Internet of Healthcare Things: Machine Learning for Security and Privacy
- Length: 304 pages
- Edition: 1
- Language: English
- Publisher: Wiley-Scrivener
- Publication Date: 2022-03-15
- ISBN-10: 1119791766
- ISBN-13: 9781119791768
- Sales Rank: #0 (See Top 100 Books)
INTERNET OF HEALTHCARE THINGS
The book addresses privacy and security issues providing solutions through authentication and authorization mechanisms, blockchain, fog computing, machine learning algorithms, so that machine learning-enabled IoT devices can deliver information concealed in data for fast, computerized responses and enhanced decision-making.
The main objective of this book is to motivate healthcare providers to use telemedicine facilities for monitoring patients in urban and rural areas and gather clinical data for further research. To this end, it provides an overview of the Internet of Healthcare Things (IoHT) and discusses one of the major threats posed by it, which is the data security and data privacy of health records. Another major threat is the combination of numerous devices and protocols, precision time, data overloading, etc. In the IoHT, multiple devices are connected and communicate through certain protocols. Therefore, the application of emerging technologies to mitigate these threats and provide secure data communication over the network is discussed. This book also discusses the integration of machine learning with the IoHT for analyzing huge amounts of data for predicting diseases more accurately. Case studies are also given to verify the concepts presented in the book.
Audience
Researchers and industry engineers in computer science, artificial intelligence, healthcare sector, IT professionals, network administrators, cybersecurity experts.
Cover Table of Contents Title Page Copyright Preface Objective of the Book Organization of the Book Section 1: Security and Privacy Concerns in the IoHT (Chapters 1–3) Section 2: Application of Machine Learning, Blockchain and Fog Computing in the IoHT (Chapters 4–8) Section 3: Case Studies on Healthcare (Chapters 9–12) Section 1 SECURITY AND PRIVACY CONCERN IN IoHT 1 Data Security and Privacy Concern in the Healthcare System 1.1 Introduction 1.2 Privacy and Security Concerns on E-Health Data 1.3 Levels of Threat to Information in Healthcare Organizations 1.4 Security and Privacy Requirement 1.5 Security of Healthcare Data 1.6 Privacy-Preserving Methods in Data 1.7 Conclusion References 2 Authentication and Authorization Mechanisms for Internet of Healthcare Things 2.1 Introduction 2.2 Stakeholders in IoHT 2.3 IoHT Process Flow 2.4 Sources of Vulnerability 2.5 Security Features 2.6 Challenges to the Security Fabric 2.7 Security Techniques—User Authentication 2.8 Conclusions References 3 Security and Privacy Issues Related to Big Data-Based Ubiquitous Healthcare Systems 3.1 Introduction 3.2 Big Data Privacy & Security Issues 3.3 Big Data Security Problem 3.4 Privacy of Big Data in Healthcare 3.5 Privacy Conserving Methods in Big Data 3.6 Conclusion References Section 2 APPLICATION OF MACHINE LEARNING, BLOCKCHAIN AND FOG COMPUTING ON IoHT 4 Machine Learning Aspects for Trustworthy Internet of Healthcare Things 4.1 Introduction 4.2 Overview of Internet of Things 4.3 Security Issues of IoT 4.4 Internet of Healthcare Things (IoHT): Architecture and Challenges 4.5 Security Protocols in IoHT 4.6 Application of Machine Learning for Intrusion Detection in IoHT 4.7 Proposed Framework 4.8 Conclusion References 5 Analyzing Recent Trends and Public Sentiment for Internet of Healthcare Things and Its Impact on Future Health Crisis 5.1 Introduction 5.2 Literature Review 5.3 Overview of the Internet of Healthcare Things 5.4 Performing Topic Modeling on IoHTs Dataset 5.5 Performing Sentiment Analysis on IoHTs Dataset 5.6 Conclusion and Future Scope References 6 Rise of Telemedicine in Healthcare Systems Using Machine Learning: A Key Discussion 6.1 Introduction 6.2 Types of Machine Learning 6.3 Telemedicine Advantages 6.4 Telemedicine Disadvantages 6.5 Review of Literature 6.6 Fundamental Key Components Needed to Begin Telemedicine 6.7 Types of Telemedicine 6.8 Benefits of Telemedicine 6.9 Application of Telemedicine Using Machine Learning 6.10 Innovation Infrastructure of Telemedicine 6.11 Utilization of Mobile Wireless Devices in Telemedicine 6.12 Conclusion References 7 Trusted Communication in the Healthcare Sector Using Blockchain 7.1 Introduction 7.2 Overview of Blockchain 7.3 Medical IoT Concerns 7.4 Needs for Security in Medical IoT 7.5 Uses of Blockchain in Healthcare 7.6 Solutions for IoT Healthcare Cyber-Security 7.7 Executions of Trusted Environment 7.8 Patient Registration Using Medical IoT Devices 7.9 Trusted Communications Using Blockchain 7.10 Combined Workflows 7.11 Conclusions References 8 Blockchain in Smart Healthcare Management 8.1 Introduction 8.2 Healthcare Industry 8.3 Blockchain Technology 8.4 Applications of Blockchain in Healthcare 8.5 Challenges of Blockchain in Healthcare 8.6 Future Research Directions 8.7 Conclusion References Section 3 CASE STUDIES OF HEALTHCARE 9 Organ Trafficking on the Dark Web—The Data Security and Privacy Concern in Healthcare Systems 9.1 Introduction 9.2 Inclination for Cybersecurity Web Peril 9.3 Literature Review 9.4 Market Paucity or Organ Donors 9.5 Organ Harvesting and Transplant Tourism Revenue 9.6 Social Web Net Crimes 9.7 DW—Frontier of Illicit Human Harvesting 9.8 Organ Harvesting Apprehension 9.9 Result and Discussions 9.10 Conclusions References 10 Deep Learning Techniques for Data Analysis Prediction in the Prevention of Heart Attacks Abbreviations 10.1 Introduction 10.2 Literature Survey 10.3 Materials and Method 10.4 Training Models 10.5 Data Preparation 10.6 Results Obtained 10.7 Conclusion References 11 Supervising Healthcare Schemes Using Machine Learning in Breast Cancer and Internet of Things (SHSMLIoT) 11.1 Introduction 11.2 Related Work 11.3 IoT and Disease 11.4 Research Materials and Methods 11.5 Experimental Outcomes 11.6 Conclusion References 12 Perspective-Based Studies of Trust in IoHT and Machine Learning-Brain Cancer 12.1 Introduction 12.2 Literature Survey 12.3 Illustration of Brain Cancer 12.4 Sleuthing and Classification of Brain Tumors 12.5 Survival Rate of Brain Tumors 12.6 Conclusion References Index End User License Agreement
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.