Volume 14, Issue 1 (Apr & May 2020)                   payavard 2020, 14(1): 1-10 | Back to browse issues page

XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Ronaghi M H, Hosseini F. Security Challenges in Fog Computing in Healthcare. payavard 2020; 14 (1) :1-10
URL: http://payavard.tums.ac.ir/article-1-6929-en.html
1- Assistant Professor, Department of Management, Faculty of Economics, Management and Social Sciences, Shiraz University, Shiraz, Iran , mh_ronaghi@shirazu.ac.ir
2- Master of Science in Computer Engineering, Faculty of Electrical & Computer Engineering, Islamic Azad University, Zanjan Branch, Zanjan, Iran
Abstract:   (3056 Views)
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and open structure makes it vulnerable and weak to security threats. Therefore, the aim of this paper was to identify the security challenges in healthcare.
Materials and Methods: This applied research has been done in three phases using mixed-method approach in 2019. In the first phase, security codes from library resources by content analysis was identified. In the second phase interpretation of experts by Delphi method, Panel of IT experts consists of twelve members who work on healthcare sector was evaluated. Finally, we used Analytic Hierarchy Process method for ranking security codes.
Results: According to fuzzy AHP results attacks(0.31), secure communications(0.23), authentication and access control(0.19), trust(0.15) and privacy preservation(0.12) are the most important criteria in security challenges of fog computing.
Conclusion: According to the results of this study, secure communications and network attacks are the major challenges in fog computing, because fog nodes are usually deployed in some places with relatively weak protection. They may encounter various malicious attacks. As a result, policymakers should be aware of the role of secure communications and network attacks in fog computing implementation.
Full-Text [PDF 468 kb]   (1805 Downloads)    
Type of Study: Original Research | Subject: Health Information Technology
ePublished: 1399/07/23

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2024 , Tehran University of Medical Sciences, CC BY-NC 4.0

Designed & Developed by: Yektaweb