Preface |
|
xiii | |
Section 1: Security and Privacy Concern in IoHT |
|
1 | (64) |
|
1 Data Security and Privacy Concern in the Healthcare System |
|
|
3 | (24) |
|
|
|
3 | (3) |
|
1.2 Privacy and Security Concerns on E-Health Data |
|
|
6 | (1) |
|
1.3 Levels of Threat to Information in Healthcare Organizations |
|
|
6 | (3) |
|
1.4 Security and Privacy Requirement |
|
|
9 | (2) |
|
1.5 Security of Healthcare Data |
|
|
11 | (7) |
|
|
11 | (4) |
|
1.5.2 Future Challenges in Security and Privacy in the Healthcare Sector |
|
|
15 | (1) |
|
1.5.3 Future Work to be Done in Security and Privacy in the Healthcare Sector |
|
|
16 | (2) |
|
1.6 Privacy-Preserving Methods in Data |
|
|
18 | (4) |
|
|
22 | (1) |
|
|
23 | (4) |
|
2 Authentication and Authorization Mechanisms for Internet of Healthcare Things |
|
|
27 | (14) |
|
Srinivasan Lakshmi Narasimhan |
|
|
|
28 | (1) |
|
|
29 | (2) |
|
|
31 | (2) |
|
2.4 Sources of Vulnerability |
|
|
33 | (1) |
|
|
34 | (1) |
|
2.6 Challenges to the Security Fabric |
|
|
35 | (1) |
|
2.7 Security Techniques-User Authentication |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
38 | (3) |
|
3 Security and Privacy Issues Related to Big Data-Based Ubiquitous Healthcare Systems |
|
|
41 | (24) |
|
|
|
41 | (1) |
|
3.2 Big Data Privacy & Security Issues |
|
|
42 | (1) |
|
3.3 Big Data Security Problem |
|
|
43 | (7) |
|
3.3.1 Big Data Security Lifecycle |
|
|
44 | (3) |
|
3.3.2 Threats & Attacks on Big Data |
|
|
47 | (1) |
|
3.3.3 Current Technologies in Use |
|
|
48 | (2) |
|
3.4 Privacy of Big Data in Healthcare |
|
|
50 | (6) |
|
3.4.1 Data Protection Acts |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
53 | (3) |
|
3.5 Privacy Conserving Methods in Big Data |
|
|
56 | (4) |
|
|
60 | (1) |
|
|
61 | (4) |
Section 2: Application of Machine Learning, Blockchain and Fog Computing on IoHT |
|
65 | (124) |
|
4 Machine Learning Aspects for Trustworthy Internet of Healthcare Things |
|
|
67 | (28) |
|
|
|
|
|
|
68 | (1) |
|
4.2 Overview of Internet of Things |
|
|
69 | (5) |
|
4.2.1 Application Area of IoT |
|
|
72 | (1) |
|
|
73 | (1) |
|
4.2.1.2 Smart Home Applications |
|
|
73 | (1) |
|
4.2.1.3 Healthcare IoT Applications |
|
|
73 | (1) |
|
|
73 | (1) |
|
4.2.1.5 Smart Agriculture |
|
|
74 | (1) |
|
4.2.1.6 Industrial Internet of Things |
|
|
74 | (1) |
|
4.3 Security Issues of IoT |
|
|
74 | (2) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
4.4 Internet of Healthcare Things (IoHT): Architecture and Challenges |
|
|
76 | (6) |
|
|
77 | (1) |
|
4.4.2 IoHT Architecture and Data Processing Stages |
|
|
78 | (2) |
|
4.4.3 Benefits Associated With Healthcare Based on the IoT |
|
|
80 | (1) |
|
4.4.4 Challenges Faced by IoHT |
|
|
81 | (1) |
|
|
81 | (1) |
|
4.5 Security Protocols in IoHT |
|
|
82 | (2) |
|
|
83 | (1) |
|
4.5.2 User/Device Authentication |
|
|
83 | (1) |
|
4.5.3 Access Control/User Access Control |
|
|
83 | (1) |
|
4.5.4 Intrusion Detection |
|
|
83 | (1) |
|
4.6 Application of Machine Learning for Intrusion Detection in IoHT |
|
|
84 | (2) |
|
|
86 | (4) |
|
|
90 | (1) |
|
|
90 | (5) |
|
5 Analyzing Recent Trends and Public Sentiment for Internet of Healthcare Things and Its Impact on Future Health Crisis |
|
|
95 | (18) |
|
|
|
96 | (1) |
|
|
97 | (3) |
|
5.3 Overview of the Internet of Healthcare Things |
|
|
100 | (4) |
|
5.4 Performing Topic Modeling on IoHTs Dataset |
|
|
104 | (3) |
|
5.5 Performing Sentiment Analysis on IoHTs Dataset |
