Back to Search Start Over

5G enabled IoT network and security in healthcare.

Authors :
Vismaya, O. K.
Kumar, Ajay
Syethima, K. R.
Source :
AIP Conference Proceedings. 2024, Vol. 2965 Issue 1, p1-5. 5p.
Publication Year :
2024

Abstract

Immediate and appropriate treatment for severely ill patients should be a top priority in healthcare. To get the treatment they need, they should have to go quite a distance. Patients may have significant health complications as a result of this journey. It is imperative that we shift away from this outdated model of healthcare and towards a more modern one so that people from all over the globe may get the care they need. The idea behind remote healthcare is that patients may access their physicians and other medical professionals from any location with the tap of a finger on a smartphone. From the standpoint of illness prevention, monitoring, hospital administration, and medical research, this distant healthcare incorporates several features made possible by contemporary information technology. Network of Things, fifth-generation wireless technology, data analytics on the cloud, microelectronics, AI, etc. All parts of remote healthcare may be improved by these technology. The healthcare business relies on data security measures to safeguard patients' private health information. Internet of Things (IoT) devices should provide privacy and security features in addition to remote data transmission. Such safety issues are addressed by constructing a hybrid database environment. Secure storage of patient data is an important design goal of the hybrid database system. Public and private data coexist in a hybrid database. A private database stores the personally identifiable information of patients, whereas a public database stores the rest of the raw data. Public data is encrypted using an advanced encryption standard technique, while private data is encrypted using the Fernet scheme. An advantage of using a hybrid database to store sensitive and non-sensitive data is the increased security it provides. Total calculation time, encryption time, and decryption time of AES and Fernet encryption are some of the metrics used to assess the suggested system's performance. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
0094243X
Volume :
2965
Issue :
1
Database :
Academic Search Index
Journal :
AIP Conference Proceedings
Publication Type :
Conference
Accession number :
178314959
Full Text :
https://doi.org/10.1063/5.0212093