مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Journal Paper

Paper Information

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

986
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Security Challenges in Fog Computing in Healthcare

Pages

  1-10

Abstract

 Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of biological and environmental sensors. On the other hand, its distribution and open structure makes it vulnerable and weak to security threats. Therefore, the aim of this paper was to identify the security challenges in healthcare. Materials and Methods: This applied research has been done in three phases using mixed-method approach in 2019. In the first phase, security codes from library resources by content analysis was identified. In the second phase interpretation of experts by Delphi method, Panel of IT experts consists of twelve members who work on Healthcare Sector was evaluated. Finally, we used Analytic Hierarchy Process(AHP) method for ranking security codes. Results: According to fuzzy AHP results, attacks(0. 31), secure communications (0. 23), authentication and access control(0. 19), trust(0. 15) and privacy preservation (0. 12) are the most important issues in security challenges of fog computing. Conclusion: According to the results of this study, secure communications and network attacks are the major challenges in fog computing, because fog nodes are usually deployed in some places with relatively weak protection. They may encounter various malicious attacks. As a result, policymakers should be aware of the role of secure communications and network attacks in fog computing implementation.

Cites

  • No record.
  • References

    Cite

    APA: Copy

    RONAGHI, MOHAMMAD HOSSEIN, & Hosseini, Foroughosadat. (2020). Security Challenges in Fog Computing in Healthcare. PAYAVARD-SALAMAT, 14(1 ), 1-10. SID. https://sid.ir/paper/407357/en

    Vancouver: Copy

    RONAGHI MOHAMMAD HOSSEIN, Hosseini Foroughosadat. Security Challenges in Fog Computing in Healthcare. PAYAVARD-SALAMAT[Internet]. 2020;14(1 ):1-10. Available from: https://sid.ir/paper/407357/en

    IEEE: Copy

    MOHAMMAD HOSSEIN RONAGHI, and Foroughosadat Hosseini, “Security Challenges in Fog Computing in Healthcare,” PAYAVARD-SALAMAT, vol. 14, no. 1 , pp. 1–10, 2020, [Online]. Available: https://sid.ir/paper/407357/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button