Research Article
[Retracted] Analysis of Privacy-Preserving Edge Computing and Internet of Things Models in Healthcare Domain
Table 3
Summary of privacy preservation challenges in both IoT and edge computing-based healthcare solutions.
| Privacy preservation challenges computing | IoT | Edge |
| (1) Less computing power for executing privacy solutions. | ✓ | | (2) Inefficient performance for real time secure processing. | ✓ | | (3) Limited resources with regard to bandwidth. | ✓ | | (4) Lack of privacy policies. | ✓ | ✓ | (5) Absence of trust management layers between computing paradigms. | ✓ | ✓ | (6) Lack of user awareness about sharing their own data. | ✓ | ✓ | (7) Limited resources with regard to memory. | ✓ | ✓ | (8) High mobility of devices introduces the challenge to keep the privacy preservation mechanisms intelligent and dynamic. | ✓ | ✓ | (9) Dependence on other platforms for optimal performance. | ✓ | | (10) Heterogeneous nature impels for complex intercommunication between devices and among platforms. | ✓ | ✓ | (11) Decentralized architecture’s complexity. | | ✓ | (12) Requirement of unconventional lightweight privacy mechanisms. | | ✓ | (13) Compatibility issues within devices can lead to misconfiguration and thus data exposure. | | ✓ | (14) High computational overheads. | | ✓ | (15) Possibility of hardware (device/node) compromise. | ✓ | ✓ |
|
|