Skip to main content
. 2020 Nov 2;174:102886. doi: 10.1016/j.jnca.2020.102886

Table 6.

IoMT privacy methods.

Focus Area Security Requirements Reference Privacy Method
Data Confidentiality Ting et al., 2020 Two party secure computation protocol
Luo et al. (2018) SW-SSS
Kumar et al. (2017) Biometric based authentication scheme
Hassan et al. (2019) Using Public and Private keys
Dwivedi et al. (2019) Proof of Authority, Public Key
Sensor Resilience to internal attacks Liu et al. (2019) MediBchain Nodes Registration
Kumar et al. (2017) Biometric based authentication scheme
Cloud Trust Liu et al. (2019) Medical blockchain (MediBchain)
Network Resistance to man-in-the-middle attack Liu et al. (2019) MediBchain
Hassan et al. (2019) Privacy preserving strategies of blockchain-based IoT system
End User Device Authentication Liu et al., 2019 MediBchain Nodes Registration
User Authentication Liu et al. (2019) MediBchain-Based Privacy-Preserving Mutual Authentication (MBPA)
Kumar et al. (2017) Biometric based authentication scheme
Dwivedi et al. (2019) Using Public Key and Lightweight Digital Signature
Patient Anonymity Hassan et al. (2019) Removal of Personally Identifiable Information before data publishing
Dwivedi et al. (2019) Lightweight Ring Signature
Yasaka et al. (2020) Anonymized graph of interpersonal interactions
Administration Access Control Kumar et al. (2017) Biometric based authentication scheme
Liu et al. (2019) MBPA
Dwivedi et al. (2019) Using Public Key and Lightweight Digital Signature
Key Management Luo et al. (2018) Public-key cryptosystem
Trust Management Liu et al. (2019) MBPA