ChapterPDF Available

Integration of Cloud and IoT for Smart e-Healthcare

Authors:

Abstract and Figures

When a healthcare system employs the World Wide Web and other connected connections, it is called ‘e-health.’ This article deals with the use of intelligent health approaches and their growth through time, in particular the connection of IoT devices with cloud applications. E-Health is described as ‘the possibility of seeking, identifying, understanding and evaluating the information on health from internet databases and information gained to correctly solve health issues or address them. The web can safeguard consumers from damage and enhancement as a storehouse for health and e-health analyses to fully take part in an educated decision linked to health. Above all, the high level of e-Health connectivity mitigates the risk of inaccurate Internet information. Different views on IoT-cloud-based e-health systems linked to confidentiality and protection are explored with a concentrate on the potential, advantages, and challenges of implementing those systems. A bright alternative trend is the integration of the integrating IoT-based e-health systems with artificial intelligence like cloud technology that gives intelligent goals and implementations.
Content may be subject to copyright.
Integration of Cloud and IoT for Smart
e-Healthcare
Jagjit Singh Dhatterwal, Kuldeep Singh Kaswan, Anupam Baliyan,
and Vishal Jain
Abstract When a healthcare system employs the World Wide Web and other
connected connections, it is called ‘e-health.’ This article deals with the use of intel-
ligent health approaches and their growth through time, in particular the connection
of IoT devices with cloud applications. E-Health is described as ‘the possibility of
seeking, identifying, understanding and evaluating the information on health from
internet databases and information gained to correctly solve health issues or address
them. The web can safeguard consumers from damage and enhancement as a store-
house for health and e-health analyses to fully take part in an educated decision linked
to health. Above all, the high level of e-Health connectivity mitigates the risk of inac-
curate Internet information. Different views on IoT-cloud-based e-health systems
linked to confidentiality and protection are explored with a concentrate on the poten-
tial, advantages, and challenges of implementing those systems. A bright alternative
trend is the integration of the integrating IoT-based e-health systems with artificial
intelligence like cloud technology that gives intelligent goals and implementations.
Keywords Security ·Privacy ·Internet of Things (IoT) ·Cloud ·e-Health
1 Introduction
Innovative ways to increase the standard of living have been made possible by techno-
logical advancements. Technology development researchers in different sources have
J. S. Dhatterwal (B)
Department of Computer Science and Applications, PDM University, Bahadurgarh, Haryana,
India
K. S. Kaswan
School of Computing Science and Engineering, Galgotias University, Greater Noida, India
A. Baliyan
Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India
V. J a i n
Department of Computer Science and Engineering, School of Engineering and Technology,
Sharda University, Greater Noida, India
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
S. Mishra et al. (eds.), Connected e-Health, Studies in Computational Intelligence 1021,
https://doi.org/10.1007/978-3- 030-97929- 4_1
1
2 J. S. Dhatterwal et al.
discovered and analyzed medical information for understanding and solving health
issues. Health information. To increase effectiveness and patients results on all levels
of the medical system, the creation of integrated Healthcare Technology is possible.
To tackle some difficulties in German conventional health systems through robust
patient safety measures, inequitable network services, remotely inpatient surveil-
lance, the emergence of new electronic personal health software applications (e-
Health), and other methods Soon clinical procedures and decentralized records of
computerized medical care. These technologies may administer medical information
and clinical information, raise the standard of living of patients, promote cooperation,
improve patient output, reduce expenses, and raise e-health services’ overall effi-
ciency. Eysenbach [1] also describes e-Health as an industry of hi-tech that symbol-
izes Internet, communication, and medicine integration, and which is of tremendous
utility to the consumers and customers of the system. E-Health is an interesting tech-
nology on the crossroads between health information technology, human health, and
Online health care services. Innovative inventions to tackle close to the surface diffi-
culties internationally, save expenses, and enhance patient care. The development of
the Internet of Things (IoT) is simultaneously a key to the growth of a plethora of
intelligent services providing access to resources, including computers, cloud tech-
nology, network-based devices, applications, platforms, and other resources. Thus,
IoT-connected models, gadgets, and systems have become everywhere. In addition,
the mass adoption of IoT corresponded with the emergence of inter-related inno-
vations in telecommunication, such as medical, industry, commerce, up with the
technology computer information, and so on. To make this implementation possible
the effective and secure deployment of information technology, services, and overall
e-Health systems demands extremely simple and reliable security measures. The
availability of IoT systems has been driving Cloud computing innovation and educa-
tion, including various health network designs. Linking networking, devices, apps,
and IoT services enable e-health systems with the newest technologies to commu-
nicate necessary information. The IoT and cloud computation technologies have
emerged which, as adaptable, accessible, and effective patients’ healthcare organi-
zations, complement one another’s advantages. The combination offers advantages,
such as facilitating operation in comparison with conventional networks, communi-
cation method information systems, rapid record accessibility, and energy efficiency
over normal techniques. E-health systems based on IoT-cloud can enhance medical
services considerably and foster systematic emerging technologies. In e-health solu-
tions based on IoT-cloud, the underlying IoT platforms allow user, application, and
client connection with healthcare data in the cloud.
2 Literature Review
However, with cloud technology advancements increasing to go in addition to the
current system, other protection hazards must also be factored into the equation
to communicated or retained information. The IoT-based smart medical systems
Integration of Cloud and IoT for Smart e-Healthcare 3
used as a conceptual view have been established by Pasha and Shah [2], focused
upon compatibility, various technologies, system architectures, and system needs.
Web technology, networking devices, and hardware components were used in the
appropriate standards and frameworks. Your framework has been shown safe by
trust experiments that have revealed the compatibility of various IoT devices, security
protocols that can be accomplished and utilized on the Internet synchronously in an
e-health system.
Rahmani et al. [3] suggested Fog computing in a national healthcare IoT system
for the implementation of a spread intermediate intelligence layer among sensor
nodes and the clouds in an intelligent e-health system. They used the ability of
current health systems to reduce the strain on sensors, networks, and distant health
facilities and therefore resolve challenges related to mobility, energy consumption,
and sustainability. A UT-Gate gateway, which delivers higher standards such as an
Early Warning System (EWS) in IoT condition monitoring, with increased system
intellectual ability, efficiency, scalability, compatibility, maintainability, enables the
successful implementation of your e-health system.
Robinson et al. [4] have developed a smart IoT system for accessing data via cloud
services to patients over the internet. By making it easier for clinicians to acquire and
accumulate the information necessary for monitoring. The patients were more able to
deal quickly with health issues. Islam et al. [5] designed architecture with four steps in
e technology consisting of devices, data collection and processor, data management,
and predictive analytics using fog computing. They identified applications for which
the system was beneficial, related technology required to operate, and associated
advantages and drawbacks.
Shewale et al. [6] advocated the use of a lightweight WLAN-based IoT-based body
dynamic spectrum system for data transmission and receipt using cloud technology.
They evaluate the norms of data security to guarantee the medical system stays secret.
Selvarajetal.[7] studied and identified significant difficulties and possibilities and
limits in the rising incorporation of IoT and cloud technologies in e-health systems.
They noted that identification is essential for the e-Health security issues based on
IoT cloud suggested a policy initiative to protect high-performance and simplicity
IoT cloud-based e-Heath systems.
Kaur et al. [8] summarize the advantages of clouds sharing and decide that IoT
cloud-based application offers significant value for their organization by enhancing
customization, adaptability, and reduced cost by employing a pay-as-us structure.
While Sensor networks and cloud services platforms were formerly separate, they
were progressively integrated into a code-dépendant system that could do highly
specialized jobs and effectively handle large amounts of data.
Similarly, the IoT and Cloud computer survey for health care was submitted by
Dang et al. [9]. They provided medical survey cloud technology and highlighted
several approaches for IoT and cloud technology. They also detailed the tendencies
and regulations of the medical industry throughout the world in IoT and cloud tech-
nology. The most typical difficulties with integrated IoT applications are excessive
delays and frequency band need to Metadata connecting IoT computer architectures
4 J. S. Dhatterwal et al.
computers are utilized to transmit. Therefore, the integration of IoT-based and cloud
technologies in electronic healthcare services is caused by vulnerabilities.
The IoT-based systems architecture was set up by Chattopadhyay et al. [10], and
secured communications were initiated. Their approach consists of three distinct
communications channels, The range is from demographic sensor network (edge
detectors), IPU, portals (gateway), and the internet platform. IPU is the most impor-
tant. To create, computational and storage data utilizing the cloud, Nandyala and Kim
[11] have reviewed Information technology integrated equipment, sensor nodes. They
demonstrated how data can be processed and distributed in actual environments using
provider Internet and IOT equipment in the household, healthcare, and other places.
Maksimovi´c[12] studied and shown that IoT has a beneficial impact on all areas of
healthcare on the advantages from IoT-based computerized healthcare services cloud
and fog computing. In particular, we use cognitive and analytical skills to illustrate
how cloud and computing-based ideas may be used in the context of information
systems to address health information.
Yeh [ 13] advocated the use of the internet of things to provide a secure IoT health
system. He suggested a secure IoT healthcare system that operates through wearable
devices and demonstrates the performance of the system and resilient transfers in
IoT electronic systems.
Such an analysis and compare data utilizing Body Sensor Network Technology
were provided by Deelip and Sankpal [14] in the field of smart, safe, and secure
healthcare. The safety and confidentiality of patients were suggested as a highly crit-
ical safeguard for health care systems in body sensor networks. To provide privacy for
the healthcare system of the data transmission system. As indicated above, extensive
study is thus focused on minimizing risks relating to confidentiality, completeness,
trust, or authenticity of the information.
Effective security procedures have been established by e-health application areas
based on IoT cloud and provide complete framework materials with crucial software
parts to enable the accurate and reliable transfer of data between devices. So that
any amount of information may be analyzed and transferred simply and without
further delay by deployed solutions, e-Health systems based on IoT-cloud have to
be developed with effectiveness. The bulk of key IoT cloud-based e-Health plat-
forms’ privacy protection factors include privacy, data integrity, access to services,
traceability, identification, intrusion detection, and non-repudiation. While numerous
works have been examined with new automation implementations on the privacy
concerns of IoT cloud-based e-health systems, the data protection of IoT cloud-
based e-health systems merit closer review. Unprotected e-santé systems technology
is of special concern and can result in a violation of the confidentiality of health
records. Where cybercriminals or intermediary attack individuals (MITM) can share
sensitive accounts in their entirety. A secure strategy for IoT cloud-based e-health
systems can assist patients, doctors and other collaborators avoid the problem [15].