|
|
107 | (3) |
|
5.6 Conclusion and Future Scope |
|
|
110 | (1) |
|
|
111 | (2) |
|
6 Rise of Telemedicine in Healthcare Systems Using Machine Learning: A Key Discussion |
|
|
113 | (18) |
|
|
|
|
114 | (1) |
|
6.2 Types of Machine Learning |
|
|
115 | (1) |
|
6.3 Telemedicine Advantages |
|
|
115 | (1) |
|
6.4 Telemedicine Disadvantages |
|
|
116 | (1) |
|
|
116 | (2) |
|
6.6 Fundamental Key Components Needed to Begin Telemedicine |
|
|
118 | (1) |
|
6.6.1 Collaboration Instruments |
|
|
118 | (1) |
|
6.6.2 Clinical Peripherals |
|
|
119 | (1) |
|
|
119 | (1) |
|
6.6.4 Cloud-Based Administrations |
|
|
119 | (1) |
|
6.7 Types of Telemedicine |
|
|
119 | (5) |
|
6.7.1 Store-and-Forward Method |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
121 | (2) |
|
|
123 | (1) |
|
6.7.3 Interactive Services |
|
|
123 | (1) |
|
6.8 Benefits of Telemedicine |
|
|
124 | (1) |
|
6.9 Application of Telemedicine Using Machine Learning |
|
|
125 | (1) |
|
6.10 Innovation Infrastructure of Telemedicine |
|
|
125 | (1) |
|
6.11 Utilization of Mobile Wireless Devices in Telemedicine |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
128 | (3) |
|
7 Trusted Communication in the Healthcare Sector Using Blockchain |
|
|
131 | (30) |
|
|
|
131 | (2) |
|
7.2 Overview of Blockchain |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
7.4 Needs for Security in Medical IoT |
|
|
135 | (2) |
|
7.5 Uses of Blockchain in Healthcare |
|
|
137 | (1) |
|
7.6 Solutions for IoT Healthcare Cyber-Security |
|
|
138 | (2) |
|
7.6.1 Architecture of the Smart Healthcare System |
|
|
139 | (1) |
|
7.6.1.1 Data Perception Layer |
|
|
139 | (1) |
|
7.6.1.2 Data Communication Layer |
|
|
140 | (1) |
|
7.6.1.3 Data Storage Layer |
|
|
140 | (1) |
|
7.6.1.4 Data Application Layer |
|
|
140 | (1) |
|
7.7 Executions of Trusted Environment |
|
|
140 | (4) |
|
7.7.1 Root of Trust Security Services |
|
|
141 | (2) |
|
7.7.2 Chain of Trust Security Services |
|
|
143 | (1) |
|
7.8 Patient Registration Using Medical IoT Devices |
|
|
144 | (5) |
|
|
145 | (1) |
|
|
146 | (1) |
|
7.8.3 Security by Isolation |
|
|
146 | (1) |
|
|
146 | (3) |
|
7.9 Trusted Communications Using Blockchain |
|
|
149 | (3) |
|
7.9.1 Record Creation Using IoT Gateways |
|
|
150 | (1) |
|
7.9.2 Accessibility to Patient Medical History |
|
|
151 | (1) |
|
7.9.3 Patient Enquiry With the Hospital Authority |
|
|
151 | (1) |
|
7.9.4 Blockchain-Based IoT System Architecture |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
152 | (2) |
|
7.10.1 Layer 1: The Gateway Collects IoT Data and Generates a New Record |
|
|
152 | (1) |
|
7.10.2 Layer 2: Gateway/Authority Want to Access Patient's Medical Record |
|
|
153 | (1) |
|
7.10.3 Layer 3: Patient Visits and Interact With an Authority |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (7) |
|
8 Blockchain in Smart Healthcare Management |
|
|
161 | (28) |
|
|
|
|
|
|
|
162 | (1) |
|
|
163 | (5) |
|
8.2.1 Classification of Healthcare Services |
|
|
163 | (1) |
|
8.2.2 Health Information Technology (HIT) |
|
|
164 | (1) |
|
8.2.3 Issues and Challenges Faced by Major Stakeholders in the Healthcare Industry |
|
|
165 | (1) |
|
|
166 | (1) |
|
8.2.3.2 The Pharmaceutical Industry |
|
|
166 | (1) |
|
8.2.3.3 The Healthcare Service Providers |
|
|
166 | (1) |
|
|
167 | (1) |
|
8.2.3.5 Insurance Company |
|
|
167 | (1) |
|
8.3 Blockchain Technology |
|
|
168 | (8) |
|
|
168 | (2) |
|
