Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology

GG Dagher, J Mohler, M Milojkovic… - Sustainable cities and …, 2018 - Elsevier
Despite an increased focus on the security of electronic health records and an effort by large
cities around the globe to pursue smart city infrastructure, the private information of patients …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

Providing task allocation and secure deduplication for mobile crowdsensing via fog computing

J Ni, K Zhang, Y Yu, X Lin… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Mobile crowdsensing enables a crowd of individuals to cooperatively collect data for special
interest customers using their mobile devices. The success of mobile crowdsensing largely …

Ordered-element naming for name-based packet forwarding

I Solis - US Patent 9,978,025, 2018 - Google Patents
A name-based content-forwarding system generates an ordered-element name for a content
item, and can process an interest to identify and perform an action that satisfies the interest …

Secure fine-grained access control and data sharing for dynamic groups in the cloud

S Xu, G Yang, Y Mu, RH Deng - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cloud computing is an emerging computing paradigm that enables users to store their data
in a cloud server to enjoy scalable and on-demand services. Nevertheless, it also brings …

Privacy-preserving ridge regression on distributed data

YR Chen, A Rezapour, WG Tzeng - Information Sciences, 2018 - Elsevier
Ridge regression is a statistical method for modeling a linear relationship between a
dependent variable and some explanatory values. It is a building-block that plays a major …

Updatable encryption with post-compromise security

A Lehmann, B Tackmann - … 2018: 37th Annual International Conference on …, 2018 - Springer
An updatable encryption scheme allows to periodically rotate the encryption key and move
already existing ciphertexts from the old to the new key. These ciphertext updates are done …

IoT device security based on proxy re-encryption

SH Kim, IY Lee - Journal of Ambient Intelligence and Humanized …, 2018 - Springer
It appears that interest in the Internet of things (IoT) has recently reached its peak, with a
great deal of focus from both the private and public sectors. IoT, a technology that enables …

Blockchain based secret-data sharing model for personal health record system

TT Thwin, S Vasupongayya - 2018 5th International conference …, 2018 - ieeexplore.ieee.org
The blockchain systems are analyzed under the context of the personal health record
system (PHRs) requirements. The transparent property of blockchain may cause the privacy …

Data sharing and tracing scheme based on blockchain

Z Wang, Y Tian, J Zhu - 2018 8th international conference on …, 2018 - ieeexplore.ieee.org
The existing data sharing models have some issues such as poor transparency of data
transactions, data without security assurance and lacking of effective data tracking methods …