Integration of Cloud and IoT for Smart e-Healthcare 5
3 E-Health Systems IoT and Cloud Integration
The IoT and cloud technology are developing technology that may be combined
to complement the capacity and skills of each other. IoT and Mobile Technology
are together Cloud of Things (CoT). CoT comprises individuals, equipment, orga-
nizations, products, processes, and technology that interact intellectually and strate-
gically via the World wide web. The integration of cloud and IoT technology in
electronic cleanliness solutions enhance patient productivity, quickly identifies, and
offers advantages through streamlined health diagnostics and processes, without
losing redundancy. Internet technology incorporation and utilization of e-health plat-
forms are useful, since users may always, everywhere and in any environment claim
benefits via the public cloud. Information privacy benefits typically ignore a compro-
mise on comfort and efficiency, which leads to security and privacy concerns. Every
IoT device has a discrete meaning or significance and is capable of collecting private
data. Including IoT, cloud computing services store and analyzes information in an
e-health system dispersed cloud service networks. Cloud computing allows legiti-
mate access with identity verification to validate yourself and secure access to the
information from anywhere. It provides an innovative IoT-based strategy and solu-
tion that can connect with mobile health, cloud, Data Management, and intelligent
surroundings. Data are transferred by up to 99% to the precision from your tests to cut
broadband and energy constraints with hearing rates. It featured IoT gadgets that may
be coupled with cloud computing services development. Their architecture is statis-
tically assessed in comparison to the current method to minimize health information
recovery slowness and costs. It gives an outline of the significance of IoT and the
advantages of IT and how information systems may assist in the medical profession.
Medical information from many institutions may be extracted and evaluated through
the Internet using big data. Big data. It demonstrated the use of new technological
trends in the medical industry [16]. The attractive alternative to the health records of
patients and increase the quality of health treatment. They offer A general overview of
IoT devices in learning that may be developed and interconnected to many types, such
as machines persons (P2M), human beings (P2P), or machinery., via smart devices
or items (M2M). The use of a cryptosystem can also validate if the protocols are safe-
guarded from any prospective safety concerns during the authentication procedure.
Thus, e-Health systems demand proper examination of IoT-based technology and
cloud computing, because they employ telecommunication technology to connect
equipment, equipment, and confide-in-one. Connections can come into being as
machine device (D2M), the Computer system (M2M) utilized, PH (P2D), and MHP
as used to improve IoT healthcare and communications, as well as to make it easier
to communicate with people who are in mental health (IOP). Application-specific
architectural vulnerability. They performed an extensive analysis of possible vulner-
abilities to security/privacy and the technology required to address them. It discussed
the other essential IoT-based internet technologies security and legal features, such
as identification against invalid network connectivity, intransigence, or anonymity.
6 J. S. Dhatterwal et al.
Those qualities are essential if IoT-based e-health systems are to provide safety and
confidentiality.
In the e-health sector, IoT-based solutions are a breakthrough because they allow
intrusion detection offshore. It suggested an IoT health care model for hospitals,
utilizing a cloud-based gadget to monitor patients and linked equipment remotely.
This model has scope for reading barcodes scanners that gather and verify unau-
thorized access. The system sensor suggested is wireless and is utilized as a part
of a comprehensive Sensor Network within a particularly built smart room to track
infants. It examined the possibilities of adopting cloud and virtualization technolo-
gies and identified enhanced cloud computing to effectively process and analyze
data for e-health systems based on IoT in which IoT devices are integrated with
technology, programming, sensing, and other components Connect to networks that
enable them in and amongst the surroundings to detect, gather and share information.
The data is processed via the Internet, wireless and remote control, evaluated, and
transferred. System settings guarantee that users or clinicians receive real-time input
for additional medical or therapeutic investigations. The IoT and cloud technologies
have been coupled with the use of e-Health wireless communication technologies
in a flexible, adaptable, and economical remotely clinical care surveillance system.
Professionals utilize an IoT cloud to track their health outcomes, review patient infor-
mation and make a diagnosis. It proposes to capture health information through wear-
ables IoT-based remote cloud monitoring systems [17]. The measuring instruments
are tiny parts that stick with the skin, clothing, footwear, and so on, and communi-
cations methods upload or acquire information from gadgets. The back of the cloud
application stores the health history of the patient and stores the data to be shared
with the doctors on accessing material. He suggested a Machine to Machine (M2M)
U-Health Monitoring And the controlling system, data collecting, data treatment,
and control instructions for the transducers. Capture patient information through
networked sensors, which can be increased by skin temperature measurements and
blood pressure. The sensors are fundamentally medical supplies connecting data to
cloud computation through the network. The focus of the hospital’s health informatics
system in India has evaluated the possible combination of artificial intelligence (AI)
and IoT services to gather data on illness diagnosis and treatment, remotely moni-
toring patients, and store and process data. Data may also be stored and processed.
Khan has also used IoT technologies to capture sensor data for the diagnosis and
treatment of cardiovascular disease in a health care system. He suggested using the
Improved MDCNN as a consumable bracket to measure the cholesterol levels of a
physical physician and an IoT-based cardiovascular evaluation system. A compar-
ison of the proposed networks and MDCNN with the multivariate regression results
showed the advantages in the proposed scheme’s success rate.
Table 1highlights how e-health systems may incorporate IoT and cloud
computing. The connection and execution of these unique systems are not, however,
faultless or simple. In respect to unanswered problems as shown in Table 1for
IoT-cloud digital healthcare systems, there continue to be countless new technical
hurdles.
Integration of Cloud and IoT for Smart e-Healthcare 7
Tabl e 1 IoT-cloud-based electronic health systems
Implement technique Advantages Integration E-Health
systems
Open contradiction
IoT-based Improved medical
gadgets for
electromagnetism.
Compatibility and
assessment
Wearable devices
organically integrated
surveillance of remote
patients
Energy constraints
security. Scalability
Cloud computing High-level functional
Infrastructure
A paradigm concept
for providing
healthcare operations
or individual with
solutions
User access control
Protecting Patient
Privacy Protocols of
protection and
reliability
telecommunications
Confidence and
reliability
Currently monitoring
Infrastructure
darkness
The confidentiality of
data
Accessibility of
infrastructure
4 Innovation and Enhancing e-Health Concepts
Advanced e Health systems revolutionize healthcare by enabling users to build soft-
ware innovations and procedures that were impossible a decade ago [18]. Defining
inventive e-Health systems is challenging so because the principle of IoT care and
medical IoT systems is being studied by the safety procedures incorporated in the
IoT health care system will eventually become essential new components of modern
healthcare systems and will also be assessed and especially compared to the investi-
gations. This study concludes that by examining various architectures the protection
offered for IoT medical systems and discussing prospective IoT systems further
strengthen the medical system. The advantages of IoT healthcare can be improved
by technology in several scenarios. IoT-enabled gadgets will assist doctors to develop
data-driven treatments regimens to improve the likelihood of a complete restoration
substantially. Big data driving e-health systems, the acquisition of understanding,
aspects, and control of individual hygiene. In terms of large-scale health care, they
identified the serious potential IoT-based e-health platforms and the area of health-
care incorporating privacy and security technology benefits. Consequently, the use of
IoT in the intelligent health sector suggested and data protection ideas given for smart
health care IoT may be incorporated. They presented an IoT-based practical appli-
cation that will help resolve health issues. Comprehensive safety and confidentiality
literature study and analysis at healthcare 4.0. In Healthcare 4.0, they investigated
the distributed ledger technology data protection problem solution [19]. They then
revealed the benefits of the approaches employed in security and privacy, tools and
frames in Health coverage 4.0. Economic development and universal health care 4.0
were likewise emphasized. They showed healthcare 4.0 possibilities for application,
and how industry 4.0 technology may be used in healthcare 4.0. Providing the key
health-related advantages, services, and technology.
A list of basic ideas of new e-heath technologies is provided below:
8 J. S. Dhatterwal et al.
Environmentally aided living (AAL): placing intelligent items in an assisted living
space to support and support the lives of elders. AAL programs gather, organize
and analyze patient behavior to enable remote monitoring systems to react rapidly
to crises and to investigate misuse accusations[20].
Health Things Internet (IoHT): intelligent gadgets with advanced sensor
computing and cloud services abilities in the healthcare profession in real-time,
to monitoring medical data. Data may be analyzed and used immediately and
quickly efficiently for the diagnosis and treatment of patients. Such systems,
however, remain subject to safety hacking and data breaches, which have been
identified and rectified by numerous researchers. Smart handling devices such
as smart braces, watches, shoes, hats, headbands, and prescription glasses with
embedded sensors and embedded systems: a special category for IoT devices.
Smart handling devices. Most of the equipment works on a regular frequency
IEEE 802.11. Blockchain: a technique in which activities are recorded on many
computers that are connected to a peer-to-peer connection. Using blockchain
technology in health systems may enhance patient awareness and doctor-specific,
enable team cooperation amongst health institutions utilizing intelligent trans-
actions, and prevent failures. Distributed architecture is utilized in IoT-based
healthcare blockchain technologies, which are extensively employed and used
in several fields. In IoT-based e-healthcare, they provided agreement algorithms
and systems. They demonstrated how their major IoT and blockchain capabilities
may be used to assist healthcare facilities. However, due to their transparency,
blockchains are naturally very vulnerable to assault.
Frameworks of IoT-cloud-based e-Sanitation systems are extremely flexible and
may be adapted for the demands of unique providers of e-Sanitation. Therefore,
suppliers of e-health systems provide many sorts of IoT and cloud computing
services, such as continuous surveillance, preventative care, tracking client expe-
rience, and IA-driven diagnostics. Each of these services is a possible privacy leak to
be taken into account when designing protective measures for the confidentiality of
a particular system. End-users increasing knowledge of the confidentiality of their
health information has made them increasingly careful than before. For instance, it is
harder to manage their capacity of health services, not to mention practically impos-
sible for the supplier to address the problem outlined by IoT in health care by using
the impacts of moving to compute if a person with a humiliating health problem had
its sensitive information leaked or transmitted on media platforms. They utilized a
literature review protocol and demonstrated how digital technology might help IoT
healthcare applications.
IoT can provide security and anonymity in IoT devices for medical. Similarly,
the technique employed in the analysis of modern literature is based on a systemic
evaluation of the privacy of the healthcare industry via in-depth training and back-
ground and the identification of major constraints in the field of healthcare They
provide their feasibility in the future path of healthcare exploration and innovation.
This model is utilized for a social media platform that users may diagnose and cure
the model via APP in IoT. The model can change the variable of control, making
Integration of Cloud and IoT for Smart e-Healthcare 9
institutions the most successful. A hospital Ubiquitous computing survey. IoT can
improve patients’ performance and stability for medical services. The IoT comprises
sensor-activated intelligent devices that properly analyze and take action [21].
However, in various outcomes, the deployment of IoT-cloud-based e-health
systems might be employed. A deep-level, deep-learning, intelligent medical system
was introduced to automatically diagnose cardiac conditions in integrated computer
settings for IoT and Fog. Effective computing services in real-time outcomes for
stroke patients and other users. To provide high-precision medical and speed deli-
cate findings, a cloud-based computing paradigm is necessary. IoT-based intelligent
sole shoe for foot ulcer detection. They have developed an IoT system for the diag-
nosis of foot ulcers in medical services by dividing it into four sectional tasks. The
model monitors the patient’s health and sends warnings to them if abnormalities
may be discovered. A novel collaborative privacy computation architecture for IoT
cloud services from restricted medical devices. The data from different IoT-based
healthcare applications were gathered and analyzed using cloud health services. The
integration aims to ensure privacy for patients, who may control the use of their
health information.
