Patient Empowerment in IoT for eHealth: How to Deal With Lost Keys

Patient Empowerment in IoT for eHealth: How to Deal With Lost Keys

Emmanuel Benoist, Serge Bignens, Alexander Kreutz
ISBN13: 9781799824442|ISBN10: 1799824446|ISBN13 Softcover: 9781799824459|EISBN13: 9781799824466
DOI: 10.4018/978-1-7998-2444-2.ch007
Cite Chapter Cite Chapter

MLA

Benoist, Emmanuel, et al. "Patient Empowerment in IoT for eHealth: How to Deal With Lost Keys." Applied Approach to Privacy and Security for the Internet of Things, edited by Parag Chatterjee, et al., IGI Global, 2020, pp. 140-153. https://doi.org/10.4018/978-1-7998-2444-2.ch007

APA

Benoist, E., Bignens, S., & Kreutz, A. (2020). Patient Empowerment in IoT for eHealth: How to Deal With Lost Keys. In P. Chatterjee, E. Benoist, & A. Nath (Eds.), Applied Approach to Privacy and Security for the Internet of Things (pp. 140-153). IGI Global. https://doi.org/10.4018/978-1-7998-2444-2.ch007

Chicago

Benoist, Emmanuel, Serge Bignens, and Alexander Kreutz. "Patient Empowerment in IoT for eHealth: How to Deal With Lost Keys." In Applied Approach to Privacy and Security for the Internet of Things, edited by Parag Chatterjee, Emmanuel Benoist, and Asoke Nath, 140-153. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2444-2.ch007

Export Reference

Mendeley
Favorite

Abstract

The rise of internet of things (IoT) in medicine has generated tons of new data through connected devices. Medicine and research in medicine are interested in using those data for the personalization of patients' treatment. The authors present the system MIDATA where patients can transfer their medical IoT data and store them. They have also the possibility to share those data with research groups. The solution respects patient privacy. Even an administrator of the site cannot access to the data of the patients. The patient can choose which users can decrypt their data. But users will lose their passwords and keys. So, the authors provide a novel solution for the recovery of the keys. This procedure has different levels: the patient has a new phone but remembers the password; the patient has forgotten the password but can use the phone; and the worst case is when the patient forgot the password and lost the phone, where they developed a novel solution for key recovery.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.