2011
DOI: 10.1002/sec.313
|View full text |Cite
|
Sign up to set email alerts
|

People‐centric sensing in assistive healthcare: Privacy challenges and directions

Abstract: As the domains of pervasive computing and sensor networking are expanding, there is an ongoing trend towards assistive living and healthcare support environments that can effectively assimilate these technologies according to human needs. Most of the existing research in assistive healthcare follows a more passive approach and has focused on collecting and processing data using a static-topology and an application-aware infrastructure. However, with the technological advances in sensing, computation, storage, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(18 citation statements)
references
References 45 publications
0
17
0
Order By: Relevance
“…Generally, tasks requested by DCs can be categorized into two types: people-centric tasks and atmosphere-centric tasks. The people-centric one requires the mobile nodes to Figure 1 The System Architecture of MCS provide their ideas, insights, or personal data directly, for example, assistive healthcare data collection in [26]. By contrast, the atmosphere-centric tasks are to collect environmental data, like images, videos, sounds, etc., such as cyclist and environmental data collection in [18].…”
Section: ) System Entitiesmentioning
confidence: 99%
“…Generally, tasks requested by DCs can be categorized into two types: people-centric tasks and atmosphere-centric tasks. The people-centric one requires the mobile nodes to Figure 1 The System Architecture of MCS provide their ideas, insights, or personal data directly, for example, assistive healthcare data collection in [26]. By contrast, the atmosphere-centric tasks are to collect environmental data, like images, videos, sounds, etc., such as cyclist and environmental data collection in [18].…”
Section: ) System Entitiesmentioning
confidence: 99%
“…Six decades since the start of the computer revolution, four decades since the invention of the micro-processor, and two decades into the rise of modern Internet, all of the technology required to transform industries through software has finally matured and can be widely delivered at a global scale. No part of the industry is untouched by this transformation; be it automotive [1], [2], smart factories, smart grids [3] or healthcare [4]. And with the advent of Internet of Things (IoT), we have just begun reaping the benefits of this evolution that, however, also brings a number of new challenges (or rather makes old unsolved challenges urgent to be tackled with); with security, resilience and operational assurance being some of the major concerns at both logical extremes of a network, namely the edge and the cloud.…”
Section: Introductionmentioning
confidence: 99%
“…The IoT depicts a world of networked smart devices, where everything is interconnected and has a digital entity [46]. According to Giannetsos et al [47], user-based technologies can never succeed without appropriate provisions addressing security and privacy. As a result of the ubiquitous nature of data emerging from the sensors carried by people, the highly dynamic and mobile setting presents new challenges for information security, data privacy, and ethics.…”
Section: Introductionmentioning
confidence: 99%