In practically every circumstance, the previously mentioned security and privacy
precautions can be applied. The development program is among the most often
incorporated in IoT Cloud-based e-Health systems:
Wireless Sensor Network (WSN): flexible, flexible, dynamical, economical digital
and analog devices ad-hoc networks and components that interact through secured
radio signals. They give clinicians real-time monitoring of their patients. WSN’s
hardware and software communications might function as an enemy of feeling and
difficulty. Data transmission for the determination of the validity of the particular
wireless transmissions [22].
Wearable Monitoring Network (BSN): a set of information related to the patient’s
body that transmits the data electronically to network components for any further
assessment. Camping cameras collect and subsequently transmit health infor-
mation to networks using well-known technologies like LoWPAN, multi-hub
connectivity, etc.
The RFID is a cost-effective electromagnetic identifying technology that continu-
ously transmits frequency bands and reads to information on extremely low wave-
lengths. RFID automatically identifies, monitors and tracks easily. RFID readers
are responsible for identifying, collecting, processing, and transferring data from
specified servers. RFID tags are typically used to monitor medicine and other
miscalculated healthcare supplies and equipment for the patient to gather physical
system information or inventory systems. RFID’s life lifetime is prolonged since
the marking does not require electricity to work as used for patient confidentiality
in IoT in the lightweight RFID Protocol [23]. Applying the RFID technology
to the medical system can solve the client confidentiality issue efficiently. RFID
can gather important feedback and knowledge and analyze data via the scanner
with the back-end computer. Remote patient surveillance (RPM): a method used
to monitor patients without physical touch using flexible cellular or web-based
10 J. S. Dhatterwal et al.
applications. In combination with the RPMs, Wireless communication, BSNs,
and various IoT devices are used. The RPMs are commonly utilized to develop
a technique in which individuals are discharged from the UCI and transferred to
a healthcare facility; patients at significant risk of problems or individuals with
special criteria. healthcare providers, patient family members, physicians, nurses,
technical staff, and health centers are public health care applications The system
has enhanced efficiency, efficiency, and the maximum usage of resources. It offers
a professional and structural approach to the delivery of services in mobile medical
services and direct healthcare surveillance. IoT creates data that may be handled
using cloud computing. It created a health surveillance performance in real-time
that can save the essential health parameters for a patient. The information can be
sent as an alert to a physician. It improves monitoring systems by sending multi-
plex information on the internet. Furthermore, internet diagnostic services such
as e-health services assist to enhance job efficiencies and minimize the burden.
They studied the attitude of general practitioners in the field of e-health and online
diagnostic tests in particular primary care [24].
As noted above, there are several benefits to the adaptability, adaptation, and
resilience of IoT-cloud-based health systems:
All-encompassing: In nearly all areas of the industry, IoT cloud-based e-
health solutions are sufficiently customizable to suit the demands of stake-
holders, including telemetry, patient diagnostics, drug recording, drug interaction
identification, risk identification, etc.
Big data management and analysis: IoT-cloud-enabled e-health solutions can
easily handle, analyze and manipulate huge volumes of data collected from IoT
wireless networks in a multimodal, multi-scaled, scattered, homogeneous manner
[25].
Lifetime going to monitor: Customer information from the former, the here and
now may be gathered, saved, analyzed and directly contacting in IoT surface e-
health platforms. This can substantially enhance patient outcomes and increase the
effectiveness and efficiency of focused preventive therapy.
Easy to use: consumers are readily able to accept IoT-cloud-based e-health solu-
tions, as only wearable gadgets may be clicked on. Simple input interfaces that use
smartphone apps or just wear sensors to automatically collect data from systems.
Cost reduction: IoT cloud e-health Systems may incorporate a variety of technolo-
gies for efficiency improvement, waste minimization, and reducing costs. They
may also be rapidly increased or decreased, depending on demand, and healthcare
systems can be paid for.
Increased physician entanglements: In actual environments and autonomously
using IoT cloud-based technologies, clinicians may obtain patient health data.
This enables them to evaluate more people with sensors, improve findings, and
even participate in teleconferences under certain situations.
Integration of Cloud and IoT for Smart e-Healthcare 11
Fig. 1 The advantages of the networking of e-health systems (IoT)
Access and availability: patients, careers, and medical professionals in IoT cloud-
based e-health systems may receive e-health data or solutions wherever, using fog
servers or network devices.
Online support: e-Health IoT-cloud technologies offer communications and help
at all times, everywhere, in real-time.
Efficient management of patient resources: e-health solutions based in the IoT
cloud ensure that patients have access to their information to know their health
condition. They also enable clinicians to effectively and efficiently monitor
population care and to accurately track healthcare services administration and
utilization [26] (Fig. 1).
5 IoT Cloud-Based e-Health Improvement Services
Difficulties
IoT technologies enable both tiny and big systems to interact through the internet.
Due to associated data protection problems, users must have complete confidence in
IoT devices/networks’ cybersecurity. As IoT systems employ traditional networks
for connecting nearly everything wirelessly, it’s inherently susceptible to sudden
attack or manipulations. While scientists work to develop effective answers to data
protection problems, these two elements are normally explored as distinct vari-
ables in isolation. We think, however, that only if the parameters are fused and
investigated as a single system can the cyber security and confidentiality breaches
be achieved Transparency, honesty, and accessibility with focus (CIA). Some IoT
security dangers are spoofing, jamming, cryptoattack, wormhole, etc. Some of the
security threats in IoT systems [27]. The safety requirements of IoT-based systems
rely on the environmental conditions of the system and the devices necessary for
12 J. S. Dhatterwal et al.
the user’s unique uses. Scientists have created bespoke safety and security frame-
works for specific IoT applications and submitted IoT-based security procedures
using CIA standard with extra custom security parameters, For example, work in
the morning all evaluated by traditional security risk analysis and contested. For
example, a clever home system that controls the functioning of household appliances.
To avoid assaults, especially on wireless technology between IoT-based products, this
system must have robust safety. A new design has been developed for IoT domestic
automation to guard against modern communications assaults, including people in
middle attacks (MITM). Recently, algorithms for IoT-based systems can protect
and control all communications in a communication environment. The technique
employs a lightweight cryptography and resource design to optimize the efficiency,
effectiveness, and accuracy of the system. An assessment and comparison of new
procedures with the protocols to replace them. The assessment system protocol may
test and compare characteristics including efficiency, resource use, and resilience
treatment security. To overcome the privacy concern, it adapted an RFID technology
to a medical system. Embedding RFID tags gather information, communicate and
process information via the readers on the back end server. They also introduced
a compact bilateral authentication system based on a new protocol for medicinal
purposes. To fulfill security criteria such as confidentiality, resistance to attacks,
synchronization, etc. fewer computer resources are needed. This technology supports
healthcare efficiency and performance and can safeguard private data for patients.
The implementation has been designed to increase secure communication between
IoT and cloud computing with chosen sensor monitor nodes in the ad hoc network
system. To provide flexible routing, the Security Protocol is monitored using asym-
metric encryption with multi-variant tuples. The method makes it possible to increase
safe data transfer over the ad hoc network system. A summary of the WSN [28]. The
WSN applications for architecture in many areas and an explanation of the safety
element of WSN routing. In wireless sensor networks, they analyzed the various secu-
rity methods. The standards may be described as the protocol and functionality for
interfacing different types of the network using sensor nodes. In the creation of these
systems, integrated IoT and WSN techniques can be implemented. They provided a
review of groundwater recharge and water management, soil and weather, utilizing
IoT-based irrigation systems, to sum up, the existing system of intelligent irrigation.
They showed the use of networks and wireless communications is a technique for
implementing the watering system based on sensors. IoT-based and cloud computing
is therefore the ideal solution for a wide range of applications.
In e-Health Systems all around the world, IoT and cloud computing are merged
and connected. This has resulted in major modifications to operational principles,
standards for medical devices, and confidentiality and health systems. Remote health
systems are made possible for the first time in history with IoT cloud-based tech-
nologies. Doctors may now remotely monitor, evaluate, counsel, and administer
without physically touching to see the patients. Nevertheless, several problems must
Integration of Cloud and IoT for Smart e-Healthcare 13
be taken into consideration and solved to successfully integrate IoT-cloud-based e-
Health systems. Due to the increased healthcare expenditure, it has also become diffi-
cult to gather and exchange medical information. The literature has highlighted the
following obstacles and problems with Unified communications e-Health solutions.
5.1 IoT-Cloud e-Health Systems Management of Resources
Management systems, using a single homogeneous agreement negotiated distinct
ideas of IoT, mobile technology, medical institutions, and all economic responsi-
bilities. Resource planning hence is important if the IoT cloud-based e-health
system is to combines resources, removes redundancies, enhances efficiency,
and minimizes the system’s backlog. To achieve continuous efficiency improve-
ments and/or to minimize deterioration in effectiveness, the resources manage-
ment solution must be continually improved. Address shortages: the cloud or other
comparable technologies’ preservation of medical information enables patients
and other users to manage health care and accessibility, and to make use of medical
information in real-time. While online management may be created, consumers
legitimately worry about keeping their data on the internet. In furthermore, the
data gathered should be developed to ensure that it is obtained and utilized by
other healthcare professionals following established protocols and procedures.
However, it is still not possible to develop a single standard statement of purpose.
In addition, patients should be granted the freedom to freely access and dispose
of their data whilst ensuring they are safe [29].
Compatibility: interoperability focuses on the potential adopters who see inno-
vation as congruent with beliefs, experience, and requirements they have gained
before. Medical professionals’ expectations of e-health systems using IoT and
cloud technology should conform to specific work needs and therefore must
encourage doctors and certain other collaborators to adopt and understand how
to use this technology.
Consolidated data on patients: this issue involves the integration of patient data
acquired from e-Health systems based on IoT cloud to share healthcare informa-
tion. The integration of patient data offers good long-term care options, improves
the quality of care, and analyzes and monitors the performance of services and
patient mortality rates [30].
5.2 Electrical Equipment in e-Health Technologies Based
on IoT Infrastructure
Capacities for systems: e-health systems based on the IoT should be successful
and sustainable in hospitals, pharmacies, and other locations. Limiting aggre-
gate expenditure may lead to technical advancements not being implemented and
14 J. S. Dhatterwal et al.
capacity enhancement needed. This might be due to delayed accelerating progress
in a conformity program or system. The overlap of responsibilities between the
demands of several sectors lowers the necessity for an interchange of information
[31].
Connectivity and Optimization: compatibility is also challenging due to the diffi-
culties of standardizing diverse systems. Various elements of a variety of heteroge-
neous IoT cloud-based e-Santé systems employ a range of hardware, computers,
software, operating systems, I/O techniques, etc. Standards must thus be set to
decrease the complexity of compatibility and to facilitate integration.
Data analysis. IoT cloud contains hundreds of interconnected sensing devices,
a custom kitted e-health platform, that collects and permanently communicates
enormous volumes of data. The database management infrastructure has to be
expanded in terms of the quantity of data that is collected to be e-Santé usually
focused on the IoT cloud to measure all information.
