| Literature DB >> 33114053 |
Arielle Verri Lucca1, Luís Augusto Silva1,2, Rodrigo Luchtenberg1, Leonardo Garcez1, Xuzeng Mao2, Raúl García Ovejero3, Ivan Miguel Pires4,5,6, Jorge Luis Victória Barbosa7, Valderi Reis Quietinho Leithardt8,9,10.
Abstract
Data on diagnosis of infection in the general population are strategic for different applications in the public and private spheres. Among them, the data related to symptoms and people displacement stand out, mainly considering highly contagious diseases. This data is sensitive and requires data privacy initiatives to enable its large-scale use. The search for population-monitoring strategies aims at social tracking, supporting the surveillance of contagions to respond to the confrontation with COVID-19. There are several data privacy issues in environments where IoT devices are used for monitoring hospital processes. In this research, we compare works related to the subject of privacy in the health area. To this end, this research proposes a taxonomy to support the requirements necessary to control patient data privacy in a hospital environment. According to the tests and comparisons made between the variables compared, the application obtained results that contribute to the scenarios applied. In this sense, we modeled and implemented an application. By the end, a mobile application was developed to analyze the privacy and security constraints with COVID-19.Entities:
Keywords: COVID-19; IoT; data privacy; taxonomy
Mesh:
Year: 2020 PMID: 33114053 PMCID: PMC7660312 DOI: 10.3390/s20216030
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Scope of related works
| Work | Cryptography | Private Profile | Devices | Taxonomy |
|---|---|---|---|---|
| [ | • | |||
| [ | • | • | ||
| [ | • | • | • | |
| [ | • | • | • | |
| [ | • | • | • | |
| [ | • | • | • | |
| [ | • | • | ||
| [ | • | • | • | |
| [ | • | • | ||
| [ | • | • | ||
| [ | • | |||
| [ | • | • | ||
| [ | • | • | ||
| [ | • | • | ||
| [ | • | • | ||
| Proposal | • | • | • | • |
Figure 1Proposed taxonomy.
Figure 2Devices with its parameters.
Figure 3Reception at the Emergency Room.
Figure 4Screening Room.
Figure 5Reception at the Office.
Figure 6Sequence—Reception at the Emergency Room.
Figure 7Sequence—Screening Room.
Figure 8Sequence—Office.
Figure 9Context Diagram.
Figure 10Application Flow.
Figure 11Saved Information.
Figure 12AES Encryption.
Figure 13Patient record simulating discharge.
Figure 14Patient registry simulating medical care admittance.