{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:22:44Z","timestamp":1760239364583,"version":"build-2065373602"},"reference-count":48,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2020,10,23]],"date-time":"2020-10-23T00:00:00Z","timestamp":1603411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia under Project","award":["UIDB\/04111\/2020"],"award-info":[{"award-number":["UIDB\/04111\/2020"]}]},{"name":"FCT\/MEC through national funds and co-funded by FEDER \u2013 PT2020","award":["UIDB\/50008\/2020"],"award-info":[{"award-number":["UIDB\/50008\/2020"]}]},{"name":"mart  following  systems,   Edge  Computing  and  IoT  Consortium,   CONSORCIO580TC_TCUE18-20_00","award":["TCUE18-20_00"],"award-info":[{"award-number":["TCUE18-20_00"]}]},{"name":"Project managed by Fundaci\u00f3n581General de la Universidad de Salamanca and co-financed with Junta Castilla y Le\u00f3n and FEDER funds.","award":["CUE 2018-2020"],"award-info":[{"award-number":["CUE 2018-2020"]}]},{"name":"Junta De Castilla y Le\u00f3n\u2014Consejer\u00eda De Econom\u00eda Y Empleo: System for simulation and training in advanced techniques for the occupational risk prevention through the design of hybrid-reality environments with ref J118","award":["J118"],"award-info":[{"award-number":["J118"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Data on diagnosis of infection in the general population are strategic for different applications in the public and private spheres. Among them, the data related to symptoms and people displacement stand out, mainly considering highly contagious diseases. This data is sensitive and requires data privacy initiatives to enable its large-scale use. The search for population-monitoring strategies aims at social tracking, supporting the surveillance of contagions to respond to the confrontation with Coronavirus 2 (COVID-19). There are several data privacy issues in environments where IoT devices are used for monitoring hospital processes. In this research, we compare works related to the subject of privacy in the health area. To this end, this research proposes a taxonomy to support the requirements necessary to control patient data privacy in a hospital environment. According to the tests and comparisons made between the variables compared, the application obtained results that contribute to the scenarios applied. In this sense, we modeled and implemented an application. By the end, a mobile application was developed to analyze the privacy and security constraints with COVID-19.<\/jats:p>","DOI":"10.3390\/s20216030","type":"journal-article","created":{"date-parts":[[2020,10,23]],"date-time":"2020-10-23T08:59:28Z","timestamp":1603443568000},"page":"6030","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A Case Study on the Development of a Data Privacy Management Solution Based on Patient Information"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5854-2521","authenticated-orcid":false,"given":"Arielle","family":"Verri Lucca","sequence":"first","affiliation":[{"name":"Laboratory of Embedded and Distribution Systems, University of Vale do Itaja\u00ed, Rua Uruguai 458, C.P. 360, Itaja\u00ed 88302-901, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9981-4586","authenticated-orcid":false,"given":"Lu\u00eds","family":"Augusto Silva","sequence":"additional","affiliation":[{"name":"Laboratory of Embedded and Distribution Systems, University of Vale do Itaja\u00ed, Rua Uruguai 458, C.P. 360, Itaja\u00ed 88302-901, Brazil"},{"name":"Expert Systems and Applications Lab, Faculty of Science, University of Salamanca, Plaza de los Ca\u00eddos s\/n, 37008 Salamanca, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3494-8150","authenticated-orcid":false,"given":"Rodrigo","family":"Luchtenberg","sequence":"additional","affiliation":[{"name":"Laboratory of Embedded and Distribution Systems, University of Vale do Itaja\u00ed, Rua Uruguai 458, C.P. 360, Itaja\u00ed 