Process of Transition: e-Health combines the systems of IoT cloud with current
health systems, upgrading or expanding sensors, medical equipment, and oper-
ating procedures. New equipment and methods are seldom integrated smoothly.
This must be done consciously over time and all staff must be adequately trained.
Furthermore, the backward compatible nature of all new devices and applications
should be updated or changed [32].
5.3 IoT Computing e-Health Solutions for Confidentiality
and Protection
Confidentiality: IoT-Cloud-based e-health solutions should know all the dangers
and threats involved, and aggressively implement network privacy protection
strategies. Security and privacy concerns need to be discovered and aggressively
handled, and each layer must take into account all vulnerabilities and attack
vectors. Because of security and privacy concerns, many physicians and health
care professionals choose to keep patient information on non-Internet-connected
computers or local systems. The creation of infrastructure to allow doctors to
communicate clinical data while securing patient data is necessary for medical
record sharing [33].
Awareness of privacy: Privacy knowledge actions may be used in a particular
system to educate the public of privacy dangers and sensitization. Data protec-
tion and safety notifications are used to raise awareness of possible dangers to
privacy. The need to comply with the overarching laws, rules, and ethical criteria,
and company-related standard operating procedures is rising to the systems and
services of data protection. The APDL models, for example, allow the account-
ability of personal data. The designs also give professional knowledge and estab-
lished ways to meet various types of privacy problems. The design is utilized as
a part of an established technology creation process that is conscious of privacy.
It assessed how the IoT application structure may be successfully improved by
Integration of Cloud and IoT for Smart e-Healthcare 15
using a set of security guidelines. They incorporated the privacy technique through
layout and IoT applications. Their procedure is intended exclusively to solve
the problems of IoT and substantial differences in designing approaches from
conventional confidentiality [34].
6 IoT-Cloud Based e-Health Systems Safety,
Confidentiality, and Technical Requirements
We give in these sections an introduction of IoT-cloud-based e-Health systems’
architecture designs needs, including identities, authentication systems, and permits.
By evaluating each element, systems may be built to decrease the possibilities
of attack and leakage of confidential communications individually and to detect
their weaknesses. Including confidentiality, privacy has numerous sorts, statuses,
clusters, groups, and sizes. The current ideas for integrating IoT and cloud-based
e-health solutions computational technology. This section covers this research is
currently underway as most technologies for e-Health only appeared in recent years.
Typical security and information management problems are summarized in the IoT
Cloud-based wireless technologies [35]:
The collection, processing, and fair use of all data must conform with the law.
Without sufficient safety and security protections all data should not be used.
All IoT devices attached to the system should be able, without making compro-
mises the data accuracy or integrity, to transfer data and end up receiving data
over the network.
All device’s adequate protection from specific attacks, unauthenticated access to
information, and illegal use or inappropriate content should be developed to assure.
The Clearly Stated Data Protocols are to be clearly defined in simple languages,
including protocols for information gathering, transportation, authorized use, indi-
vidual personnel, and educated permission. This increases patient confidence and
explicitly outlines all the patient data obligations so that responsibility can be
readily identified.
It is also essential to take into account the lowest feasible security, privacy, and
system requirements when determining the minimal safety standards required to
safeguard data within an e-Health system. The following are the safety, privacy, and
system standards that we see as guaranteeing patient confidence when sending data
to e-health organizations.
6.1 Confidentiality in E-health Systems Based on IoT Cloud
During the whole lifespan of the data patient confidentiality must be taken into
account actively. The organizational privacy policy shall define who accesses or
16 J. S. Dhatterwal et al.
views personal, financial, or private data. For example, the GDPR is a compilation of
many data protection acts approved by different countries around the world. GDPR
is the most often used data protection regulation. The security of personal data has
been the most essential aspect of the privacy of a health system. The preservation of
data privacy is seen as a procedure that protects personal information from illegal or
unintentional use, disclosure to unauthorized. Data protection is done using a range
of approaches, including cloud computing, privacy protection of data, tracking of
changes of data, and the use of big data analyses to discover suspicious behaviors.
The protection of personal information is highly variegated in that e-health systems
providers offer various types of services, including constant Monitoring, preventative
care, customer experience monitoring and diagnosis of AI must meet the demands of
each part of health care institutions. Each of these services involves a possible privacy
breach which must be taken into consideration in the implementation of privacy safe-
guards inside a particular system for expanding viewpoints the possible involvement
of academic and practitioner communities in the field of privacy design (PbD). PbD
should deal with the diversity for which the privacy design can be inscribed. It iden-
tifies design concepts to societal values at the forefront and uses design to examine
and describe data protection issues. Conducting data protection via design through
effect studies on privacy. The PbD via GDPR, which is essential for the virtual
online privacy adopted under GDPR. One such need in the business and technology
systems for data protection. Different methods for PbD that can handle data protec-
tion problems in the development process have been studied. The research on model
adaptation in the legislative performance indicators of important components of the
concept of data protection. The creation of a privacy risk process involves describing
the principal elements and cognitive linkages which affect privacy hazards. PbD’s
development from an architectural technique theoretical framework. Instead of intro-
ducing privacy capabilities at the latter end, the PbD need might start in a system
development cycle. The existingstudy also concerns the PbD method used in software
engineering efforts. A systemic mappings analysis is used in application development
for the identification of primary PbD processes or techniques. More specifications,
quality standards, regulations, industry standards, and organizational effectiveness
should indicate good PbD-related activities and duties. Investigates the protection
of data protection in the cloud by evaluating and debating the many approaches to
protect privacy. The privacy of the user’s information was advocated. The advan-
tages and disadvantages of the techniques assessed are compared. The results are
merged with the problems to be dealt with in the upcoming to preserve the privacy
of cloud data. A confidentiality technique to fulfill differential privacy restrictions to
safeguard the privacy of personal information and optimize data value and IoT indus-
trial algorithms. The integration of the utility and confidentiality and the creation of
a model for GPS location is used to choose data according to the frequency of the
access node of the tree. The theoretical approach and its test result can increase safety
and confidentiality considerably.
End-users become more conscious of the confidentiality of their medical infor-
mation and are more careful about it. For instance, it would not be easy for end
customers to participate to trust the supplier, and would be exceedingly difficult for
Integration of Cloud and IoT for Smart e-Healthcare 17
them to correct the problem if someone with humiliating conditions were to receive
their knowledge from or spread through social media. Privacy is especially important
for IoT cloud-based e-health solutions. The owners of different Technologies need to
be relying on the devices themselves and on the technologies to collect, mark, handle
and preserve their information secure. The protection of privacy may be maintained
by an excellent authentication process, robust usage of rules and processes, and the
adoption of expanded privacy laws. The inclusion of PbD into the core IoT-cloud
system architecture of e-health systems with all the following aspects can increase
confidence, information protection [36]:
Data Lifecycle Protection: Safeguarding of the data cycle includes security
measures important to privacy from the beginning till the end. This guarantees that all
data are safely stored after the procedure and subsequently safely deleted. The data
life cycle should be enhanced to effectively manage data archiving, transportation,
and deletion.
Fultle usability to secure the life-cycle relevant information management end-
to-end. Comprehensive functioning seeks to address good and match approaches
to all legal goals and interests, therefore rendering secrecy transactions unneces-
sary. Without sacrificing the fundamental objectives/purposes of target systems,
it is possible and considerably more preferable to provide both safety and
confidentiality.
Proactivity: Unlike simply reacting, corrective actions predict and prevent risks
of personal sensitive information before they materialize. The objective is not to
respond to infringements of privacy but to prevent privacy concerns.
Confidentiality location: large data networks require the building of data location
information. Effective privacy methods are necessary to avoid loss, leakage, or
communication of location information for specific users.
Default confidentiality: Privacy implies automatically maintaining the protection
of personal information in all scenarios. Even if a person does nothing, their
privacy stays preserved. In other words, no actions are necessary on the side
of the person, as it is integrated into the system by default, to safeguard their
privacy. This contrasts with traditional systems in which direct human interaction
transforms and protects data.
Embedding structure: Privacy has become a fundamental function by Integrating
into design methods and IoT architecture.
Solidity: Adequate security features to safeguard Privacy and safe IT systems
Information life are in existence.
Transparency and accountability: privacy includes the aim of ensuring that all
Parties involved are exposed to independent confirmation of all technologies,
activities, and aims. To preserve their confidence, the activities should be visible
and accessible to consumers and suppliers equally. Accountability and trans-
parency guarantee that every activity, All the consumers and providers are
continually recorded and made available for accounting purposes, along with
the gathering, processing, access, alteration, transfer, and disclosure of personal
information [37].
18 J. S. Dhatterwal et al.
In addition, privacy safeguards in the field of IoT and RFID development. Identify
and monitor items and advanced power infrastructures, measure and exchange power
statistics, and intelligent user-tracking technologies. Because of cloud providers in
such things, the security they investigated is a major problem. They showed how
IoT interacts with cloud applications. Confidential information can greatly reduce
people-machines interrelations and quickly move with device conversations. About
cloud security and IoT in the coming, the results of this investigation are guaranteed
to interplay a new idea. The diverse inter-layer integration problems and IoT security
challenges. You provided in the IoT framework the security, confidentiality, and confi-
dence of multiple levels. IoT consists of three levels: the perception layer, the transit
layer, and the application layer, built on the network. The combination of IoT with
other technology such as cloud computing calls for several problems, particularly
privacy, to be solved. Specifically focused on safety and privacy through assessing
potential difficulties and dangers to be addressed. Cloud of Things has examined the
achievement of Cloud of Things IoT-bases and cloud computing framework. They
highlighted that it is a major problem to preserve data privacy in IoT Cloud. In partic-
ular, he provided insights into the security and privacy concerns of cloud hosting and
IoT-based technologies. The complexity of the system and difficulties in controlling
every access attempt should make incursions and vulnerabilities more frequent. The
risk issues highlighted and remedies for these techniques are current trends. The talk
gives an analysis of IoT security, transparency, protection, and ethics. IoT security
architecture, confidentiality, and best practice for the protection of IoT devices. IoT
privacy underlines several IoT privacy issues and solutions to protect IoT devices’
private.
The confidentiality and safety of numerous researchers are usually portrayed as the
same due to their philosophical and quantitative commonalities. However, personal
information must be explicitly defined to safeguard data privacy. The intention is to
prevent the misunderstanding that security is to protect and control data while data
protection is designed to take adequate decisions on the compilation, processing,
and disclosure of personal data, all subject to laws, regulatory requirements, social
norms, the economy, regulations, and contracts. Concerning data safeguarding, secu-
rity ensures the preservation of privacy through the enforcement but not the adoption
of judgments. How may this idea be implemented into the viewpoints of structural
engineering? The approach is outlined in two case studies and presented; In risk
assessment and monitoring procedures, the first focuses on representing the handling
of personal data. The second seeks to detect and thoroughly evaluate possible privacy
threats in context and complete confidentiality protection, to use PbD and security
in different sectors.
