{"id":"https://openalex.org/W4417241224","doi":"https://doi.org/10.3390/computers14120549","title":"A Theoretical Model for Privacy-Preserving IoMT Based on Hybrid SDAIPA Classification Approach and Optimized Homomorphic Encryption","display_name":"A Theoretical Model for Privacy-Preserving IoMT Based on Hybrid SDAIPA Classification Approach and Optimized Homomorphic Encryption","publication_year":2025,"publication_date":"2025-12-11","ids":{"openalex":"https://openalex.org/W4417241224","doi":"https://doi.org/10.3390/computers14120549"},"language":"en","primary_location":{"id":"doi:10.3390/computers14120549","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14120549","pdf_url":"https://www.mdpi.com/2073-431X/14/12/549/pdf","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-431X/14/12/549/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113987221","display_name":"Mohammed Ali Alzahrani","orcid":"https://orcid.org/0000-0002-1161-939X"},"institutions":[{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Mohammed Ali R. Alzahrani","raw_affiliation_strings":["Information Technology Department, Computing and ICT Faculty, Taif University, Taif 21974, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Information Technology Department, Computing and ICT Faculty, Taif University, Taif 21974, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5113987221"],"corresponding_institution_ids":["https://openalex.org/I179331831"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.52230536,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":"12","first_page":"549","last_page":"549"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.2851000130176544,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.2851000130176544,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.15639999508857727,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.12919999659061432,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.760200023651123},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6046000123023987},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4844000041484833},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.39989998936653137},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.37790000438690186},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.3700999915599823},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.3573000133037567},{"id":"https://openalex.org/keywords/sensitivity","display_name":"Sensitivity (control systems)","score":0.3393999934196472}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7847999930381775},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.760200023651123},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6046000123023987},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4844000041484833},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.39989998936653137},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3991999924182892},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3919000029563904},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.37790000438690186},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.3700999915599823},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3573000133037567},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.3393999934196472},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.33550000190734863},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3336000144481659},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.31940001249313354},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.31209999322891235},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.31040000915527344},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.29760000109672546},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2930999994277954},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.28999999165534973},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.2863999903202057},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.28540000319480896},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2842999994754791},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.2822999954223633},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.27619999647140503}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/computers14120549","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14120549","pdf_url":"https://www.mdpi.com/2073-431X/14/12/549/pdf","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:60ac036457c44b0780696e95e878ed6c","is_oa":true,"landing_page_url":"https://doaj.org/article/60ac036457c44b0780696e95e878ed6c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computers, Vol 14, Iss 12, p 549 