Skip to main content

IoT Enabled Elderly Monitoring System and the Role of Privacy Preservation Frameworks in e-health Applications

  • Conference paper
  • First Online:
Intelligent Data Communication Technologies and Internet of Things

Abstract

Healthcare IoT (HIOT) or electronic health (e-health) is an emerging paradigm of IoT in which multiple bio-sensors are capturing body vitals and disseminating captured information to the nearest data center through the underlying wireless infrastructure. Despite the observation of such rapid research and development trends in e-health field with its key facets (i.e., sensing, communication, data consolidation, and delivery of information) and its inherent benefits (e.g., error reduction, homecare, and better patient management), it is still facing several challenges. These challenges are ranging from development of an interoperable e-health framework to design of an attack free security model for both data and device. In this article, an overview of recent technological trends in designing HIoT privacy preservation framework is provided, and the corresponding security challenges are discussed subsequently. Alongside, we also propose an architectural framework for monitoring health vitals of differently abled or a patient with degenerative chronic disorder. The interaction of application components is illustrated through the help of different use-case scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bahga, Madisetti VK (2015) Healthcare data integration and informatics in the cloud. Comput (Long Beach Calif) 48(2):50–57, Feb 2015

    Google Scholar 

  2. Zhang Y, Chen M, Huang D, Wu D, Li Y (2017) iDoctor: personalized and professionalized medical recommendations based on hybrid matrix factorization. Futur Gener Comput Syst 66:30–35

    Article  Google Scholar 

  3. Yu K, Tan L, Shang X, Huang J (2020) Gautam srivastava, and pushpita chatterjee. In: Efficient and privacy-preserving medical research support platform against COVID-19: a blockchain-based approach. IEEE Consumer Electronics Magazine

    Google Scholar 

  4. Yu, K-P, Tan L, Aloqaily M, Yang H, Jararweh Y (2021) Blockchain-enhanced data sharing with traceable and direct revocation in IIoT. IEEE Trans İndustrial İnformatics (2021)

    Google Scholar 

  5. Sriram S, Vinayakumar R, Sowmya V, Alazab M, Soman KP (2020) Multi-scale learning based malware variant detection using spatial pyramid pooling network. In: IEEE INFOCOM 2020-IEEE conference on computer communications workshops (INFOCOM WKSHPS), IEEE, pp 740–745

    Google Scholar 

  6. Vasan D, Alazab M, Venkatraman S, Akram J, Qin Z (2020) MTHAEL: cross-architecture IoT malware detection based on neural network advanced ensemble learning. IEEE Trans Comput 69(11):1654–1667

    Article  Google Scholar 

  7. Target heart rates chart | American heart association. [Online]. Available: https://www.heart.org/en/healthy-living/fitness/fitness-basics/target-heart-rates. [Accessed: 28 May 2021]

  8. Fernández-Alemán JL, Señor IC, Lozoya PÁO, Toval A (2013) Security and privacy in electronic health records: a systematic literature review. J Biomed Inf 46(3):541–562

    Google Scholar 

  9. Abbas A, Khan SU (2014) A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J Biomed Health Inform 18(4):1431–1441

    Article  Google Scholar 

  10. Al Nuaimi N, AlShamsi A, Mohamed N, Al-Jaroodi J (2015) e-Health cloud implementation issues and efforts. In: 2015 ınternational conference on ındustrial engineering and operations management (IEOM). IEEE, pp 1–10

    Google Scholar 

  11. Idoga PE, Agoyi M, Coker-Farrell EY, Ekeoma OL (2016) Review of security issues in e-Healthcare and solutions. In: 2016 HONET-ICT, pp 118–121. IEEE

    Google Scholar 

  12. Pankomera R, van Greunen D (2016) Privacy and security issues for a patient-centric approach in public healthcare in a resource constrained setting. In: 2016 IST-Africa week conference. IEEE, pp 1–10

    Google Scholar 

  13. Olaronke I, Oluwaseun O (2016) Big data in healthcare: prospects, challenges and resolutions. In: 2016 future technologies conference (FTC). IEEE, pp 1152–1157

    Google Scholar 

  14. Lee I, Lee K (2015) The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus Horiz 58(4):431–440

    Google Scholar 

  15. Zhang D, Zhang D, Xiong H, Hsu C-H, Vasilakos AV (2014) BASA: building mobile Ad-Hoc social networks on top of android. IEEE Network 28(1):4–9

    Article  Google Scholar 

  16. Sharma G, Bala S, Verma AK (2012) Security frameworks for wireless sensor networks-review. Procedia Technol 6:978–987

    Article  Google Scholar 

  17. Wang K, Chen C-M, Tie Z, Shojafar M, Kumar S, Kumari S (2021) Forward privacy preservation in IoT enabled healthcare systems. IEEE Trans Ind Inf

    Google Scholar 

  18. Hassan MU, Rehmani MH, Chen J (2019) Privacy preservation in blockchain based IoT systems: ıntegration issues, prospects, challenges, and future research directions. Future Gener Comput Syst 97:512–529

