medication, food intake, and daily-life
activities impacting one's health and wellness. However, IoT-driven healthcare
would have to overcome many barriers, such as: 1) There is an increasing demand
for data storage on cloud servers where the analysis of the medical big data
becomes increasingly complex, 2) The data, when communicated, are vulnerable to
security and privacy issues, 3) The communication of the continuously collected
data is not only costly but also energy hungry, 4) Operating and maintaining
the sensors directly from the cloud servers are non-trial tasks. This book
chapter defined Fog Computing in the context of medical IoT. Conceptually, Fog
Computing is a service-oriented intermediate layer in IoT, providing the
interfaces between the sensors and cloud servers for facilitating connectivity,
data transfer, and queryable local database. The centerpiece of Fog computing
is a low-power, intelligent, wireless, embedded computing node that carries out
signal conditioning and data analytics on raw data collected from wearables or
other medical sensors and offers efficient means to serve telehealth
interventions. We implemented and tested an fog computing system using the
Intel Edison and Raspberry Pi that allows acquisition, computing, storage and
communication of the various medical data such as pathological speech data of
individuals with speech disorders, Phonocardiogram (PCG) signal for heart rate
estimation, and Electrocardiogram (ECG)-based Q, R, S detection.Comment: 29 pages, 30 figures, 5 tables. Keywords: Big Data, Body Area
Network, Body Sensor Network, Edge Computing, Fog Computing, Medical
Cyberphysical Systems, Medical Internet-of-Things, Telecare, Tele-treatment,
Wearable Devices, Chapter in Handbook of Large-Scale Distributed Computing in
Smart Healthcare (2017), Springe
- …