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/computers14120549","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14120549","pdf_url":"https://www.mdpi.com/2073-431X/14/12/549/pdf","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4417241224.pdf","grobid_xml":"https://content.openalex.org/works/W4417241224.grobid-xml"},"referenced_works_count":66,"referenced_works":["https://openalex.org/W2069692482","https://openalex.org/W2152926062","https://openalex.org/W2779874452","https://openalex.org/W2921895997","https://openalex.org/W3018946592","https://openalex.org/W3111445410","https://openalex.org/W3155734262","https://openalex.org/W3196688540","https://openalex.org/W3203898451","https://openalex.org/W3217338151","https://openalex.org/W4206551672","https://openalex.org/W4213307719","https://openalex.org/W4214809372","https://openalex.org/W4221046479","https://openalex.org/W4225377307","https://openalex.org/W4242328343","https://openalex.org/W4281630533","https://openalex.org/W4281643031","https://openalex.org/W4308016342","https://openalex.org/W4320482408","https://openalex.org/W4320916876","https://openalex.org/W4323317551","https://openalex.org/W4365509262","https://openalex.org/W4367856645","https://openalex.org/W4376616730","https://openalex.org/W4378420875","https://openalex.org/W4380322574","https://openalex.org/W4385383230","https://openalex.org/W4387121746","https://openalex.org/W4387777113","https://openalex.org/W4388288780","https://openalex.org/W4391097179","https://openalex.org/W4391610999","https://openalex.org/W4394820998","https://openalex.org/W4394883124","https://openalex.org/W4402128718","https://openalex.org/W4402987481","https://openalex.org/W4402991472","https://openalex.org/W4403527546","https://openalex.org/W4404073094","https://openalex.org/W4405348100","https://openalex.org/W4405442378","https://openalex.org/W4406308346","https://openalex.org/W4406562512","https://openalex.org/W4408061623","https://openalex.org/W4408503963","https://openalex.org/W4408574631","https://openalex.org/W4408781895","https://openalex.org/W4408841535","https://openalex.org/W4409174818","https://openalex.org/W4409197144","https://openalex.org/W4409325397","https://openalex.org/W4409560265","https://openalex.org/W4409904052","https://openalex.org/W4411128498","https://openalex.org/W4412014924","https://openalex.org/W4412418636","https://openalex.org/W4412469163","https://openalex.org/W4413074117","https://openalex.org/W4413117894","https://openalex.org/W4413329862","https://openalex.org/W4414297419","https://openalex.org/W4414529392","https://openalex.org/W4414882107","https://openalex.org/W4415251702","https://openalex.org/W4415364210"],"related_works":[],"abstract_inverted_index":{"The":[0,70,86,143,219],"Internet":[1],"of":[2,14,21,120,154,194,230,232],"Medical":[3],"Things":[4],"(IoMT)":[5],"improves":[6,158],"healthcare":[7],"delivery":[8],"through":[9],"many":[10,41],"medical":[11,15],"applications.":[12],"Because":[13],"data":[16,84,188],"sensitivity":[17,231],"and":[18,25,40,63,100,105,109,133,157,190,240,242,248,253],"limited":[19],"resources":[20],"wearable":[22],"technology,":[23],"privacy":[24,201,233],"security":[26,159],"are":[27,207],"significant":[28],"challenges.":[29],"Traditional":[30],"encryption":[31,53,65,121],"does":[32],"not":[33],"provide":[34],"secure":[35],"computation":[36],"on":[37,47,83,172],"encrypted":[38],"data,":[39,132],"blockchain-based":[42],"IoMT":[43,50,74],"solutions":[44],"partially":[45],"rely":[46],"centralized":[48],"structures.":[49],"with":[51,187,214,235,243],"dynamic":[52],"is":[54,128,138,148,168],"an":[55,164],"innovative":[56],"privacy-preserving":[57,73],"system":[58],"that":[59,76,96,167,222],"combines":[60],"sensitivity-based":[61],"classification":[62,94,115],"advanced":[64],"to":[66,150,182,209,216,251,261],"address":[67],"these":[68],"issues.":[69],"study":[71],"proposes":[72],"framework":[75],"dynamically":[77,183],"adapts":[78],"its":[79,258],"cryptographic":[80,152,185],"strategy":[81],"based":[82,171],"sensitivity.":[85],"proposed":[87,176,212],"approach":[88,177,213],"uses":[89],"a":[90,179],"hybrid":[91,224],"SDAIPA":[92,173],"(SDAIA-HIPAA)":[93],"model":[95],"integrates":[97],"Saudi":[98],"Data":[99],"Artificial":[101],"Intelligence":[102],"Authority":[103],"(SDAIA)":[104],"Health":[106],"Insurance":[107],"Portability":[108],"Accountability":[110],"Act":[111],"(HIPAA)":[112],"guidelines.":[113],"This":[114,175],"directly":[116],"governs":[117],"the":[118,192,211,223,228],"selection":[119],"mechanisms,":[122],"where":[123],"Advanced":[124],"Encryption":[125,136],"Standard":[126],"(AES)":[127],"used":[129,139,149,170,208],"for":[130,140,202],"low-sensitivity":[131],"Fully":[134],"Homomorphic":[135],"(FHE)":[137],"high-sensitivity":[141],"data.":[142],"Whale":[144],"Optimization":[145],"Algorithm":[146],"(WOA)":[147],"maximize":[151],"entropy":[153],"FHE":[155,166,196],"keys":[156],"against":[160],"attacks,":[161],"resulting":[162],"in":[163,227],"Optimized":[165],"conditionally":[169],"outputs.":[174],"provides":[178],"novel":[180],"scheme":[181],"align":[184],"intensity":[186],"risk":[189],"avoids":[191],"overhead":[193],"uniform":[195],"use":[197],"while":[198],"ensuring":[199],"strong":[200],"critical":[203],"records.":[204],"Two":[205],"datasets":[206],"assess":[210],"up":[215],"806":[217],"samples.":[218],"results":[220],"show":[221],"OHE-WOA":[225],"outperforms":[226],"percentage":[229],"index":[234],"dataset":[236,244],"1":[237],"by":[238,246],"78.3%":[239],"12.5%":[241],"2":[245],"89%":[247],"19.7%":[249],"compared":[250],"AES":[252],"RSA,":[254],"respectively,":[255],"which":[256],"ensures":[257],"superior":[259],"ability":[260],"preserve":[262],"privacy.":[263]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-12-11T00:00:00"}