Metrics requires the integration of certain risk management methods, both privacy,
and security. Integrating safety risk evaluations can decrease the Loss of the IT system
from the CIA. Danger data privacy evaluations help to deal with the potential loss
of privacy, asymmetric encryption, disrespect, treatment, dissociation, intervention,
and transparency. To be generally recognized, secrecy preservation must comply
with worldwide portfolio management methodologies and regulatory requirements.
Integration of Cloud and IoT for Smart e-Healthcare 19
Information security is also a core notion for the protection of user data. Informa-
tion security through the PbD Design is a significant factor in protecting privacy
in many technical and information systems and is one of the prerequisites for data
protection (IS). Use privacy effect evaluations to explicitly highlight deficiencies to
shed light on the gaps in PbD compliance. They showed that PbD is a necessity of
blockchain cryptography and reliability. The criteria are as related to safety as they
are to protect. The security depends on the anonymity and use of an IoT service. The
quantitative system might progress with PbD adaptation by providing an example
of a statistical institution’s positive self. They illustrate how statistical organizations
may collaborate and foster the confidence that PbD requires.
Another problem that should not be neglected is that no system is susceptible
despite the whole study on confidentiality and protection. In other words, it is still
susceptible even to a system that contains all of the above features. We may thus
infer that confidentiality and safety should be continuously investigated and enhanced
throughout time. It further demonstrates as experimental results the main distinctions
and features of the issues of confidentiality and protection [38].
6.2 Access to Available IoT-Cloud e-health Platforms
In recent years, the implementation of Smart with cloud technology has made life
easier. IoT services may be used in any cloud infrastructure, everywhere, when-
ever, and via cloud storage. Cloud computing allows authorized users, with sophis-
ticated measuring and recording skills, to authenticate them self and securely share
services wherever in the globe. Furthermore, the use of cryptanalysis can check
if the protocol is secured against all conceivable security risks in the verification
process. Without such authorization methods, it would not be able to access data
privately on a private cloud server through an internet client. Therefore, as indi-
cated above, IoT-cloud-based systems need strong authentication for safety. These
scientists found that they had higher performance than standard user authentication
with symmetrical symmetric encryption to protect IoT-cloud-based systems. The
schema employed a balanced safety and effectiveness asymmetrical encryption key
with a smart card encrypted password. A lightweight, highly located IoT-cloud-based
system structure. The system allows users to utilize all localized computer hardware
that is not suitable for data processing and, when required, for further usage with
cloud-based infrastructure. Users may have full freedom and management of their
contact card, which concluded, by improving its flexibility, expandability, and cost
savings due to their pay-as-usage structures, that IoT cloud-based apps and hosting
services provide value for starting enterprises. Proof of the usage of the software as
service (SAAS), as a service platform (PaaS), and as technology infrastructure for the
three forms of cloud computing (IaaS). Additional associated research analyzed and
the results the similarities among three distinct cloud deployment models. The inves-
tigations demonstrate that what was called multimedia was just sharing capabilities
and that information sharing was considerably safer in a cloud infrastructure than in
20 J. S. Dhatterwal et al.
a cloud environment. They found that the safety risk embedded in resources over the
internet is the major variable that limits cloud computing development. While cloud
computing applications are almost unlimited, based on our literature research, we
can simply sum up the most frequent functions of cloud computing services:
1. SaaS offers users to access software services (software as a service) to run the
program on a Linux environment or server. The application is aimed at cloud
end-users. Google.com serves Docs and Gmail, for example.
2. Auto scalability, archiving, and elasticity servers are provided by the Service
Platform (PaaS). The solutions might be an online digital charging system,
including Google’s Apps Engine, the Amazon Web Services, and Microsoft’s
Azure. These Cloud Service Provider (CSPs) support distinct physiological
server software applications.
3. Service Infrastructure (IaaS) offers immediate links to virtualization or
containers hardware. This service offers network access to certain CPUs, storage
capacity. For the future development and viability of the cloud services sector,
robust security and privacy safeguards are crucial. Strict access control as
utilized as a part of IoT privacy conservation via categorization and access
control is the most appropriate data protection solution for cloud computing.
They highlighted that security and privacy in the user information is a signif-
icant problem in IoT, classifying and creating user control lists of data in a
structured manner. Data protection issues that may comply with the standards
of the GDPR have been resolved. They pointed out that reusable pieces are
a helpful integrated system for the methodical design of confidentiality. Data
protection through the architecture and GDPR are utilized to assure solutions
focused on remote health and portable healthcare services. Ensure that access to
the network cannot be limited to authorized users who have preset rights. It can
also help to verify data completeness, transmission, and retrieval. In general,
security problems related to cloud computing come into three main types.
The following are the classifications:
User Authentication Enter Control: you can access a personal computer using a
piece of specific access equipment such as a USB flash drive with an included
protection key. At the operational site, access can also be handled.
Secure Communications: for a safe communications network, encryption using
strong techniques is necessary. To secure I/O ports, communication encryption
can be applied to the hardware level, to assure the data integrity and verification of
access fingerprints, or to encrypted routine functionality on an application level.
Data protection: the most typical procedures for data privacy protection are routine
consistency controls, security violations checks, and restricting data accessible to
authorized users. Depending on the essential functionalities of a particular system,
vulnerability scanning can also be deployed in cloud technology on different
system levels. All of these activities need tailored technology solutions for special
applications such as access control implementations, safe communication and
preservation of privacy, and multi-function and increased processes. Each of these
Integration of Cloud and IoT for Smart e-Healthcare 21
Fig. 2 IoT-Cloud-based e-health systems availability
three safety measures may be applied separately or jointly to build a more robust,
all-around design as seen in Cloud compute security concerns may be linked
to privacy, authenticity, trust, or identification of information to be transferred
or saved. Because safety and confidentiality of knowledge on the condition of
individuals are a concern, many keys accessing patient data have rules, including
the protection of personal patient history, high availability, and management of
knowledge to safeguard it from intruders and assaults (Fig. 2).
The IoT and cloud-based developments in e-health systems may be divided into
three primary market groups: hardware, users, and applications. A further division of
components into hardware, applications, and services can be made possible. Appli-
cations can be divided into operational processes, disease management, and regen-
erative medicine in the former method. Healthcare professionals, patients, financial
support staff, laboratories, and authorities are in the end users’ group. The IoT and
cloud computing systems are used to monitor health and appearance, such as your
heart rate and body temperatures, and to diagnose health status efficiently, including
the risk of and severity of diseases. E-Health systems combine various devices such
as thermostats, through development tools, and for the rapid and accurate results
deliverance, organized and smooth end-to-end cloud integration. The following are
the additional system needs of the IoT-Cloud-based e-health systems:
Secure Transfer: this guarantees that data transmission may be sent internally and
externally without intercepting or influencing the transmission by malevolent or
malicious access. Security of transmitted data can be ensured by proper encryption
techniques.
Secure protocols: used to enhance solutions that protect secure computer and
network connections. The use of encrypted communications in data not only
improves network data storage’s safe and secure environment but also improves
network security.
Secure Information exchange: This involves guaranteeing secrecy and authenticity
using technological cryptosystems. Security of telecommunication is achieved by
methods to safeguard communications through cryptanalysis against surveillance
and manipulation.
Cryptography Encryption prevents unwanted access and protects data over its
entire life cycle by encrypting all data. Cryptography is used to prevent raw uncoded
22 J. S. Dhatterwal et al.
Fig. 3 The e-Health solution paradigm is based on the IoT cloud
data from being exposed to infringements, packet snooping, and computing power
device theft.
A technique to connect clouds with devices securely. The safe connectivity and
flow of data might include authentication, encryption protocols as well as other
methods to avoid numerous types of assaults. The link between IoT and cloud tech-
nology includes possible security vulnerabilities. Technology to secure the physical
and cyber space identification of human beings. Increased computational and band-
width savings of IoT and cloud computing. Your mutual authentication method of
authenticating and session, data the cryptography is used to prevent raw, encoded
data from being exposed to violations, packet eavesdropping, and memory device
physical robbery.
offered a means to securely link database servers and gadgets. The safe connec-
tion and transmission of data might include authentication, encryption methods, and
other mechanisms to eliminate numerous assaults. The link between IoT and cloud
computing includes possible safety breaches. Technology is designed to secure the
physical and internet identities of individuals. IoT and cloud computing enhance
bandwidth processing capability. A design System is constructed to assess the impact
of the security system on the application productivity by using the authentication
and authorization key agreement method, encrypted communication system, and
data integrity control system. Any solutions available must provide strong safety
and privacy while satisfying the needs of the IoT e-health system based on the
cloud. The quest for these answers leads to the development, for example, of several
distinct mobile operating systems. Figure 3shows the Continuum design for the IoT
cloud-based e-Health system [39].
Depending on our research article of prior research, we can offer an architectural
for a five-layer e-Health system confidentiality solution. The following are the five
layers:
Device layer: The surface is the link crossing the data acquisition and storage
network and is used for all products to carry out the unique functions of their
device, such as detection, monitors, controls, and operations. It transfers the lower
layer of the IoT architecture to the upper levels. Indirectly or directly links to
physical equipment like sensors, wifi, monitors, controllers, etc.
Security Objectives: this layer is meant to avoid regular assaults, ID spoofing,
granular permissions, secured booting, sniffer, and malicious assaults found in
references.
Communication/Service Layer: This layer lets multiple devices interrelated to
gather and distribute data between local devices through a central network. The
Integration of Cloud and IoT for Smart e-Healthcare 23
transfer of signals across the layers in terms of sending and receiving employs
different protocols, for example, wireless services, Bluetooth systems, serial wired
procedures, etc. Some employment contracts, such as signals and authentication
protocols, can be included in the layer to meet user demands.
The network layer: that’s where IoT applications and gadgets may be connected
to, run by, or operated on, cloud gaming servers functioning off-site.
Security objectives: Maintenance of a safe against snooping and adulteration.
This relationship is made by physical gear such as switches, gates, routers, and
online connections. In addition, this layer offers secure network communication
and enables a perception layer accessibility scenario. The network layer guaran-
tees that users, items, or services may access and utilize dependable adaptation
strategies, storing, and analytic capabilities. Security objectives: safe routing of
internet traffic, escaping from middle attacks, snooping, spoofing and DoS,
Cloud Layer: the layer offers distributed Internet-based computing for processing,
storage, and monitoring device-collected data. Because of the possibility to use IoI
devices in the health care system, computing resources, fast immediate expansion,
and cheap cost, to treat large data quantities. In addition, cloud computing provides
customers with pay-per-use data resources for processing, connectivity, storage,
and communications. Security objectives: Protecting the stored and processing
data, including intrusions, hackers and infection/malware, unauthorized access
and misuse by users, cross-site scripting (XSS).
Server Layer Application: This layer is where consumers connect directly with
the e-Health system in the IoTcloud. Users can get alarms, see data obtained in
real-time, react to emerging problems manually / automatically, etc. The imple-
mentation services are supplied to the user via this layer. It outlines the several
applications that IoT may use, such as intelligent homes, intelligent cities, and
electronic health systems. 6. Cross Security Layer: this layer is where the system
executes its security, especially CIA.
