2020
DOI: 10.1177/1550147720912110
|View full text |Cite
|
Sign up to set email alerts
|

Enabling trustworthy personal data protection in eHealth and well-being services through privacy-by-design

Abstract: Users are each day more aware of their privacy and data protection. Although this problem is transversal to every digital service, it is especially relevant when critical and personal information is managed, as in eHealth and well-being services. During the last years, many different innovative services in this area have been proposed. However, data management challenges are still in need of a solution. In general, data are directly sent to services but no trustworthy instruments to recover these data or remov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(13 citation statements)
references
References 48 publications
1
12
0
Order By: Relevance
“…The proposed pseudorandom routing protocol, then, employs a chaotic encryption function (•), see Section III.C, to protect the received information. An encrypted information ℑ is then obtained (8).…”
Section: B Routing Protocol For Data Anonymizationmentioning
confidence: 99%
See 2 more Smart Citations
“…The proposed pseudorandom routing protocol, then, employs a chaotic encryption function (•), see Section III.C, to protect the received information. An encrypted information ℑ is then obtained (8).…”
Section: B Routing Protocol For Data Anonymizationmentioning
confidence: 99%
“…Cryptographic technologies may address this problem, but IoT devices face important problems in that field. First, most IoT nodes are resource constrained, so they cannot support complex and computationally heavy algorithms, such as modern symmetric key encryption schemes [8]. Besides, IoT systems are many times deployed in geographically remote areas with no physical protection, so solutions based on private keys stored in devices' memory turn unsecure (as an intruder could easily extract that memory from the node and employ fraudulently the private key) [8].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Many different innovative solutions in this context have been proposed in the literature. Some of them are; [79] proposed a Blockchain-based solution that follows edge computing to guarantee privacy by considering regulation and users' designed requirements. Sun et al [80] proposed an optimized vector conversion approach and emphasized that by creating key generation, encryption and decryption stages with this approach, users can easily perform in the system without leaking any sensitive privacy.…”
Section: Sensing Layermentioning
confidence: 99%
“…Still, in many infrastructures like the ones mentioned above, one of the prime concerns is privacy. This is addressed by Robles et al 8 who devised a new personal data protection mechanism for well-being services based on blockchain networks mainly characterised by transparency, accuracy, accountability, and others. This new architecture follows the PbD principles and edge computing paradigm.…”
mentioning
confidence: 99%