Internet of Things Security and Privacy Issues in Healthcare Industry

  • Varija Sai Bitra
  • N. JayapandianEmail author
  • K. BalachandranEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)


The Internet of Things (IoT) is an imagines unavoidable, associated, and hubs connecting independently while offering a wide range of administrations. Wide conveyance, receptiveness and moderately high handling intensity of IoT objects made them a perfect focus for digital assaults. Additionally, the same number of IoT center points is assembling and taking care of private data, they are changing into a goldmine of information for malignant on-screen characters. Subsequently, security and particularly the capacity to recognize traded off hubs, together with gathering and safeguarding confirmations of an assault or malignant exercises develop as a need in effective arrangement of IoT systems. This paper is deal with some major security problems and challenging factors of IoT. This IoT security issues on really challenging factor in current world.


Big data Preprocessing Data analytics Data cleaning Distributed computing Hadoop file system Noisy data 


  1. 1.
    Domdouzis, K., Kumar, B., Anumba, C.: Radio-frequency identification (RFID) applications: a brief introduction. Adv. Eng. Inform. 21, 350–355 (2007)CrossRefGoogle Scholar
  2. 2.
    Jayapandian, N., Rahman, A.M.Z., Poornima, U., Padmavathy, P.: Efficient online solar energy monitoring and electricity sharing in home using cloud system. In: International Conference on Green Engineering and Technologies, Coimbatore, pp. 1–5. IEEE (2015)Google Scholar
  3. 3.
    Medaglia, C.M., Serbanati, A.: An overview of privacy and security issues in the internet of things. In: International Conference on the Internet of Things, pp. 389–395 (2010)CrossRefGoogle Scholar
  4. 4.
    Jayapandian, N., Md Zubair Rahman, A.M.J.: Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption. Clust. Comput. 20, 1561–1573 (2017)CrossRefGoogle Scholar
  5. 5.
    Stergiou, C., Psannis, K.E., Kim, B.G., Gupta, B.: Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 78, 964–975 (2018)CrossRefGoogle Scholar
  6. 6.
    Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29, 1645–1660 (2013)CrossRefGoogle Scholar
  7. 7.
    Jayapandian, N., Md Zubair Rahman, A.M.J.: Secure deduplication for cloud storage using interactive message-locked encryption with convergent encryption, to reduce storage space. Braz. Arch. Biol. Technol. 61, 1–13 (2018)CrossRefGoogle Scholar
  8. 8.
    Weber, R.H.: Internet of Things-new security and privacy challenges. Comput. Law Secur. Rev. 26, 23–30 (2010)CrossRefGoogle Scholar
  9. 9.
    Acquisti, A.: Privacy and security of personal information. In: International Conference on Economics of Information Security, pp. 179–186. Springer, Boston (2004)Google Scholar
  10. 10.
    Zgheib, R., Conchon, E., Bastide, R.: Engineering IoT healthcare applications: towards a semantic data driven sustainable architecture. In: International Conference in eHealth, vol. 360, pp. 409–418. Springer, Berlin (2017)Google Scholar
  11. 11.
    Bhatt, C., Dey, N., Ashour, A.S. (eds.): Internet of Things and Big Data Technologies for Next Generation Healthcare. Springer, Berlin (2017)Google Scholar
  12. 12.
    Kang, K., Pang, Z.B., Wang, C.: Security and privacy mechanism for health internet of things. J. China Univ. Posts Telecommun. 20, 64–68 (2013)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringCHRIST (Deemed to be University)BangaloreIndia

Personalised recommendations