Security Goal: to protect the system against assaults such as Blatt anting, infor-
mation bribery, and harmful codes. In this layer, we take into account the required
functionality for the application-level core network, such as regulations, secure
communications, secure layer connections, and data encryption, avoids unwanted
input, and protect any information throughout the entire lifecycle. In addition,
communications encryption, tracking responsibilities, asymmetric encryption of
data, etc., is carried out here. Security purposes: authentication, vulnerability
scanning, data integrity, the procedure for individuality, interoperability man,
sniffing and spoof, false information and abuse, darkbox and sandboxes, etc.
Cross-Confidentiality Layer: confidentiality is aggressively taken into account
in this layer and who can access or view any individual, financial, or classified
information data during the whole data cycle.
Security objectives: In combination with the usability/access rights regulations,
data privacy is a fundamental, distinctive and secure identity for requests and
replies. To protect the safety and confidentiality of outsourced data, users usually
manipulate their encrypted information. Safety objectives: Protection of privacy,
complete functioning, life cycles, confidence, trust, identity, and activity as
24 J. S. Dhatterwal et al.
Fig. 4 IoT-cloud-based
e-health platforms privacy
and security alternatives
provided in Based on the literature of previous research programs, we are prepared
to provide our five-layer solutions to protect the data for IoT cloud-based e-health
solutions. The five levels in Fig. 4are shown.
7 Limitations
E-Health systems based on IoT-cloud are breakthrough technologies and can be
incorporated into almost all applications. Many governments and fortune-500 busi-
nesses either investigate or actively integrate and develop this technology. Although
the consequences of climate change are widely diversified, corporations and govern-
ments are trying to reduce their negative contribution through sustainable develop-
ment. They utilize IoT Cloud e-Health methods to reduce waste, improve efficiency,
limit carbon energy dependency, and apply sustainability practices while maintaining
and even growing their business. However, it is far from flawless or simple to integrate
and execute these two unique systems. There are several difficulties to be addressed,
as with any technological advances. The following is a short description of the specific
obstacles for IoT cloud services visibility and control in cloud computing.
Integration of Cloud and IoT for Smart e-Healthcare 25
7.1 Confidentiality in e-health Technologies Based on IoT
Cloud
There have been numerous definitions of data privacy, representing different views.
Privacy protection Some, for example, focused on the privacy of data in terms of
confidentially information security and offered a Legal framework to identify crit-
ical constraints, incorporating existing PbD health systems procedures, with built-in
security policies. PbD implementation can also be incorporated in the GDPR facil-
itating the unification, by the European Council of Europe, of the confidentiality of
all data citizens (EU). In addition, a new framework may be created using PbD. Data
confidentiality is a basic notion for user data protection. Data protection by design is
one of the principles of data privacy. This is a critical component for the protection
of privacy in many IS and IT systems. Therefore, we concentrate in this article on
data protection solutions that address GDPR, PbD, and other issues.
The GDPR of the EU seeks to secure all personal information utilizing rigorous
rules. The organization considers personal data shall adopt the relevant technical and
institutional means to comply with the data protection principle required to stream-
line the regulatory framework. Regulatory authorities must design online privacy
computer systems as a key issue. To stay in compliance with the legislation, every
processing must fall within one of five categories officially established in the GDPR.
Abstract lifecycle model personal data (APDLs) represent personal information
in the form of phases in the lifecycle involving related activities and stakeholders.
APDL makes personal data tracing easier. Different ways to confidentiality and
protection could reduce risks, secure data from attackers, and ensure the data’s CIA.
This research provides an abstract PbD lifecycle model of personal information that
significantly raises awareness of the PbD paradigm. As proven, high-performance
computing techniques may be used to decrease risks in confidentiality and protec-
tion in health systems. In addition, research shows that the theory of PbD has several
limits, depending on how and where it is applied, structures that encase expert educa-
tion give predetermined solutions to various forms of privacy risks. Specific actions
that may lead to private infringements should be categorized as data protection issues
and sub-divided further into subcategories accordingly. Limiting personal data access
is a key element in building strong confidentiality to minimize the possible risk of
unauthorized collection, handling, and handling of personal information under the
management of the data controller. We may sum up several important features of
privacy consciousness solutions:
Initiation: contribute immensely to the handling of personal information
throughout treatment.
Collection: includes a collection and allocation of personal data values.
Retention: represents the fundamental, compliance or recovery actions of
Organizing, collecting, storing, and preserving data values for personal informa-
tion.
Access: represents activities in which personal data are specified, recalled, or
Consulted.
26 J. S. Dhatterwal et al.
Disclosure: means actions for the dissemination, disclosure, or transmission by
third parties of personal information for external purposes.
Use: means activities in which personal data are used, altered, adapted, modified,
or altered.
Destruction: means actions of eradication, destruction, editing, and disposal of
personal information.
7.2 Context Awareness IoT-Cloud-Based e-Health Systems
The IoT Cloud-based e-Health system can only properly assess the real need for care
by a comprehensive photograph of a specific patient scenario. Data based on clinical
history or the needs of the care provider or the healthcare professional should be prop-
erly interpreted using IoT cloud-based e-health systems to gain a fair, comprehensive
knowledge of the sensor information. Because of problems related to data gathering
and data analytics approaches such as the display of context-based knowledge and
programs, supplying network architecture in IoT cloud-based e-health systems is
hard. For example, it is vital to examine the reasoning, understanding, and obser-
vation of your condition from a variety of viewpoints, including behavioral and
physiological ones, while building context-aware monitoring systems. The system
must also take into account all relevant contextual factors like human activity, objects,
place, time, periodicity, and attitudes. Also, it is important to take into considera-
tion any previous data available, such as health records, diagnoses, prescribing, and
everyday behavior.
7.3 Safety in e-health Systems Based on the IoT Cloud
In this chapter we discuss the protection and privacy of e-health systems based on
IoT-cloud, which handle medical data, enabling integrative storage, monitoring,
compiling, gathering, and distributing of personal and health information that may
actively ensure the effectiveness of patient health. We thus analyze a variety of
alternative security techniques, all of which work together to provide an effective,
safe, and personal health system for everyone. The usefulness of employing a
PbD frame in IoT applications has been examined by numerous vectors of chal-
lengers of confidentiality and their corresponding defenses. They developed an
IoT application data protection awareness program by taking into account PbD,
the EU GDPR, and private information risk awareness. To resolve confidentiality
of data availability problems the technique used data integrity checks. They also
introduced a protection system for data security based on recognition of the face.
Enhanced protection of privacy by employing secure IoT-based anonymization
and using it as a smart house. They described the potential and privacy drawbacks
Integration of Cloud and IoT for Smart e-Healthcare 27
of e-health systems based on IoT-cloud and assessed the current PbD infras-
tructure. IoT systems consist of gadgets in a specific environment and carry out
several tasks, such as identification, surveillance, administration, and interven-
tion. The gadgets must have connections to transfer the appropriate information
with other devices. In question has been developed, protocols used in the It should
work on the same IoT system, as the gateways IPU (router) and online gateway.
The information communicated over these networks must be protected given the
importance of data, administer data, and code data to fight against unauthorized
access, criminals, and much more. Below is a summary of more serious safety
hazards for IoT cloud e-health solutions.
Cryptographic security: the security of communications by providing technolog-
ical cryptosystems means that privacy and authenticity are assured. The process
of retrieving protected communication with no ensure that the data collected is
generally needed for break encryption or cryptanalysis implementations.
Security of transmission (TRANSEC): security in telecommunications from the
deployment of cryptanalysis methods to safeguard transmissions against intercep-
tion and manipulation. Cryptanalysis is a breach of a cryptography security system
by using analyzing information systems, can enable access even when the encryp-
tion method is unrelated to the content of the encryption software. The functional
output of a cryptography system is determined by the key for the translation of
plaintexts into ciphertexts and the reverse for decrypting algorithms as unique
keys or authentication codes. Clues are produced for use with a certain group of
algorithms we call cryptosystems. For encoding and decoding, encryption tech-
niques utilize the same key. These symmetrical major algorithms are called (e.g.,
AES, DES, Twofish, etc.) An asymmetric key technique (for instance, RSA, DSA)
utilizes a pair of keys, a public key to encrypt or verify, and a person to decrypt,
on the other hand.
Physical security: Security of communication arising from all physical actions.
Physical Security defines the safeguards that prevent illegal entry and protect
employees against harm or damage to services and equipment. Physical safety is
the employment of multiple systems interdependence layers include surveillance,
network management, boundary monitoring of incursions, deterrent systems, and
other technologies. Physical covering installations safeguards prevent intravenous
potential, detect malicious and prompt necessary incident reactions.
8 IoT Cloud-Based e-Health Systems Constraints
and Critical Problems
High latencies and bandied needs for the communication and reception of data among
IoT users and cloud servers are by far the most prevalent problems with IoT-cloud-
based e-Health solutions. The security concerns for IoT-based and cloud computer
process development in Germany are:
28 J. S. Dhatterwal et al.
Heterogeneity: Virtually unlimited are the range of producers, devices, oper-
ating systems, systems, databases, services, and so on. This generates compati-
bility problems or monopoly/oligopoly systems when consumers are trapped in a
manufacturer stack of a single supplier.
Performance: Each user needs individual apps based on their goals, location,
kind of company, etc. Sometimes it is simple to meet needs, but sometimes it
is not. Either IoT or cloud computing might be preferable for some operations
depending on conditions. However, their integration in an IoT-cloud-based system
has synergistic advantages such as increased performance and agility.
Reliability: A process that is less intricate and less sophisticated than a complicated
machine with numerous components is often more dependable. Thus, intrinsically
more dependable when utilized independently, are IoT and cloud technology
systems. When integrated to form an IoT-cloud-based system, a lot has to be done
to assure its dependability.
Big Data: Efficient transmission, storing, accessing, and analysis of very high data
sizes may not easily be achieved without an IoT cloud-based system combination,
dependent on its sophistication and volume.
Monitoring: To control cloud applications for problems or inefficiency in a cloud,
it’s necessary to monitor resources deployment, architecture defects, and mali-
cious code. This necessity for close surveillance will thus be assumed by IoT-cloud
systems.
The security of IoT systems has been seen as the major problem by most academics
to solve by increasing the use of IoT equipment. IoT systems allow the connecting and
usage of the Internet to communicate between small and big systems. Consequently,
IoT applications should prioritize overcoming security problems inherent in IoT
systems. The usage of IoT devices/systems relating to problems such as data privacy
should be made completely confident. As IoT devices use traditional networks to
link practically all of it wirelessly, they make it inherently resistant to environmental
attack or manipulation. Security and privacy elements are generally explored on their
own as separate variables, though. The results of researchers continue to identify the
suitable solution for many security and privacy concerns. Our view is that only
if the factors are combined and investigated as a single system, focusing on the
CIA, will the biggest safety and privacy benefits be achieved. IoT-based systems’
security requirements rely on the surroundings of the system and on the equipment
needed for some user uses. Many researchers have created customized confidential
information configurations to customize their Wireless networks using studies that
tried to introduce IoT-based safety rules using standard CIA along with enhanced
customer safety different factors such as authentication, assessment, and difficulties
to their routing protocols using basic safety hazard assessment methods.
