E-Health Sensitive Data Dissemination Exploiting Trust and Mobility of Users

05/14/2020
by   Agnaldo Batista, et al.
0

E-health services handle a massive amount of sensitive data, requiring reliability and privacy. The advent of new technologies drives e-health services into their continuous provision outside traditional care institutions. This creates uncertain and unreliable conditions, resulting in the challenge of controlling sensitive user data dissemination. Then, there is a gap in sensitive data dissemination under situations requiring fast response (e.g., cardiac arrest). This obligates networks to provide reliable sensitive data dissemination under user mobility, dynamic network topology, and occasional interactions between the devices. In this article, we propose STEALTH, a system that employs social trust and communities of interest to address these challenges. STEALTH follows two steps: clustering and dissemination. In the first, STEALTH groups devices based on the interests of their users, forming communities of interest. A healthcare urgency launches the second, in which STEALTH disseminates user sensitive data to devices belonging to specific communities, subjected to the level of trust between devices. Simulation results demonstrate that STEALTH ensures data dissemination to people who can contribute toward an efficient service. STEALTH has achieved up to 97.14 reliability in accessing sensitive data with a maximum latency of 170 ms, and up to 100

READ FULL TEXT

page 4

page 12

research
04/15/2021

Trust but Verify: Cryptographic Data Privacy for Mobility Management

The era of Big Data has brought with it a richer understanding of user b...
research
11/21/2017

An Enhanced Middleware for Collaborative Privacy in IPTV Recommender Services

One of the concerns users have to confronted when using IPTV system is t...
research
12/30/2021

Investigations of Smart Health Reliability

A balanced investigation into the reliability of wireless smart health d...
research
07/10/2020

Mechanisms for Hiding Sensitive Genotypes with Information-Theoretic Privacy

The growing availability of personal genomics services comes with increa...
research
07/08/2021

Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry

Through advances in their conversational abilities, chatbots have starte...
research
10/04/2022

Building a healthier feed: Private location trace intersection driven feed recommendations

The physical environment you navigate strongly determines which communit...
research
11/20/2017

Dropping Activation Outputs with Localized First-layer Deep Network for Enhancing User Privacy and Data Security

Deep learning methods can play a crucial role in anomaly detection, pred...

Please sign up or login with your details

Forgot password? Click here to reset