Improving data security in IoT healthcare offerings the use of fog computing

  • Unique Paper ID: 173875
  • PageNo: 1821-1828
  • Abstract:
  • By connecting physical items, the Internet of Things (IoT) enables data transmission and reception over the internet without human interaction. Massive volumes of real-time data are produced in the medical field leveraging Iot devices such as medical sensors and wearable monitors, often stored in the cloud. Managing such data presents challenges like latency and security, especially for real-time healthcare applications. Fog computing handles these issues by shifting processing and storage towards the edge of the network near data sources. Fog nodes process, encrypt, and store data locally, reducing reliance on cloud services. This approach minimizes latency and ensures real-time computation. Security is strengthened as data encrypted with the Advanced Encryption Standard (AES) at the fog node is further protected with an access token mechanism, allowing only authorized entities to encrypt or access files directly from storage drives. This safeguards sensitive information and ensures compliance with regulations like HIPAA and GDPR. By handling data at a local level, fog computing reduces communication errors and improves consistency and accuracy. It offers a reliable framework for healthcare IoT data processing, guaranteeing better patient care, improved decision- making, and enhanced data privacy.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{173875,
        author = {Podilapu Chakradharnaidu and Manoj Kumar Kar and Lakkoju Eswara Sai and Ippili Sri Sravya and Bobbili Karthik and Mandala Varun Kumar},
        title = {Improving data security in IoT healthcare offerings the use of fog computing},
        journal = {International Journal of Innovative Research in Technology},
        year = {2025},
        volume = {11},
        number = {10},
        pages = {1821-1828},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=173875},
        abstract = {By connecting physical items, the Internet of Things (IoT) enables data transmission and reception over the internet without human interaction. Massive volumes of real-time data are produced in the medical field leveraging Iot devices such as medical sensors and wearable monitors, often stored in the cloud. Managing such data presents challenges like latency and security, especially for real-time healthcare applications.
Fog computing handles these issues by shifting processing and storage towards the edge of the network near data sources. Fog nodes process, encrypt, and store data locally, reducing reliance on cloud services. This approach minimizes latency and ensures real-time computation. Security is strengthened as data encrypted with the Advanced Encryption Standard (AES) at the fog node is further protected with an access token mechanism, allowing only authorized entities to encrypt or access files directly from storage drives. This safeguards sensitive information and ensures compliance with regulations like HIPAA and GDPR.
By handling data at a local level, fog computing reduces communication errors and improves consistency and accuracy. It offers a reliable framework for healthcare IoT data processing, guaranteeing better patient care, improved decision- making, and enhanced data privacy.},
        keywords = {Internet of Things, fog computing, Access Token, Advanced Encryption Standard (AES) Algorithm},
        month = {March},
        }

Cite This Article

Chakradharnaidu, P., & Kar, M. K., & Sai, L. E., & Sravya, I. S., & Karthik, B., & Kumar, M. V. (2025). Improving data security in IoT healthcare offerings the use of fog computing. International Journal of Innovative Research in Technology (IJIRT), 11(10), 1821–1828.

Related Articles