Table 6.
IoMT privacy methods.
Focus Area | Security Requirements | Reference | Privacy Method |
---|---|---|---|
Data | Confidentiality | Ting et al., 2020 | Two party secure computation protocol |
Luo et al. (2018) | SW-SSS | ||
Kumar et al. (2017) | Biometric based authentication scheme | ||
Hassan et al. (2019) | Using Public and Private keys | ||
Dwivedi et al. (2019) | Proof of Authority, Public Key | ||
Sensor | Resilience to internal attacks | Liu et al. (2019) | MediBchain Nodes Registration |
Kumar et al. (2017) | Biometric based authentication scheme | ||
Cloud | Trust | Liu et al. (2019) | Medical blockchain (MediBchain) |
Network | Resistance to man-in-the-middle attack | Liu et al. (2019) | MediBchain |
Hassan et al. (2019) | Privacy preserving strategies of blockchain-based IoT system | ||
End User | Device Authentication | Liu et al., 2019 | MediBchain Nodes Registration |
User Authentication | Liu et al. (2019) | MediBchain-Based Privacy-Preserving Mutual Authentication (MBPA) | |
Kumar et al. (2017) | Biometric based authentication scheme | ||
Dwivedi et al. (2019) | Using Public Key and Lightweight Digital Signature | ||
Patient Anonymity | Hassan et al. (2019) | Removal of Personally Identifiable Information before data publishing | |
Dwivedi et al. (2019) | Lightweight Ring Signature | ||
Yasaka et al. (2020) | Anonymized graph of interpersonal interactions | ||
Administration | Access Control | Kumar et al. (2017) | Biometric based authentication scheme |
Liu et al. (2019) | MBPA | ||
Dwivedi et al. (2019) | Using Public Key and Lightweight Digital Signature | ||
Key Management | Luo et al. (2018) | Public-key cryptosystem | |
Trust Management | Liu et al. (2019) | MBPA |