In e-Health systems in use worldwide, IoT and Cloud computing have been
merged. This has brought major modifications to operational principles, pharma-
ceutical drug procedures, confidentiality standards, and safety regulations, as well as
procedures and health systems. Mobile healthcare systems are made possible for the
first moment in decades using IoT-cloud-based solutions. Doctors may now remotely
Integration of Cloud and IoT for Smart e-Healthcare 29
access, diagnose, counsel, and prescribe without ever having to encounter patients.
However, several difficulties need to be solved and taken into consideration to include
IoT cloud-based e-health systems.
9 Conclusions and Future Work
We examined current publications to clearly define the overall character of e-health
systems based on IoT-cloud and the motives driving their use. In this article, the use
and development of computers in health care systems, especially the incorporation
of IoT equipment and cloud computing, were examined. We gave also an introduc-
tion to data security problems on IoT cloud-based e-Health systems and conducted
a comparison study of IoT cloud-based systems of significant privacy protection
problems, definitions, classifications, solutions, and designs. Every implementation
of e-health systems based on IoT cloud is different, requiring customized privacy,
safety solutions, and structures that safeguard against damage without compromising
with the system’s purpose and operations. One of the most fascinating developments
in future technology is the merging of IoT-based systems with a cognitive computing
system to improve the capacities of clever items, intelligent health systems, smart
monitoring systems, and related applications. Through the connection of endless
gadgets, the fast developments in IoT technology change life. In addition, IoT-cloud-
based e-health apps are more productive, cost-effective, and provide better results
for patients in the past. However, the security and privacy of several gadgets that
broadcast and receive large amounts of data wirelessly were never as susceptible as
they are now. Researchers, therefore, need to further develop and enhance existing
IoT-cloud-based e-health systems’ data protection solutions, such as automated iden-
tity systems, watermarking, traditional authentication schemes, and extremely sharp
surveillance. In addition, the possibility of strengthening physical equipment and
instruments against assaults should be investigated. Finally, there are almost universal
worries over global warming and other environmental health. Future research is thus
necessary to identify new ways to enhance the sustainability of IoT cloud-based
e-health systems such as the development of long-term devices and recycling and
recycling equipment or increased power efficiency. In addition, the adaptability of
big data for healthcare challenges should be more focused on effective solutions,
including simulating different methods for privacy protection.
References
1. Eysenbach G (2001) What is e-health? J Med Internet Res 3:e20 [CrossRef][PubMed]
2. Pasha M, Shah SMW (2018) Framework for E-Health systems in IoT-based environments.
Wirel Commun Mob Comput 1–12 [CrossRef]
3. Rahmani AM, Gia TN, Negash B, Anzanpour A, Azimi I, Jiang M, Liljeberg P (2018)
Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: a fog
30 J. S. Dhatterwal et al.
computing approach. Future Gener Comput Syst 78:641–658 [CrossRef]
4. Robinson YH, Presskila XA, Lawrence TS (2002) Utilization of Internet of Things in health
care information system. In: Balas V, Solanki V, Kumar R (eds) Internet of Things and big data
applications. Intelligent systems reference library, vol 180. Springer, Cham, pp 35–46
5. Islam MS, Humaira F, Nur FN (2020) Healthcare applications in IoT. Global J Med Res B
Pharma Drug Discov Toxicol Med 20:1–3 [CrossRef]
6. Shewale AD, Sankpal SV (2020) IOT & Raspberry Pi based smart and secure health care
system using BSN. Int J Res Appl Sci Eng Technol 8:506–510
7. Selvaraj S, Sundaravaradhan S (2020) Challenges and opportunities in IoT healthcare systems:
a systematic review. SN Appl Sci 2:139 [CrossRef]
8. Kaur H, Atif M, Chauhan R (2020) An Internet of Healthcare Thing (IoHT) based healthcare
monitoring system. In: Mohanty MN, Das S (eds) Advances in intelligent computing and
communication, lecture notes in networks and systems, vol 109. Springer Nature, Singapore,
pp. 475–482
9. Dang LM,Piran MJ, Han D, Min K, Moon H (2019) A survey on Internet of Things and cloud
computing for healthcare. Electronics 8:768 [CrossRef]
10. Chattopadhyay AK, Nag A, Ghosh D, Chanda K (2019) A secure framework for IoT-based
healthcare system. In: Chakraborty M, Chakrabarti S, Balas EV, Mandal JK (eds) Proceedings
of the international ethical hacking conference 2018, Kolkata, India, 5 October 2018; Advances
in intelligent system and computing, vol 811. Springer Nature, Singapore, pp 383–393
11. Nandyala CS, Kim H (2016) From cloud to fog and IoT-based real-time U-healthcare
monitoring for smart homes and hospitals. Int J Smart Home 10:187–196 [CrossRef]
12. Maksimovi´c M (2017) Improving computing issues in the Internet of Things driven e-health
systems. In: Proceedings of the international conference for young researchers in informatics,
mathematics, and engineering, Kaunas, Lithuania, 1 Apr 2017, vol 1852, pp 14–17
13. Yeh KH (2016) A secure IoT-based healthcare system with body sensor networks. IEEE Access
4:10288–10299 [CrossRef]
14. Deelip SA, Sankpal SV (2020) IOT based smart and secure health care system analysis and
data comparison. Int J Res Appl Sci Eng Technol 8:394–398
15. Sanjay S, Shekokar N. Toward smart and secure IoT based healthcare system. In: Internet of
Things, smart computing and technology: a roadmap ahead, studies in systems, decision and
control
16. Dey N, Mahalle PN, Shafi PM, Kimabahune VV, Hassanien AE (eds) (2020) Internet of Things,
smart computing and technology: a roadmap ahead, vol 266. Springer Nature AG, Cham, pp
283–303
17. Farahani B, Firouzi F, Charkabarty K (2020) Healthcare IoT. In: Firouzi F, Chakrabarty K,
Nassif S (eds) Intelligent Internet of Thing, from device to fog and cloud. Springer Nature AG,
Cham, pp 515–537
18. Abouelmehdi K, Beni-Hssane A, Khaloufi H, Saadi M (2017) Big data security and privacy in
healthcare: a review. Proc Comput Sci 113:73–80 [CrossRef]
19. Singh H, Kaswan KS (2016) Clinical decision support systems for heart disease using data
mining approach. Int J Comput Sci Softw Eng 5219. Dorma Trading, Est. Publishing Manager
20. Hathaliya JJ, TanwarS (2020) An exhaustive survey on security and privacyissues in Healthcare
4.0. Comput Commun 153:311–335 [CrossRef]
21. Aceto G, Persico V, Pescapé A (2020) Industry 4.0 and health: Internet of things, big data, and
cloud computing for healthcare 4.0. J Ind Inf Integr 18:100–129 [CrossRef]
22. Ray P, Dash D, Salah K, Kumar N (2020) Blockchain for IoT-based healthcare: background,
consensus, platforms, and use cases. IEEE Syst J 1–10 [CrossRef]
23. Nazir S, Ali Y, Ullah N, García-Magariño I (2019) Internet of Things for healthcare using
effects of mobile computing: a systematic literature review. Wirel Commun Mob Comput
1–20 [CrossRef]
24. Semantha FH, Azam S, Yeo KC, Shanmugam B (2020) A systematic literature review on
privacy by design in the healthcare sector. Electronics 9:452 [CrossRef]
Integration of Cloud and IoT for Smart e-Healthcare 31
25. Wu J, Tian X, Tan Y (2019) Hospital evaluation mechanism based on mobile health for IoT
system in social networks. Comput Biol Med 109:138–147 [CrossRef]
26. Khatoon N, Roy S, Pranav P (2020) A survey on applications of Internet of Things in healthcare.
In: Khatoon N, Roy S, Pranav P (eds) Internet of Things and big data applications. Intelligent
systems, vol 180. Springer Nature, Cham, pp 89–106
27. Tuli S, Basumatary N, Singh-Gill S, Kahani M, Chand-Arya R, Wander G, Buyya R (2020)
HealthFog: an ensemble deep learning-based smart healthcare system for automatic diagnosis
of heart diseases in integrated IoT and fog computing environments. Future Gener Comput
Syst 104:187–200 [CrossRef]
28. Gupta P, Pandy A, Akshita P, Sharma A (2019) IoT based healthcare kit for diabetic foot ulcer.
In: Proceedings of the ICRIC 2019, Jammu, India, 8–9 Mar 2019
29. Elmisery AM, Rho S, Aborizka M (2017) A new computing environment for collective privacy
protection from constrained healthcare devices to IoT cloud services. Clust Comput 22:1611–
1638 [CrossRef]
30. Fan K, Jiang W, Li H, Yang Y (2018) Lightweight RFID protocol for medical privacy protection
in IoT. IEEE Trans Ind Inform 14:1656–1665 [CrossRef]
31. Angel Jasmine Shirley M (2020) A cloud IOT based smart patient health monitoring system.
Adalya J 963–968
32. Khader AHA, Subasri K (2019) Fog assisted-IoT enabled patient health monitoring. Adalya J
9:525–530. Swaroop KN, Chandu K, Gorrepotu R, Deb S (2019) A health monitoring system
for vital signs using IoT. Internet Things 5:116–129 [CrossRef]
33. Wilt T, Versluis A, Goedhart A, Talboom-Kamp E, van Delft S (2020) General practitioners’
attitude towards the use of e-health and online testing in primary care. Clin e-health 3:16–22
[CrossRef]
34. Kang JJ, Larkin H (2017) Intelligent personal health devices converged with IoT networks. J
Mob Multimed 12:197–212
35. Yamin M (2018) IT applications in healthcare management: a survey. Int J Inf Technol 10:503–
509 [CrossRef]
36. Mohammed D, Meri A (2019) IoT service utilization in healthcare. In: Ismail Y (ed) Internet
of Things (IoT) for automated and smart applications. IntechOpen, London, pp 1–27
37. Cha S, Hsu T, Xiang Y, Yeh K (2019) Privacy enhancing technologies in the Internet of Things:
perspectives and challenges. IEEE Internet Things J 6:2159–2187 [CrossRef]
38. Zhou J, Cao Z, Dong X, Vasilakos AV (2017) Security and privacy for cloud-based IoT:
challenges, countermeasures, and future directions. IEEE Commun Mag 55:26–33 [CrossRef]
39. Mohanty MN, Das S (2020) Advances in intelligent computing and communication. In: Lecture
notes in networks and systems proceeding of ICAC 2019. Springer Nature Singapore Pte Ltd.,
Singapore
... From the perspectives of science and technology, the maturity of IoT technology, and the rapid development of AI, the use of AIoT emerging technology combines AI and IoT to improve the quality of life of seniors and has attracted greater attention [42][43][44][45][46]. IoT means that electronic devices can be connected to the Internet through network infrastructure [47]. ...
