Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 8 de 8
Filtrar
1.
Artículo en Inglés | MEDLINE | ID: mdl-37812535

RESUMEN

The emerging Internet of Things (IoTs) and cloud technologies spark dramatic growth in efficiency and productivity for the conventional e-health sector. However, the extensive applications of the communication network also expose the sensitive medical data to the unprecedented cyber threats. To protect the data privacy in IoTs-based e-health cloud environments, we propose an adaptively secure data sharing scheme with traceability and equality test (T-ABEET). The T-ABEET not only allows flexible access control to the massive data but also provides the functionality of traitor tracing to identity the users who leak their decryption keys. Meanwhile, through carrying out the equality test, the target ciphertext can be retrieved efficiently without revealing anything about the plaintext. Particularly, distinct from previous traceable ABE works, the tracing cost in our T-ABEET scheme keeps constant even with the increasing number of users. Also, by introducing the multi-authority mechanism, our T-ABEET can avoid the inherent key escrow problem of ABE. Furthermore, our T-ABEET is demonstrated adaptively secure under subgroup decision assumption. Finally, performance comparison reveals that our T-ABEET has superior practicality, efficiency, and security in cloud-enabled e-health systems.

2.
Multimed Tools Appl ; 82(9): 14219-14237, 2023.
Artículo en Inglés | MEDLINE | ID: mdl-36185320

RESUMEN

The classification of medical images is significant among researchers and physicians for the early identification and clinical treatment of many disorders. Though, traditional classifiers require more time and effort for feature extraction and reduction from images. To overcome this problem, there is a need for a new deep learning method known as Convolution Neural Network (CNN), which shows the high performance and self-learning capabilities. In this paper,to classify whether a chest X-ray (CXR) image shows pneumonia (Normal) or COVID-19 illness, a test-bed analysis has been carried out between pre-trained CNN models like Visual Geometry Group (VGG-16), VGG-19, Inception version 3 (INV3), Caps Net, DenseNet121, Residual Neural Network with 50 deep layers (ResNet50), Mobile-Net and proposed CNN classifier. It has been observed that, in terms of accuracy, the proposed CNN model appears to be potentially superior to others. Additionally, in order to increase the performance of the CNN classifier, a nature-inspired optimization method known as Hill-Climbing Algorithm based CNN (CNN-HCA) model has been proposed to enhance the CNN model's parameters. The proposed CNN-HCA model performance is tested using a simulation study and contrasted to existing hybridized classifiers like as Particle Swarm Optimization (CNN-PSO) and CNN-Jaya. The proposed CNN-HCA model is compared with peer reviewed works in the same domain. The CXR dataset, which is freely available on the Kaggle repository, was used for all experimental validations. In terms of Receiver Operating Characteristic Curve (ROC), Area Under the ROC Curve (AUC), sensitivity, specificity, F-score, and accuracy, the simulation findings show that the CNN-HCA is possibly superior than existing hybrid approaches. Each method employs a k-fold stratified cross-validation strategy to reduce over-fitting.

3.
IEEE Internet Things J ; 8(21): 16072-16082, 2021 Nov.
Artículo en Inglés | MEDLINE | ID: mdl-35782179

RESUMEN

Currently, COVID-19 pandemic is the major cause of disease burden globally. So, there is a need for an urgent solution to fight against this pandemic. Internet of Things (IoT) has the ability of data transmission without human interaction. This technology enables devices to connect in the hospitals and other planned locations to combat this situation. This article provides a road map by highlighting the IoT applications that can help to control it. This study also proposes a real-time identification and monitoring of COVID-19 patients. The proposed framework consists of four components using the cloud architecture: 1) data collection of disease symptoms (using IoT-based devices); 2) health center or quarantine center (data collected using IoT devices); 3) data warehouse (analysis using machine learning models); and 4) health professionals (provide treatment). To predict the severity level of COVID-19 patients on the basis of IoT-based real-time data, we experimented with five machine learning models. The results reveal that random forest outperformed among all other models. IoT applications will help management, health professionals, and patients to investigate the symptoms of contagious disease and manage COVID-19 +ve patients worldwide.