8.3.2 Features of Blockchain |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (1) |
|
8.3.3 Workings of a Blockchain System |
|
|
171 | (2) |
|
8.3.4 Applications of Blockchain |
|
|
173 | (1) |
|
8.3.4.1 Financial Services |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
8.3.4.4 Identity Management |
|
|
173 | (1) |
|
|
173 | (1) |
|
8.3.5 Challenges and Drawbacks of Blockchain |
|
|
174 | (2) |
|
8.4 Applications of Blockchain in Healthcare |
|
|
176 | (7) |
|
8.4.1 Electronic Medical Records (EMR) and Electronic Health Records (EHR) |
|
|
176 | (1) |
|
|
177 | (1) |
|
8.4.3 Remote Monitoring/IoMT |
|
|
178 | (1) |
|
|
179 | (1) |
|
8.4.5 Drug Counterfeiting |
|
|
180 | (2) |
|
|
182 | (1) |
|
8.4.7 Public Health Management |
|
|
182 | (1) |
|
8.5 Challenges of Blockchain in Healthcare |
|
|
183 | (1) |
|
8.6 Future Research Directions |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
186 | (3) |
Section 3: Case Studies of Healthcare |
|
189 | (92) |
|
9 Organ Trafficking on the Dark Web-The Data Security and Privacy Concern in Healthcare Systems |
|
|
191 | (26) |
|
|
|
|
|
|
|
|
192 | (2) |
|
9.2 Inclination for Cybersecurity Web Peril |
|
|
194 | (3) |
|
|
197 | (2) |
|
9.4 Market Paucity or Organ Donors |
|
|
199 | (4) |
|
9.5 Organ Harvesting and Transplant Tourism Revenue |
|
|
203 | (1) |
|
9.6 Social Web Net Crimes |
|
|
204 | (5) |
|
9.7 DW-Frontier of Illicit Human Harvesting |
|
|
209 | (1) |
|
9.8 Organ Harvesting Apprehension |
|
|
209 | (3) |
|
9.9 Result and Discussions |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (4) |
|
10 Deep Learning Techniques for Data Analysis Prediction in the Prevention of Heart Attacks |
|
|
217 | (24) |
|
|
|
|
|
|
|
218 | (1) |
|
|
218 | (1) |
|
|
219 | (2) |
|
10.3 Materials and Method |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
222 | (5) |
|
10.4.1 Artificial Neural Network (ANN) |
|
|
222 | (2) |
|
10.4.2 K-Nearest Neighbor Classifier |
|
|
224 | (1) |
|
10.4.3 Naive Bayes Classifier |
|
|
225 | (1) |
|
10.4.4 Decision Tree Classifier (DTC) |
|
|
226 | (1) |
|
10.4.5 Random Forest Classifier (RFC) |
|
|
226 | (1) |
|
10.4.6 Neural Network Implementation |
|
|
226 | (1) |
|
|
227 | (1) |
|
10.5.1 Multi-Layer Perceptron Neural Network (MLPNN) Algorithm and Prediction |
|
|
227 | (1) |
|
|
228 | (8) |
|
|
228 | (1) |
|
|
228 | (8) |
|
|
236 | (1) |
|
|
236 | (5) |
|
11 Supervising Healthcare Schemes Using Machine Learning in Breast Cancer and Internet of Things (SHSMLIoT) |
|
|
241 | (24) |
|
|
|
|
|
242 | (3) |
|
|
245 | (5) |
|
|
250 | (1) |
|
11.4 Research Materials and Methods |
|
|
251 | (2) |
|
|
251 | (1) |
|
11.4.2 Data Pre-Processing |
|
|
252 | (1) |
|
11.4.3 Classification Algorithms |
|
|
252 | (1) |
|
11.5 Experimental Outcomes |
|
|
253 | (4) |
|
|
257 | (1) |
|
|
258 | (7) |
|
12 Perspective-Based Studies of Trust in IoHT and Machine Learning-Brain Cancer |
|
|
265 | (16) |
|
|
|
|
|
|
266 | (1) |
|
|
267 | (1) |
|
12.3 Illustration of Brain Cancer |
|
|
268 | (5) |
|
|
268 | (1) |
|
12.3.2 Types of Brain Tumors |
|
|
269 | (1) |
|
12.3.3 Grades of Brain Tumors |
|
|
270 | (1) |
|
12.3.4 Symptoms of Brain Tumors |
|
|
271 | (2) |
|
12.4 Sleuthing and Classification of Brain Tumors |
|
|
273 | (1) |
|
12.4.1 Sleuthing of Brain Tumors |
|
|
273 | (1) |
|
12.4.2 Challenges During Classification of Brain Tumors |
|
|
274 | (1) |
|
12.5 Survival Rate of Brain Tumors |
|
|
274 | (4) |
|
|
278 | (1) |
|
|
279 | (2) |
Index |
|
281 | |