88302-901, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0566-305X","authenticated-orcid":false,"given":"Leonardo","family":"Garcez","sequence":"additional","affiliation":[{"name":"Laboratory of Embedded and Distribution Systems, University of Vale do Itaja\u00ed, Rua Uruguai 458, C.P. 360, Itaja\u00ed 88302-901, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2255-7489","authenticated-orcid":false,"given":"Xuzeng","family":"Mao","sequence":"additional","affiliation":[{"name":"Expert Systems and Applications Lab, Faculty of Science, University of Salamanca, Plaza de los Ca\u00eddos s\/n, 37008 Salamanca, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2862-3053","authenticated-orcid":false,"given":"Ra\u00fal","family":"Garc\u00eda Ovejero","sequence":"additional","affiliation":[{"name":"Expert Systems and Applications Lab., E.T.S.I.I of B\u00e9jar, University of Salamanca, 37008 Salamanca, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3394-6762","authenticated-orcid":false,"given":"Ivan","family":"Miguel Pires","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, Universidade da Beira Interior, 6200-001 Covilh\u00e3, Portugal"},{"name":"Computer Science Department, Polytechnic Institute of Viseu, 3504-510 Viseu, Portugal"},{"name":"UICISA:E Research Centre, School of Health, Polytechnic Institute of Viseu, 3504-510 Viseu, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0358-2056","authenticated-orcid":false,"given":"Jorge","family":"Luis Vict\u00f3ria Barbosa","sequence":"additional","affiliation":[{"name":"Applied Computing Graduate Program, University of Vale do Rio dos Sinos, Av. Unisinos 950, S\u00e3o Leopoldo, RS 93.022-750, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0446-9271","authenticated-orcid":false,"given":"Valderi","family":"Reis Quietinho Leithardt","sequence":"additional","affiliation":[{"name":"Departamento de Inform\u00e1tica da Universidade da Beira Interior, 6200-001 Covilh\u00e3, Portugal"},{"name":"COPELABS, Universidade Lus\u00f3fona de Humanidades e Tecnologias, 1749-024 Lisboa, Portugal"},{"name":"VALORIZA, Research Center for Endogenous Resources Valorization, Instituto Polit\u00e9cnico de Portalegre, 7300-555 Portalegre, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2020,10,23]]},"reference":[{"key":"ref_1","unstructured":"Singh, P.K., Bhargava, B.K., Paprzycki, M., Kaushal, N.C., and Hong, W.C. (2020). Internet of Things for Enhanced Living Environments, Health and Well-Being: Technologies, Architectures and Systems. Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario\u2019s, Springer International Publishing."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Pires, I.M., Marques, G., Garcia, N.M., Fl\u00f3rez-Revuelta, F., Ponciano, V., and Oniani, S. (2020). A Research on the Classification and Applicability of the Mobile Health Applications. J. Pers. Med., 10.","DOI":"10.3390\/jpm10010011"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Doukas, C., and Maglogiannis, I. (2012, January 4\u20136). Bringing IoT and Cloud Computing towards Pervasive Healthcare. Proceedings of the 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Palermo, Italy.","DOI":"10.1109\/IMIS.2012.26"},{"key":"ref_4","unstructured":"Al-Odat, Z.A., Srinivasan, S.K., Al-qtiemat, E., Dubasi, M.A.L., and Shuja, S. (2018). IoT-Based Secure Embedded Scheme for Insulin Pump Data Acquisition and Monitoring. arXiv."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Farahani, B., Firouzi, F., Chang, V., Badaroglu, M., Constant, N., and Mankodiya, K. (2017). Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare. Future Gener. Comput. Syst.","DOI":"10.1016\/j.future.2017.04.036"},{"key":"ref_6","unstructured":"Campos, J., and Souza, V.S.A. (2014). Percep\u00e7\u00e3o dos Usu\u00e1rios do Servi\u00e7o de Urg\u00eancia e Emerg\u00eancia em rela\u00e7\u00e3o \u00e0 classifica\u00e7\u00e3o de risco pelo protocolo de Manchester. Rev. Unim. Cient. Montes Claros, 16, Available online: https:\/\/doi.org\/http:\/\/www.ruc.unimontes.br\/index.php\/unicientifica\/article\/view\/319\/297."