    Google Scholar 

  19. Bhalaji N, Abilashkumar PC, Aboorva S (2019) A blockchain based approach for privacy preservation in healthcare iot. In: International conference on ıntelligent computing and communication technologies. Springer, Singapore, pp 465–473

    Google Scholar 

  20. Du J, Jiang C, Gelenbe E, Lei X, Li J, Ren Y (2018) Distributed data privacy preservation in IoT applications. IEEE Wirel Commun 25(6):68–76

    Article  Google Scholar 

  21. Ahmed SM, Abbas H, Saleem K, Yang X, Derhab A, Orgun MA, Iqbal W, Rashid I, Yaseen A (2017) Privacy preservation in e-healthcare environments: state of the art and future directions. IEEE Access 6:464–478

    Google Scholar 

  22. Xu X, Fu S, Qi L, Zhang X, Liu Q, He Q, Li S (2018) An IoT-oriented data placement method with privacy preservation in cloud environment. J Net Comput Appl 124:148–157

    Google Scholar 

  23. Bhattacharya P, Tanwar S, Shah R, Ladha A (2020) Mobile edge computing-enabled blockchain framework—a survey. In: Proceedings of ICRIC 2019. Springer, Cham, pp 797–809

    Google Scholar 

  24. Al Hamid HA, Rahman SMM, Hossain MS, Almogren A, Alamri A (2017) A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5 (2017):22313–22328

    Google Scholar 

  25. Zhou J, Cao Z, Dong X, Lin X (2015) TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. In: 2015 IEEE conference on computer communications (INFOCOM). IEEE, pp 2398–2406

    Google Scholar 

  26. Kaneriya S, Chudasama M, Tanwar S, Tyagi S, Kumar N, Rodrigues JJPC (2019) Markov decision-based recommender system for sleep apnea patients. In: ICC 2019–2019 IEEE international conference on communications (ICC). IEEE, pp 1–6

    Google Scholar 

  27. Mutlag AA, Abd Ghani MK, Arunkumar NA, Mohammed MA, Mohd O (2019) Enabling technologies for fog computing in healthcare IoT systems. Future Gener Comput Syst 90:62–78

    Google Scholar 

  28. Zhou J, Cao Z, Dong X, Lin X (2015) PPDM: a privacy-preserving protocol for cloud-assisted e-healthcare systems. IEEE J Sel Top Sign Process 9(7):1332–1344

    Article  Google Scholar 

  29. Ziglari H, Negini A (2017) Evaluating cloud deployment models based on security in EHR system. In: 2017 ınternational conference on engineering and technology (ICET). IEEE, pp 1–6

    Google Scholar 

  30. Sanz-Requena R, Mañas-García A, Cabrera-Ayala JL, García-Martí G (2015) A cloud-based radiological portal for the patients: ıt contributing to position the patient as the central axis of the 21st century healthcare cycles. In: 2015 IEEE/ACM 1st ınternational workshop on technical and legal aspects of data privacy and Security. IEEE, pp 54–57

    Google Scholar 

  31. Huang C, Yan K, Wei S, Hoon Lee D (2017) A privacy-preserving data sharing solution for mobile healthcare. In: 2017 ınternational conference on progress in ınformatics and computing (PIC). IEEE, pp 260–265

    Google Scholar 

  32. Banerjee M, Lee J, Choo K-KR (2018) A blockchain future for internet of things security: a position paper. Digital Commun Net 4(3):149–160

    Google Scholar 

  33. Gordon WJ, Catalini C (2018) Blockchain technology for healthcare: facilitating the transition to patient-driven interoperability. Comput Struct Biotechnol J 16:224–230

    Article  Google Scholar 

  34. Kshetri N (2017) Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommun Policy 41(10):1027–1038

    Article  Google Scholar 

  35. Kumar NM, Mallick PK (2018) Blockchain technology for security issues and challenges in IoT. Procedia Comput Sci 132:1815–1823

    Google Scholar 

  36. Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo K-KR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429–443

    Google Scholar 

  37. Strielkina A, Kharchenko V, Uzun D (2018) Availability models for healthcare IoT systems: classification and research considering attacks on vulnerabilities. In: 2018 IEEE 9th ınternational conference on dependable systems, services and technologies (DESSERT), IEEE, pp 58–62

    Google Scholar 

  38. McLeod A, Dolezel D (2018) Cyber-analytics: Modeling factors associated with healthcare data breaches. Decis Support Syst 108:57–68

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vidyadhar Jinnappa Aski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aski, V.J., Dhaka, V.S., Kumar, S., Parashar, A. (2022). IoT Enabled Elderly Monitoring System and the Role of Privacy Preservation Frameworks in e-health Applications. In: Hemanth, D.J., Pelusi, D., Vuppalapati, C. (eds) Intelligent Data Communication Technologies and Internet of Things. Lecture Notes on Data Engineering and Communications Technologies, vol 101. Springer, Singapore. https://doi.org/10.1007/978-981-16-7610-9_72

Download citation

Publish with us

Policies and ethics