4.
IEEE Internet Things J ; 8(21): 15863-15874, 2021 Nov 01.
Artículo en Inglés | MEDLINE | ID: mdl-35782186

RESUMEN

Governments of the world have invested a lot of manpower and material resources to combat COVID-19 this year. At this moment, the most efficient way that could stop the epidemic is to leverage the contact tracing system to monitor people's daily contact information and isolate the close contacts of COVID-19. However, the contact tracing data usually contains people's sensitive information that they do not want to share with the contact tracing system and government. Conversely, the contact tracing system could perform better when it obtains more detailed contact tracing data. In this article, we treat the process of collecting contact tracing data from a crowdsourcing perspective in order to motivate users to contribute more contact tracing data and propose the incentive algorithm named CovidCrowd. Different from previous works where they ask users to contribute their data voluntarily, the government offers some reward to users who upload their contact tracing data to reimburse the privacy and data processing cost. We formulate the problem as a Stackelberg game and show there exists a Nash equilibrium for any user given the fixed reward value. Then, CovidCrowd computes the optimal reward value which could maximize the utility of the system. Finally, we conduct a large-scale simulation with thousands of users and evaluation with real-world data set. Both results show that CovidCrowd outperforms the benchmarks, e.g., the user participating level is improved by at least 13.2% for all evaluation scenarios.

5.
J Med Syst ; 39(11): 137, 2015 Nov.
Artículo en Inglés | MEDLINE | ID: mdl-26324169

RESUMEN

In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.


Asunto(s)
Seguridad Computacional/instrumentación , Intercambio de Información en Salud , Tarjetas Inteligentes de Salud , Algoritmos , Confidencialidad , Humanos , Sistemas de Información/instrumentación , Telemedicina/instrumentación
6.
IEEE Trans Syst Man Cybern B Cybern ; 42(5): 1343-56, 2012 Oct.
Artículo en Inglés | MEDLINE | ID: mdl-22514203

RESUMEN

Continuous authentication (CA) consists of authenticating the user repetitively throughout a session with the goal of detecting and protecting against session hijacking attacks. While the accuracy of the detector is central to the success of CA, the detection delay or length of an individual authentication period is important as well since it is a measure of the window of vulnerability of the system. However, high accuracy and small detection delay are conflicting requirements that need to be balanced for optimum detection. In this paper, we propose the use of sequential sampling technique to achieve optimum detection by trading off adequately between detection delay and accuracy in the CA process. We illustrate our approach through CA based on user command line sequence and naïve Bayes classification scheme. Experimental evaluation using the Greenberg data set yields encouraging results consisting of a false acceptance rate (FAR) of 11.78% and a false rejection rate (FRR) of 1.33%, with an average command sequence length (i.e., detection delay) of 37 commands. When using the Schonlau (SEA) data set, we obtain FAR = 4.28% and FRR = 12%.


Asunto(s)
Algoritmos , Inteligencia Artificial , Redes de Comunicación de Computadores , Seguridad Computacional , Reconocimiento de Normas Patrones Automatizadas/métodos , Tamaño de la Muestra , Procesamiento de Señales Asistido por Computador
8.
IEEE Trans Syst Man Cybern B Cybern ; 40(1): 66-76, 2010 Feb.
Artículo en Inglés | MEDLINE | ID: mdl-19884062

RESUMEN

In this paper, we present a learning-automata-like The reason why the mechanism is not a pure LA, but rather why it yet mimics one, will be clarified in the body of this paper. (LAL) mechanism for congestion avoidance in wired networks. Our algorithm, named as LAL Random Early Detection (LALRED), is founded on the principles of the operations of existing RED congestion-avoidance mechanisms, augmented with a LAL philosophy. The primary objective of LALRED is to optimize the value of the average size of the queue used for congestion avoidance and to consequently reduce the total loss of packets at the queue. We attempt to achieve this by stationing a LAL algorithm at the gateways and by discretizing the probabilities of the corresponding actions of the congestion-avoidance algorithm. At every time instant, the LAL scheme, in turn, chooses the action that possesses the maximal ratio between the number of times the chosen action is rewarded and the number of times that it has been chosen. In LALRED, we simultaneously increase the likelihood of the scheme converging to the action, which minimizes the number of packet drops at the gateway. Our approach helps to improve the performance of congestion avoidance by adaptively minimizing the queue-loss rate and the average queue size. Simulation results obtained using NS2 establish the improved performance of LALRED over the traditional RED methods which were chosen as the benchmarks for performance comparison purposes.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA
...