2019 IEEE 19th International Conference on Bioinformatics and Bioengineering (BIBE) 2019
DOI: 10.1109/bibe.2019.00169
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Protection with Pseudonymization and Anonymization In a Health IoT System: Results from OCARIoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…The healthcare solutions proposed by developers and service providers should be carefully considered so that only necessary information is being collected, not an excessive amount of data. By adhering to the Keeping Privacy by Design (PbD) [32] principles from the outset, developers could provide solutions that minimize the number of potential risks. Currently, there is a lack of trust layers or trusted management systems for resource exchanges between IoT devices, edge devices, and cloud servers [37].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The healthcare solutions proposed by developers and service providers should be carefully considered so that only necessary information is being collected, not an excessive amount of data. By adhering to the Keeping Privacy by Design (PbD) [32] principles from the outset, developers could provide solutions that minimize the number of potential risks. Currently, there is a lack of trust layers or trusted management systems for resource exchanges between IoT devices, edge devices, and cloud servers [37].…”
Section: Discussionmentioning
confidence: 99%
“…Pseudonymization and anonymization techniques are used as an added security layer in a health IoT application to eliminate the possibility of identifying an individual after a data breach [32]. In this scenario, aside from the technical aspects, the legal framework is also required to handle the concerns of all stakeholders involved.…”
Section: Privacy Preservation Iot Based Healthcare Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Regarding information security, the complete anonymization [49] of the data is adequate, however, for the clustering algorithm to be useful in the future, it is necessary to collect additional data and habits to analyze the correlation with the levels of each person's glucose.…”
Section: Discussionmentioning
confidence: 99%
“…Another anonymisation approach is character masking, where some characters are replaced with a wild character such as an asterisk (*). Pseudonymisation is yet another anonymisation approach, where some or all characters are replaced with other values (Ribeiro & Nakamura, 2019). Then there is also generalisation, where data precision is reduced to achieve anonymisation.…”
Section: Despitementioning
confidence: 99%