{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T11:57:39Z","timestamp":1746187059325,"version":"3.28.0"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,6]]},"DOI":"10.1109\/icccnt51525.2021.9579933","type":"proceedings-article","created":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T19:29:48Z","timestamp":1635967788000},"page":"1-10","source":"Crossref","is-referenced-by-count":5,"title":["Privacy Dilemma in Healthcare: A Review on Privacy Preserving Medical Internet of Things"],"prefix":"10.1109","author":[{"given":"Navod Neranjan","family":"Thilakarathne","sequence":"first","affiliation":[]},{"given":"H. D.","family":"Weerasinghe","sequence":"additional","affiliation":[]},{"given":"Anuradhi","family":"Welhenge","sequence":"additional","affiliation":[]},{"given":"Mohan Krishna","family":"Kagita","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.4108\/eai.13-7-2018.159356"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23404-1_7"},{"year":"0","key":"ref33"},{"journal-title":"Anonymization in healthcare","year":"0","author":"riontino","key":"ref32"},{"journal-title":"Anonymizing Health Data","year":"0","author":"emam","key":"ref31"},{"year":"0","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0243043"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919982"},{"key":"ref35","first-page":"1","article-title":"Privacy preserving integration of health care data","author":"adam","year":"0","journal-title":"In AMIA annual symposium proceedings"},{"year":"0","key":"ref34"},{"year":"0","key":"ref28"},{"year":"0","key":"ref27"},{"journal-title":"Why data minimization is an important concept in the age of big data","year":"0","author":"marr","key":"ref29"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916503"},{"key":"ref1","article-title":"A survey on internet of things: Security and privacy issues","volume":"90","author":"kumar","year":"2014","journal-title":"International Journal of Computer Applications"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2960617"},{"journal-title":"Privacy and security issues in IoT healthcare applications for the disabled users a survey","year":"2012","author":"al-mawee","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5455\/aim.2019.27.253-258"},{"year":"0","key":"ref24"},{"key":"ref23","article-title":"6 Security Issues That Will Dominate IoT in 2019","author":"roe","year":"0","journal-title":"019\/"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LISAT.2018.8378034"},{"year":"0","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2020.108259"},{"year":"0","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/sec.795"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2019.8861857"},{"year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17226\/12458"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.31033\/ijemr.10.1.5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.31033\/ijemr.10.4.22"},{"key":"ref17","article-title":"A Review on Security and Privacy of Internet of Medical Things","author":"kagita","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref18","article-title":"A Detail Study of Security and Privacy issues of Internet of Things","author":"kagita","year":"2020","journal-title":"ArXiv Preprint"},{"year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.717"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.12.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5978636"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.28"},{"journal-title":"Information security (infosec) The complete guide","year":"0","author":"cassetto","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-287-158-9_5"},{"journal-title":"Review on the Use of ICT Driven Solutions Towards Managing Global Pandemics","year":"2021","author":"thilakarathne","key":"ref49"},{"year":"0","key":"ref9"},{"year":"0","key":"ref46"},{"year":"0","key":"ref45"},{"key":"ref48","article-title":"The Adoption of ICT Powered Healthcare Technologies towards Managing Global Pandemics","author":"thilakarathne","year":"2020","journal-title":"ArXiv Preprint"},{"year":"0","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.06.004"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-019-0211-0"},{"year":"0","key":"ref44"},{"year":"0","key":"ref43"}],"event":{"name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2021,7,6]]},"location":"Kharagpur, India","end":{"date-parts":[[2021,7,8]]}},"container-title":["2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9579467\/9579470\/09579933.pdf?arnumber=9579933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:40Z","timestamp":1652201740000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9579933\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,6]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/icccnt51525.2021.9579933","relation":{},"subject":[],"published":{"date-parts":[[2021,7,6]]}}}