Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

A Survey on Data Privacy Approaches in Biomedical Sensor Network

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 105 - Number 13
Year of Publication: 2014
Authors:
Narasimha Kamath A
Chinthan Bhat
10.5120/18435-9084

Narasimha Kamath A and Chinthan Bhat. Article: A Survey on Data Privacy Approaches in Biomedical Sensor Network. International Journal of Computer Applications 105(13):6-11, November 2014. Full text available. BibTeX

@article{key:article,
	author = {Narasimha Kamath A and Chinthan Bhat},
	title = {Article: A Survey on Data Privacy Approaches in Biomedical Sensor Network},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {105},
	number = {13},
	pages = {6-11},
	month = {November},
	note = {Full text available}
}

Abstract

Wireless Sensors are a new class of devices. They have the potential of capturing, processing and communicating the data to the required destination within the given timestamp. Biomedical Sensor Network (BSN) is explicitly used for constant monitoring of patients. Within the hospital or extended care environment, there is an overwhelming need for BSN for effective patient monitoring and collaborative data processing. Data privacy is the relationship between the collection and dissemination of data. Privacy concerns exist wherever personal identifiable information is collected and stored-in digital form. Improper or non-existent disclosure control can be a root cause for privacy issues. In this paper, these concerns are discussed and how they are addressed by existing systems, and also discusses current issues and solutions to the privacy concerns in a BSN based system.

References

  • Security Issues in Biomedical Sensor Networks Tassos Dimitriou, Krontiris Ioannis Athens Information Technology, 19002 Peania, Athens, Greece {tdim,ikro}@ait. edu. gr
  • K. Lorincz, D. J. Malan, T. R. F. Fulford-Jones, A. Nawoj, A. Clavel, V. Shnayder, G. Mainland, M. Welsh, and S. Moulton, "Sensor networks for emergency response: Challenges and opportunities," IEEE Pervasive Computing, vol. 3, no. 4, pp. 16–23, 2013.
  • A. Wood, G. Virone, T. Doan, Q. Cao, L. Selavo, Y. Wu, L. Fang, Z. He, S. Lin, and J. Stankovic, "ALARM-NET: Wireless sensor networks for assisted-living and residential monitoring," Department of Computer Science, University of Virginia, Tech. Rep. CS-2006-1, 2006.
  • Secure and Privacy Approach in Mobile-Healthcare emergency Using PPSPC technique 1MOWNIKA. K, 2K. C. PRADEEP 1,2Dept. of CSE, KAKINADA INSTITUTE OF ENGINEERING & TECHNOLOGY. , Yanam Road, Korangi, E. G. Dt,AP, India
  • Security and Privacy Challenges in Smart Sensor Networks Cristian Tanas Dept. Eng. de la Informaci´o i les Comunicacions Univertsitat Aut`onoma de Barcelona ctanas@deic. uab. cat Cristina P´erez-Sol`a Dept. Eng. de la Informaci´o i les Comunicacions Univertsitat Aut`onoma de Barcelona cperez@deic. uab. cat Jordi Herrera-Joancomart´I Univertsitat Aut`onoma de Barcelona jherrera@deic. uab. cat IN3 - Univertsitat Oberta de Catalunya jherreraj@uoc. edu.
  • E. Toch, Y. Wang, and L. F. Cranor, "Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems," User Modeling and User Adapted Interaction, vol. 22, no. 1, pp. 203–220, Apr. 2012
  • Location Privacy In UrBSN Sensing Networks: Research Challenges And Directions Ioannis Krontirois, Goethe University Felix C. Freling, University Of Mannheim Tassos Dimitriou, Athens Information Technology.
  • C. Cornelius, A. Kapadia, and N. Triandopoulos, "Anony- Sense: Privacy-Aware People-Centric Sensing," Proc. 6th ACM MobiSys '08, Breckenridge, CO, June 2008, pp. 211–24.
  • C. Ruiz Vicente, D. Freni, C. Bettini, and C. S. Jensen, "Locationrelated privacy in geo-social networks," IEEE Internet Computing,vol. 15, no. 3, pp. 20–27, May 2013
  • I. Teranishi, J. Furukawa, and K. Sako, "k-times Anonymous Authentication," Proc. 10th ASIACRYPT '04, Dec. 2012, pp. 308–22.
  • A. Liu and P. Ning, "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks," Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN 2008), vol. 0, pp. 245–256, 2008.
  • R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, "Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications," IEEE Transactions on Parallel Distributed and Systems, to appear.
  • H. G. Hwang, H. E. Han, K. M. Kuo, and C. F. Liu, The differing privacy concerns re-garding exchanging electronic medical records of internet users in taiwan, Journal of Medi-cal System, 36, 6, (2012)
  • S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair, "Over-exposed?: privacy patterns and considerations in online and mobile photo sharing," in CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems. New York, NY, USA: ACM, 2007, pp. 357–366
  • C. Ruiz Vicente, D. Freni, C. Bettini, and C. S. Jensen, "Locationrelated privacy in geo-social networks," IEEE Internet Computing, vol. 15, no. 3, pp. 20–27, May 2011.
  • M. Healy, T. Newe, and E. Lewis, "Efficiently securing data on a wireless sensor network," Journal of Physics: Conference Series, vol. 76, 2010.