-
Sensors (Basel, Switzerland) Sep 2022The overwhelming acceptance and growing need for Internet of Things (IoT) products in each aspect of everyday living is creating a promising prospect for the involvement... (Review)
Review
The overwhelming acceptance and growing need for Internet of Things (IoT) products in each aspect of everyday living is creating a promising prospect for the involvement of humans, data, and procedures. The vast areas create opportunities from home to industry to make an automated lifecycle. Human life is involved in enormous applications such as intelligent transportation, intelligent healthcare, smart grid, smart city, etc. A thriving surface is created that can affect society, the economy, the environment, politics, and health through diverse security threats. Generally, IoT devices are susceptible to security breaches, and the development of industrial systems could pose devastating security vulnerabilities. To build a reliable security shield, the challenges encountered must be embraced. Therefore, this survey paper is primarily aimed to assist researchers by classifying attacks/vulnerabilities based on objects. The method of attacks and relevant countermeasures are provided for each kind of attack in this work. Case studies of the most important applications of the IoT are highlighted concerning security solutions. The survey of security solutions is not limited to traditional secret key-based cryptographic solutions, moreover physical unclonable functions (PUF)-based solutions and blockchain are illustrated. The pros and cons of each security solution are also discussed here. Furthermore, challenges and recommendations are presented in this work.
Topics: Blockchain; Computer Security; Delivery of Health Care; Humans; Internet of Things
PubMed: 36236531
DOI: 10.3390/s22197433 -
EPJ Data Science 2021Data visualizations are a valuable tool used during both statistical analysis and the interpretation of results as they graphically reveal useful information about the...
Data visualizations are a valuable tool used during both statistical analysis and the interpretation of results as they graphically reveal useful information about the structure, properties and relationships between variables, which may otherwise be concealed in tabulated data. In disciplines like medicine and the social sciences, where collected data include sensitive information about study participants, the sharing and publication of individual-level records is controlled by data protection laws and ethico-legal norms. Thus, as data visualizations - such as graphs and plots - may be linked to other released information and used to identify study participants and their personal attributes, their creation is often prohibited by the terms of data use. These restrictions are enforced to reduce the risk of breaching data subject confidentiality, however they limit analysts from displaying useful descriptive plots for their research features and findings. Here we propose the use of anonymization techniques to generate privacy-preserving visualizations that retain the statistical properties of the underlying data while still adhering to strict data disclosure rules. We demonstrate the use of (i) the well-known -anonymization process which preserves privacy by reducing the granularity of the data using suppression and generalization, (ii) a novel deterministic approach that replaces individual-level observations with the centroids of each nearest neighbours, and (iii) a probabilistic procedure that perturbs individual attributes with the addition of random stochastic noise. We apply the proposed methods to generate privacy-preserving data visualizations for exploratory data analysis and inferential regression plot diagnostics, and we discuss their strengths and limitations.
PubMed: 33442528
DOI: 10.1140/epjds/s13688-020-00257-4 -
Human Genetics Aug 2018Canada's regulatory frameworks governing privacy and research are generally permissive of genomic data sharing, though they may soon be tightened in response to public... (Review)
Review
Canada's regulatory frameworks governing privacy and research are generally permissive of genomic data sharing, though they may soon be tightened in response to public concerns over commercial data handling practices and the strengthening of influential European privacy laws. Regulation can seem complex and uncertain, in part because of the constitutional division of power between federal and provincial governments over both privacy and health care. Broad consent is commonly practiced in genomic research, but without explicit regulatory recognition, it is often scrutinized by research or privacy oversight bodies. Secondary use of health-care data is legally permissible under limited circumstances. A new federal law prohibits genetic discrimination, but is subject to a constitutional challenge. Privacy laws require security safeguards proportionate to the data sensitivity, including breach notification. Special categories of data are not defined a priori. With some exceptions, Canadian researchers are permitted to share personal information internationally but are held accountable for safeguarding the privacy and security of these data. Cloud computing to store and share large scale data sets is permitted, if shared responsibilities for access, responsible use, and security are carefully articulated. For the moment, Canada's commercial sector is recognized as "adequate" by Europe, facilitating import of European data. Maintaining adequacy status under the new European General Data Protection Regulation (GDPR) is a concern because of Canada's weaker individual rights, privacy protections, and regulatory enforcement. Researchers must stay attuned to shifting international and national regulations to ensure a sustainable future for responsible genomic data sharing.
