Security and Privacy for Mobile Healthcare Networks

Security and Privacy for Mobile Healthcare Networks

2015-11-10 | ISBN: 3319247158, 3319369970 | PDF | 118 Pages | 2.73 MB

This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile Healthcare Network (MHN) architecture and its diverse applications, and reviews the existing works on security and privacy for MHNs. Critical future challenges and research problems are also identified.
Using a Quality-of-Protection perspective, the authors provide valuable insights on security and privacy preservation for MHNs. Some promising solutions are proposed to accommodate the issues of secure health data transmission, misbehavior detection, health data processing with privacy preservation and access control in MHNs. Specifically, the secure health data aggregation explores social spots to help forward health data and enable users to select the optimal relay according to their social ties and health data priority. The secure aggregation achieves the desirable delivery ratio with reasonable communication costs and lower delay for the data in different priorities.
A proposed misbehavior detection scheme distinguishes Sybil attackers from normal users by comparing their mobile contacts and pseudonym changing behaviors. The detection accuracy is high enough to resist various Sybil attacks including forgery. In addition, the health data processing scheme can analyze the encrypted health data and preserve user's privacy at the same time. Attribute based access control can achieve fine-grained acces
s control with user-defined access policy in MHNs.
Security and Privacy for Mobile Healthcare Networks is designed for researchers and advanced-level students interested in healthcare security and secure data transmission.


[Fast Download] Security and Privacy for Mobile Healthcare Networks

Ebooks related to "Security and Privacy for Mobile Healthcare Networks" :
Software Quality Assurance : Integrating Testing, Security, and Audit
World of Walls: The Structure, Roles and Effectiveness of Separation Barriers
Cyber Security and Policy: A Substantive Dialogue
The Law of Cybercrimes and Their Investigations
Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environmen
Understanding Social Engineering Based Scams
Fundamentals of IP and SoC Security: Design, Verification, and Debug
Basic Security Testing with Kali Linux 2
Theory of Cryptography
Modern High-Security Locks: How To Open Them
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.