Security Challenges in Fog Computing in Healthcare

نویسندگان

  • Hosseini, Foroughosadat Master of Science in Computer Engineering, Faculty of Electrical & Computer Engineering, Islamic Azad University, Zanjan Branch, Zanjan, Iran
  • Ronaghi, Mohammad Hossein Assistant Professor, Department of Management, Faculty of Economics, Management and Social Sciences, Shiraz University, Shiraz, Iran
چکیده مقاله:

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and open structure makes it vulnerable and weak to security threats. Therefore, the aim of this paper was to identify the security challenges in healthcare. Materials and Methods: This applied research has been done in three phases using mixed-method approach in 2019. In the first phase, security codes from library resources by content analysis was identified. In the second phase interpretation of experts by Delphi method, Panel of IT experts consists of twelve members who work on healthcare sector was evaluated. Finally, we used Analytic Hierarchy Process method for ranking security codes. Results: According to fuzzy AHP results attacks(0.31), secure communications(0.23), authentication and access control(0.19), trust(0.15) and privacy preservation(0.12) are the most important criteria in security challenges of fog computing. Conclusion: According to the results of this study, secure communications and network attacks are the major challenges in fog computing, because fog nodes are usually deployed in some places with relatively weak protection. They may encounter various malicious attacks. As a result, policymakers should be aware of the role of secure communications and network attacks in fog computing implementation.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Task Scheduling in Fog Computing: A Survey

Recently, fog computing has been introducedto solve the challenges of cloud computing regarding Internet objects. One of the challenges in the field of fog computing is the scheduling of tasks requested by Internet objects. In this study, a review of articles related to task scheduling in fog computing has been done. At first, the research questions and goals will be introduced, an...

متن کامل

Security Challenges in Cloud Computing

Cloud Computing is one of the biggest buzzwords in the computer world these days. It allows resource sharing that includes software, platform and infrastructure by means of virtualization. Virtualization is the core technology behind cloud resource sharing. This environment strives to be dynamic, reliable, and customizable with a guaranteed quality of service. Security is as much of an issue in...

متن کامل

Security Challenges In Cloud Computing

Cloud computing is a standard futuristic computing model for the society to implement Information Technology and associated functions with low cost computing capabilities. Cloud computing provide multiple, unrestricted distributed site from elastic computing to ondemand conditioning with vibrant storage and computing requirement ability. Despite the probable gains attained from cloud computing,...

متن کامل

Top 4 Network Security Challenges in Healthcare

• .................................................................... Top 4 Network Security Challenges › Addressing Security Challenges with Network Access Control › An Evolving Network Environment. • .................................... Securing and Provisioning Medical Devices › Securing Network Access for Guests and Visitors › Securing Access to Patient Information › Achieving Complia...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 14  شماره 1

صفحات  1- 10

تاریخ انتشار 2020-03

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

کلمات کلیدی

کلمات کلیدی برای این مقاله ارائه نشده است

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023