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"102433","DOI":"10.1016\/j.jaut.2020.102433","article-title":"The epidemiology and pathogenesis of coronavirus disease (COVID-19) outbreak","volume":"109","author":"Rothan","year":"2020","journal-title":"J. Autoimmun."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Liang, Y., Liang, J., Zhou, Q., Li, X., Lin, F., Deng, Z., Zhang, B., Li, L., Wang, X., and Zhu, H. (2020). Prevalence and clinical features of 2019 novel coronavirus disease (COVID-19) in the Fever Clinic of a teaching hospital in Beijing: A single-center, retrospective study. medRxiv.","DOI":"10.1101\/2020.02.25.20027763"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1590\/S0103-21002011000500014","article-title":"Privacidade dos pacientes: Uma quest\u00e3o para a gera\u00e7\u00e3o do cuidado em enfermagem","volume":"24","author":"Soares","year":"2011","journal-title":"Acta Paul. Enferm."},{"key":"ref_10","first-page":"42","article-title":"A Data Privacy Taxonomy","volume":"Volume 5588","author":"Barker","year":"2009","journal-title":"British National Conference on Databases"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Asaddok, N., and Ghazali, M. (2017, January 16\u201317). Exploring the usability, security and privacy taxonomy for mobile health applications. Proceedings of the 2017 International Conference on Research and Innovation in Information Systems (ICRIIS), Langkawi, Malaysia.","DOI":"10.1109\/ICRIIS.2017.8002472"},{"key":"ref_12","unstructured":"Coen-Porisini, A., Colombo, P., Sicari, S., and Trombetta, A. (2007, January 19\u201321). A Conceptual Model for Privacy Policies. Proceedings of the 11th IASTED International Conference on Software Engineering and Applications (SEA \u201907), Cambridge, MA, USA."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Silva, L.A., Leithardt, V.R.Q., Rolim, C.O., Gonz\u00e1lez, G.V., Geyer, C.F.R., and Silva, J.S. (2019). PRISER: Managing Notification in Multiples Devices with Data Privacy Support. Sensors, 19.","DOI":"10.3390\/s19143098"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1109\/TLA.2020.9099759","article-title":"A Solution for Dynamic Management of User Profiles in IoT Environments","volume":"18","author":"Leithardt","year":"2020","journal-title":"IEEE Lat. Am. Trans."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Zwitter, A., and Gstrein, O.J. (2020). Big data, privacy and COVID-19\u2013learning from humanitarian expertise in data protection. J. Int. Humanit. Action, 5.","DOI":"10.1186\/s41018-020-00072-6"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Yesmin, T., and Carter, M.W. (2020). Evaluation framework for automatic privacy auditing tools for hospital data breach detections: A case study. Int. J. Med. Inform., 138.","DOI":"10.1016\/j.ijmedinf.2020.104123"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"678","DOI":"10.1109\/ACCESS.2015.2437951","article-title":"The Internet of Things for Health Care: A Comprehensive Survey","volume":"3","author":"Islam","year":"2015","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Sun, J., Zhu, X., Zhang, C., and Fang, Y. (2011, January 20\u201324). HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare. Proceedings of the 2011 31st International Conference on Distributed Computing Systems, Minneapolis, MN, USA.","DOI":"10.1109\/ICDCS.2011.83"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Samaila, M., Neto, M., Fernandes, D., Freire, M., and In\u00e1cio, P. (2018). Challenges of Securing Internet of Things Devices: A survey. Secur. Priv., 1.","DOI":"10.1002\/spy2.20"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Plachkinova, M., Andr\u00e9s, S., and Chatterjee, S. (2015, January 5\u20138). A Taxonomy of mHealth Apps\u2013Security and Privacy Concerns. Proceedings of the 2015 48th Hawaii International Conference on System Sciences, Kauai, Hawaii.","DOI":"10.1109\/HICSS.2015.385"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Alsubaei, F., Abuhussein, A., and Shiva, S. (2017, January 9\u201312). Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment. Proceedings of the 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops), Singapore.","DOI":"10.1109\/LCN.Workshops.2017.72"},{"key":"ref_22","unstructured":"Hankerson, D., Menezes, A.J., and Vanstone, S. (2005). Guide to Elliptic Curve Cryptography, Springer Science & Business Media."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Yi, X., Bertino, E., Rao, F.Y., and Bouguettaya, A. (2016, January 16\u201320). Practical privacy-preserving user profile matching in social networks. Proceedings of the 2016 IEEE 32nd international conference on data engineering (ICDE), Helsinki, Finland.","DOI":"10.1109\/ICDE.2016.7498255"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R., and Mehani, O. (2015, January 19\u201321). Network-level security and privacy control for smart-home IoT devices. Proceedings of the 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Abu Dhabi, UAE.","DOI":"10.1109\/WiMOB.2015.7347956"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Stojanovi\u0107, R., \u0160kraba, A., and Lutovac, B. (2020, January 8\u201311). A Headset Like Wearable Device to Track COVID-19 Symptoms. Proceedings of the 2020 9th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro.","DOI":"10.1109\/MECO49872.2020.9134211"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1049\/iet-smc.2020.0037","article-title":"Mobile crowdsensing approaches to address the COVID-19 pandemic in Spain","volume":"2","author":"Cecilia","year":"2020","journal-title":"IET Smart Cities"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Riza, T.A., and Gunawan, D. (2020, January 17\u201319). IEEE 802.11ah Network Challenges Supports Covid-19 Prevention Team. Proceedings of the 2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC), Beijing, China.","DOI":"10.1109\/ICEIEC49280.2020.9152346"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Zeinalipour-Yazti, D., and Claramunt, C. (July, January 30). COVID-19 Mobile Contact Tracing Apps (MCTA): A Digital Vaccine or a Privacy Demolition?. Proceedings of the 2020 21st IEEE International Conference on Mobile Data Management (MDM), Versailles, France.","DOI":"10.1109\/MDM48529.2020.00020"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1038\/scientificamerican0573-15","article-title":"Cryptography and Computer Privacy","volume":"228","author":"Feistel","year":"1973","journal-title":"Sci. Am."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Cesconetto, J., Augusto Silva, L., Bortoluzzi, F., Navarro-C\u00e1ceres, M., Zeferino, C.A., and Leithardt, V.R.Q. (2020). PRIPRO\u2014Privacy Profiles: User Profiling Management for Smart Environments. Electronics, 9.","DOI":"10.3390\/electronics9091519"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1590\/S1413-99362011000200008","article-title":"Ontologias e taxonomias: Diferen\u00e7as","volume":"16","author":"Vital","year":"2011","journal-title":"Perspect. Ci\u00caNc. Inform."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Fengou, M., Mantas, G., Lymperopoulos, D., and Komninos, N. (2011). Ubiquitous Health Profile Management Applying Smart Card Technology. International Conference on Wireless Mobile Communication and Healthcare, Springer.","DOI":"10.1007\/978-3-642-29734-2_34"},{"key":"ref_33","first-page":"1529","article-title":"A Privacy Taxonomy for the Management of Ubiquitous Environments","volume":"10","author":"Leithardt","year":"2013","journal-title":"J. Commun. Comput."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1504\/IJHPCN.2017.083196","article-title":"HB-PPAC: Hierarchy-based privacy preserving access control technique in public cloud","volume":"10","author":"Senthilkumar","year":"2017","journal-title":"Int. J. High Perform. Comput. Netw."