Topics: Canada; Computer Security; Databases, Genetic; Genetic Privacy; Genetic Research; Humans; Personally Identifiable Information
PubMed: 30014188
DOI: 10.1007/s00439-018-1905-0 -
Sensors (Basel, Switzerland) Jan 2023Industry 5.0 is projected to be an exemplary improvement in digital transformation allowing for mass customization and production efficiencies using emerging... (Review)
Review
Industry 5.0 is projected to be an exemplary improvement in digital transformation allowing for mass customization and production efficiencies using emerging technologies such as universal machines, autonomous and self-driving robots, self-healing networks, cloud data analytics, etc., to supersede the limitations of Industry 4.0. To successfully pave the way for acceptance of these technologies, we must be bound and adhere to ethical and regulatory standards. Presently, with ethical standards still under development, and each region following a different set of standards and policies, the complexity of being compliant increases. Having vague and inconsistent ethical guidelines leaves potential gray areas leading to privacy, ethical, and data breaches that must be resolved. This paper examines the ethical dimensions and dilemmas associated with emerging technologies and provides potential methods to mitigate their legal/regulatory issues.
PubMed: 36772190
DOI: 10.3390/s23031151 -
Alcohol Research : Current Reviews 2014Research on the use of mobile technologies for alcohol use problems is a developing field. Rapid technological advances in mobile health (or mHealth) research generate... (Review)
Review
Research on the use of mobile technologies for alcohol use problems is a developing field. Rapid technological advances in mobile health (or mHealth) research generate both opportunities and challenges, including how to create scalable systems capable of collecting unprecedented amounts of data and conducting interventions-some in real time-while at the same time protecting the privacy and safety of research participants. Although the research literature in this area is sparse, lessons can be borrowed from other communities, such as cybersecurity or Internet security, which offer many techniques to reduce the potential risk of data breaches or tampering in mHealth. More research into measures to minimize risk to privacy and security effectively in mHealth is needed. Even so, progress in mHealth research should not stop while the field waits for perfect solutions.
Topics: Biomedical Research; Computer Security; Humans; Privacy; Telemedicine
PubMed: 26259009
DOI: No ID Found -
Australian Journal of General Practice Jul 2022In the era of socially distanced clinical and medical research practices, the use of electronic communication has flourished. The Australian Information Commissioner...
BACKGROUND
In the era of socially distanced clinical and medical research practices, the use of electronic communication has flourished. The Australian Information Commissioner recently ordered a Victorian general practice to pay $16,400 in compensation following a breach of privacy. This is the largest award of compensation made by the Commissioner in the context of a medical or healthcare privacy matter. The practice had inadvertently sent an email containing sensitive information to an incorrect email address. The email included information concerning the human immunodeficiency virus status of the complainants.
OBJECTIVE
The aim of this article is to provide an overview of this important case in Australian information and privacy law, which relates to the operation of an Australian general practice and research activity undertaken within the practice context.
DISCUSSION
In an era marked by a great increase in the use of electronic communication in the medical setting, it is essential that practices both manage electronic communication well and respond appropriately when an error arises.
Topics: Australia; Communication; Electronics; Family Practice; Humans; Privacy
PubMed: 35773159
DOI: 10.31128/AJGP-05-21-6008 -
Nature Reviews. Genetics Jun 2014We are entering an era of ubiquitous genetic information for research, clinical care and personal curiosity. Sharing these data sets is vital for progress in biomedical... (Review)
Review
We are entering an era of ubiquitous genetic information for research, clinical care and personal curiosity. Sharing these data sets is vital for progress in biomedical research. However, a growing concern is the ability to protect the genetic privacy of the data originators. Here, we present an overview of genetic privacy breaching strategies. We outline the principles of each technique, indicate the underlying assumptions, and assess their technological complexity and maturation. We then review potential mitigation methods for privacy-preserving dissemination of sensitive data and highlight different cases that are relevant to genetic applications.