... Research results have provided the industry with some clear challenges and obstacles to improving the adoption of emerging technologies by the elderly, such as robots and virtual/augmented reality (AR/VR). The integration of IoT and mobile phone devices can effectively solve the difficulties of limited storage space and insufficient computing processing capacity of devices at low power consumption, strengthen the development of the entire IoT technology space, and achieve effective management in terms of reliability, computing performance, security, and confidentiality [43,45,52,53]. ...
... Zenbo Software Development Kit and additional tools can accelerate our development of other Apps and capabilities for Zenbo. solve the difficulties of limited storage space and insufficient computing processing capacity of devices at low power consumption, strengthen the development of the entire IoT technology space, and achieve effective management in terms of reliability, computing performance, security, and confidentiality [43,45,52,53]. ...
Article
Full-text available
In 2020, the world experienced the threat of the COVID-19 epidemic, and seniors and chronic disease patients generally reduced their exercise and social activities to avoid increasing the risk of infection, which could lead to increased loneliness and even many diseases. Combining golf croquet games with a mobile application (App) and AIoT companion robots, this research constructs a home-based intelligent exercise system, uses the technology acceptance model (TAM), deduces users’ intention to use this system based on perceived usefulness and perceived ease of use, and adds the needs of love and belonging, esteem, cognitive, aesthetic, and self-actualization in Maslow’s hierarchy of needs theory (HNT) to conduct an analysis of system needs. This study collected empirical data, totaling 320 participants including seniors and their caregivers, from elderly care centers in northern Taiwan using a cross-sectional survey and purposive sampling. Based on regression and variance analysis, the results show that participants have a high level of acceptance of this system, believing that it is easy to learn and operate and can increase interaction with others, improve self-confirmation, satisfy the thirst for knowledge, increase the feeling of happiness, and fulfill self-actualization needs. In the future, by collecting and recording the process of seniors using the App, so as to find out their health problems as soon as possible, expand their daily life through this exercise, and achieve the goal of happy living and better healthcare.
... In the same efforts as suggested by Dhatterwal et al. (2022), this study discovered that sensitive medical data should be treated with extreme confidence and therefore privacy concerns of patients' healthcare data should be preserved to foster trust and acceptance of the interoperable healthcare model. Patients should be allowed to take ownership of their data assets within the interoperable architecture. ...
Article
Full-text available
eHealth systems have been created in most developing countries to facilitate the functioning of healthcare operations and as such various healthcare applications are existing as fragmented silo systems. Such autonomous standalone systems do not communicate through a network thereby making it a challenge to share healthcare data. Therefore, to re‐engineer health information systems (HISs) to develop interoperable adaptive enterprise architecture (EA) systems for healthcare, the study aimed to discover and capture healthcare interoperability functional imperatives through understanding the expectations of healthcare practitioners and patients on post‐development of an interoperable HIS. Therefore, the study's aim was to determine the HISs interoperability perceived functional expectations by both patients and practitioners in fulfilling their healthcare receipt and provision needs in an integrated healthcare environment, respectively. The Open Group Architecture Framework (TOGAF) was used as the main study framework to guide the classification of the expectations from the HIS by patients and practitioners deriving the needs from the four domains which are, business architecture (BA), application architecture (AA), data architecture (DA), and technical architecture. The study used interviews and questionnaire surveys to collect qualitative and quantitative data respectively. The study used purposive sampling to select interview participants. A total of 19 interviews were conducted with healthcare practitioners. Questionnaires were collected from 71 healthcare practitioners and 143 patients and analyzed quantitatively respectively to understand the most significant needs anticipated in an interoperable HIS. The research targeted age groups of at least 20 years and above. The study discovered that patients and practitioners expect the interoperable healthcare environment to support the acquisition of disease knowledge through healthcare surveillance synergies; create healthcare awareness through coordinated digital interactions; augmentation of healthcare intelligence for patient‐care through the healthcare knowledgebase; allow treatment collaboration by various healthcare practitioners in the healthcare ecosystem and mostly achieving a guaranteed healthcare system security and assurance environment.
Article
Full-text available
In this digital age, we are observing an exponential proliferation of sophisticated hardware- and software-based solutions that are able to interact with the users at almost every sensitive aspect of our lives, collecting and analysing a range of data about us. These data, or the derived information out of it, are often too personal to fall into unwanted hands, and thus users are almost always wary of the privacy of such private data that are being continuously collected through these digital mediums. To further complicate the issue, the infringement cases of such databanks are on a sharp rise. Several frameworks have been devised in various parts of the globe to safeguard the issue of data privacy; in parallel, constant research is also being conducted on closing the loopholes within these frameworks. This study aimed to analyse the contemporary privacy by design frameworks to identify the key limitations. Seven contemporary privacy by design frameworks were examined in-depth in this research that was based on a systematic literature review. The result, targeted at the healthcare sector, is expected to produce a high degree of fortification against data breaches in the personal information domain.
Article
Full-text available
IoT is a blessing in the field of information and technology. It is developing and deploying day by day. It is working for our betterment in the section of home, environment, retail, security, factory, industry, agriculture, education, energy, healthcare and so on. In the healthcare section, it has applications, technologies, benefits and also challenges with the four-step architecture. As the world is aging with its uprising population, there is not enough opportunity for all to get healthcare. I think Health is the most expensive property one can own. So in the absence of sufficient and quality healthcare, IoT can manufacture the best utilization of its capacity to play a vital role in creating a better world for all of us. This paper represents the basic concept of IoT in the healthcare field.
Article
Full-text available
Aim As people live longer and multimorbidity is common, the workload for general practitioners (GPs) is increasing. eHealth services, like online diagnostic testing, might help to increase efficiency in work processes and decrease the workload. This qualitative study aimed to examine GPs attitude towards and adoption of eHealth in general and online diagnostic testing in specific. Methods Semi-structured interviews were conducted in 2019 with ten Dutch GPs about eHealth adoption and, specifically, online diagnostic testing. Thematic analysis using Atlas.Ti was done. Results All GPs used eHealth services in their practice, and the majority stated that eHealth made their work more efficient and run more smoothly. eHealth use by their patients was low though and two main barriers were identified by GPs. First, people with a low SES are not frequently using the services and second, the online security measures are often user-unfriendly affecting the number of logins. Seven GPs had positive experiences with online self-testing while three accepted the shift but preferred to deliver the care themselves. Online self-testing for chronic care patients was identified as an interesting future direction by GPs, offering merit and opportunities for both patients and GPs. Conclusions GPs had positive experiences with eHealth and acknowledged that it can result in an efficient workflow. Usage by patients is, however, relatively low and it will be important for future studies to identify ways to increase usage by addressing existing barriers to use. Exploring the potential of online diagnostic testing for chronic care patients might help to make care delivery future proof.
Chapter
Full-text available
Internet of Things (IoT) in healthcare is a revolution in patient’s care with improved diagnosis, real examining and preventive as well as real treatments. The IoT in healthcare consists of sensors enabled smart devices that accurately gather data for further analysis and actions. By using real time data, the devices permit monitoring, tracking and management in order to enhance healthcare. Due to the efficiency of IoT, the information gathered imparts improved judgment and decreases risks of committing mistakes. IoT can also be employed for preventing machines failures which are pros as this can enhance the reliability and quality when it comes to the patient’s supply chain responsiveness. This paper presents a relative survey of applications of IoT in healthcare system.
Chapter
The maintenance of Patient Information system is a huge challenge in the current scenario. The health care improvement demand the enhance efficiency for the service providers. Internet of things can utilize the services of the healthcare domain will increase the quality of the real life and maintains the helping hand for the professionals in this system for making the decisions. The information availability of the health care professionals can utilise the services of Internet of Things (IoT). The exchange of Health care related records can be easily available in the Internet of Things networks. The IoT is used to integrate all the smart devices, the available resources and the drugs prescription and to maintain the health related records in a single network. There are several challenges are facing by the healthcare organizations to exploit the services. This chapter addresses the problems which are facing in the healthcare sector. The interview methodologies with every kind of questions are examined and find the solution for this problem.
Chapter
The protection of a patient’s data is the prime concern in the healthcare sector. With the escalation in the adoption of Internet of Things (IoT) technology for the smart healthcare system, incidences of the revelation of privacy data also upswings hence it becomes necessary to devise a secure smart healthcare system. The requirement of the secure healthcare system is based on a critical survey and this year’s Thales India Data Threat report. The report discloses the percentage of data breaches in past years and emphasizes the need for a tightening of patient data privacy regulation. As a result, the secure smart healthcare system has been recognized as a high priority goal to improve the sustainability of society. However, to concoct a legitimate secure smart healthcare system, threat triggered by integrating multiple devices and protocols need to be curtailed. In addition, a big challenge is to achieve accuracy despite the generation of a colossal amount of data per unit time. Encryption is the top choice for satisfying data privacy laws. Still, only encryption cannot impede data breach activities. It doesn’t always make sense to lush low constraint IoT devices on an algorithm encrypting every data, because it will impose a substantial burden on the system. It is imperative to develop techniques that will detect and prevent threats that vex the security of a healthcare system. Here authors attempt to analyze the smart healthcare architecture, its threats, vulnerabilities and the security measures to provide a secure smart healthcare system.
Article
Industry 4.0 and its main enabling information and communication technologies are completely changing both services and production worlds. This is especially true for the health domain, where the Internet of Things, Cloud and Fog Computing, and Big Data technologies are revolutionizing eHealth and its whole ecosystem, moving it towards Healthcare 4.0. By selectively analyzing the literature, we systematically survey how the adoption of the above-mentioned Industry 4.0 technologies (and their integration) applied to the health domain is changing the way to provide traditional services and products. In this paper, we provide (i) a description of the main technologies and paradigms in relation to Healthcare 4.0 and discuss (ii) their main application scenarios; we then provide an analysis of (iii) carried benefits and (iv) novel cross-disciplinary challenges; finally, we extract (v) the lessons learned.
Article
The healthcare industry has revolutionized from 1.0 to 4.0, where Healthcare 1.0 was more doctor centric and Healthcare 2.0 replaced manual records with electronic healthcare records (EHRs). Healthcare 3.0 was patient-centric and Healthcare 4.0 uses cloud computing (CC), fog computing (FC), Internet of things (IoT), and telehealthcare technologies to share data between various stake-holders. However, framing a secure technique for Healthcare 4.0 has always been a challenging task. An insecure technique for Healthcare 4.0 may lead to the healthcare data breach where hackers can gain full access to patients' email accounts, messages, and reports. On the contrary, a secured technique for Healthcare 4.0 can provide satisfaction to all stakeholders, including patients and caregivers. Motivated from these facts, this paper presents an extensive literature review and analysis of state-of-the-art proposals to maintain security and privacy in Healthcare 4.0. We also explored the blockchain-based solution to give insights to both the research and practitioners communities. Different taxonomies used for exploring various security and privacy issues in Healthcare 4.0 are also presented in a structured manner. Then, the advantages and limitations of various security and privacy techniques are explored and discussed in the paper. Finally, existing challenges and future research directions of security and privacy in Healthcare 4.0 are presented.