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Ibraimi, L., Asim, M., and Petkovi\u0107, M. (2009, January 24\u201326). Secure Management of Personal Health Records by Applying Attribute-Based Encryption. Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health, Oslo, Norway.","DOI":"10.1109\/PHEALTH.2009.5754828"},{"key":"ref_36","unstructured":"Centers for Medicare & Medicaid Services (2020, August 25). The Health Insurance Portability and Accountability Act of 1996 (HIPAA), Available online: http:\/\/www.cms.hhs.gov\/hipaa\/."},{"key":"ref_37","unstructured":"Chen, H., Fuller, S.S., Friedman, C., and Hersh, W. (2005). Managing Information Security and Privacy in Healthcare Data Mining. Medical Informatics: Knowledge Management and Data Mining in Biomedicine, Springer."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1590\/S0104-59702011000500004","article-title":"Apontamentos para a arquitetura hospitalar no Brasil: Entre o tradicional e o moderno","volume":"18","author":"Costa","year":"2011","journal-title":"Hist. Cienc. Saude-Manguinhos"},{"key":"ref_39","unstructured":"Lopes, S. (2016). Data Privacy in Interoperability Contexts\u2014The Area of Health. [Ph.D. Thesis, Universidade de \u00c9vora]."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1016\/j.ijinfomgt.2010.10.006","article-title":"Factors Influencing Information Security Management in Small- and Medium-Sized Enterprises: A Case Study from Turkey","volume":"31","author":"Akalp","year":"2011","journal-title":"Int. J. Inf. Manag."},{"key":"ref_41","first-page":"1","article-title":"Uma nova perspectiva no controle dos riscos da utiliza\u00e7\u00e3o de tecnologia m\u00e9dico-hospitalar","volume":"5","author":"Florence","year":"2005","journal-title":"MultiCi\u00eancia"},{"key":"ref_42","first-page":"99","article-title":"Prote\u00e7\u00e3o de Dados Pessoais e Criptografia: Tecnologias Criptogr\u00e1ficas Entre Anonimiza\u00e7\u00e3o e Pseudonimiza\u00e7\u00e3o de Dados","volume":"998","author":"Machado","year":"2019","journal-title":"Rev. Trib."},{"key":"ref_43","unstructured":"(2020, August 30). Brasil. Lei n. 13.079, de 14 de Agosto de 2018. Lei Geral de Prote\u00e7\u00e3o de Dados Pessoais (LGPD), Available online: http:\/\/www.planalto.gov.br\/ccivil_03\/_ato2015-2018\/2018\/lei\/L13709.htm."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Lupiana, D., O\u2019Driscoll, C., and Mtenzi, F. (2009, January 28\u201331). Taxonomy for ubiquitous computing environments. Proceedings of the 2009 First International Conference on Networked Digital Technologies, Ostrava, Czech Republic.","DOI":"10.1109\/NDT.2009.5272068"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1276","DOI":"10.1109\/TLA.2018.8362168","article-title":"SOSFul: Sensor Observation Service (SOS) for Internet of Things (IoT)","volume":"16","author":"Pradilla","year":"2018","journal-title":"IEEE Lat. Am. Trans."},{"key":"ref_46","unstructured":"Fowler, M. (2005). UML Essencial: Um Breve Guia Para Linguagem Padrao, Bookman."},{"key":"ref_47","unstructured":"Menezes, A.J., Vanstone, S.A., and Oorschot, P.C.V. (1996). Handbook of Applied Cryptography, CRC Press, Inc.. [1st ed.]."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/s12098-020-03263-6","article-title":"A Review of Coronavirus Disease-2019 (COVID-19)","volume":"87","author":"Singhal","year":"2020","journal-title":"Indian J. Pediatr."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/21\/6030\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:26:53Z","timestamp":1760178413000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/21\/6030"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,23]]},"references-count":48,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2020,11]]}},"alternative-id":["s20216030"],"URL":"https:\/\/doi.org\/10.3390\/s20216030","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,10,23]]}}}