Topics: Computer Security; Genetic Privacy; Genetics, Medical; Humans
PubMed: 24805122
DOI: 10.1038/nrg3723 -
Entropy (Basel, Switzerland) Nov 2023With the development of mobile applications, location-based services (LBSs) have been incorporated into people's daily lives and created huge commercial revenues....
With the development of mobile applications, location-based services (LBSs) have been incorporated into people's daily lives and created huge commercial revenues. However, when using these services, people also face the risk of personal privacy breaches due to the release of location and query content. Many existing location privacy protection schemes with centralized architectures assume that anonymous servers are secure and trustworthy. This assumption is difficult to guarantee in real applications. To solve the problem of relying on the security and trustworthiness of anonymous servers, we propose a Geohash-based location privacy protection scheme for snapshot queries. It is named GLPS. On the user side, GLPS uses Geohash encoding technology to convert the user's location coordinates into a string code representing a rectangular geographic area. GLPS uses the code as the privacy location to send check-ins and queries to the anonymous server and to avoid the anonymous server gaining the user's exact location. On the anonymous server side, the scheme takes advantage of Geohash codes' geospatial gridding capabilities and GL-Tree's effective location retrieval performance to generate a -anonymous query set based on user-defined minimum and maximum hidden cells, making it harder for adversaries to pinpoint the user's location. We experimentally tested the performance of GLPS and compared it with three schemes: Casper, GCasper, and DLS. The experimental results and analyses demonstrate that GLPS has a good performance and privacy protection capability, which resolves the reliance on the security and trustworthiness of anonymous servers. It also resists attacks involving background knowledge, regional centers, homogenization, distribution density, and identity association.
PubMed: 38136449
DOI: 10.3390/e25121569 -
Biomedical Materials & Devices (New... Feb 2023Artificial intelligence (AI) has the potential to make substantial progress toward the goal of making healthcare more personalized, predictive, preventative, and... (Review)
Review
Artificial intelligence (AI) has the potential to make substantial progress toward the goal of making healthcare more personalized, predictive, preventative, and interactive. We believe AI will continue its present path and ultimately become a mature and effective tool for the healthcare sector. Besides this AI-based systems raise concerns regarding data security and privacy. Because health records are important and vulnerable, hackers often target them during data breaches. The absence of standard guidelines for the moral use of AI and ML in healthcare has only served to worsen the situation. There is debate about how far artificial intelligence (AI) may be utilized ethically in healthcare settings since there are no universal guidelines for its use. Therefore, maintaining the confidentiality of medical records is crucial. This study enlightens the possible drawbacks of AI in the implementation of healthcare sector and their solutions to overcome these situations.
PubMed: 36785697
DOI: 10.1007/s44174-023-00063-2 -
American Journal of Public Health Sep 2001Protecting public health requires the acquisition, use, and storage of extensive health-related information about individuals. The electronic accumulation and exchange... (Review)
Review
Protecting public health requires the acquisition, use, and storage of extensive health-related information about individuals. The electronic accumulation and exchange of personal data promises significant public health benefits but also threatens individual privacy; breaches of privacy can lead to individual discrimination in employment, insurance, and government programs. Individuals concerned about privacy invasions may avoid clinical or public health tests, treatments, or research. Although individual privacy protections are critical, comprehensive federal privacy protections do not adequately protect public health data, and existing state privacy laws are inconsistent and fragmented. The Model State Public Health Privacy Act provides strong privacy safeguards for public health data while preserving the ability of state and local public health departments to act for the common good.
Topics: Community Health Planning; Computer Security; Confidentiality; Data Collection; Humans; Local Government; Medical Records Systems, Computerized; Patient Advocacy; Population Surveillance; Privacy; Public Health; State Government; United States
PubMed: 11527765
DOI: 10.2105/ajph.91.9.1388