A comprehensive survey on security and privacy for electronic health data
Recently, the integration of state-of-the-art technologies, such as modern sensors, networks,
and cloud computing, has revolutionized the conventional healthcare system. However …
and cloud computing, has revolutionized the conventional healthcare system. However …
Realizing an internet of secure things: A survey on issues and enabling technologies
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …
momentum in connecting physical objects to the Internet and facilitating machine-to-human …
Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption
Abstract The sharing of Personal Health Records (PHR) in cloud computing is a promising
platform of health information exchange. However, the storage of personal medical and …
platform of health information exchange. However, the storage of personal medical and …
A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing
YS Rao - Future Generation Computer Systems, 2017 - Elsevier
Abstract In recent years, Personal Health Record (PHR) system has attracted intensive
attention due to its universal accessibility and low cost. The practical deployment of PHR …
attention due to its universal accessibility and low cost. The practical deployment of PHR …
Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications
The ever-growing number of Internet connected devices poses several cybersecurity risks.
Most of the exchanged data between the Internet of Things (IoT) devices are not adequately …
Most of the exchanged data between the Internet of Things (IoT) devices are not adequately …
LH-ABSC: A lightweight hybrid attribute-based signcryption scheme for cloud-fog-assisted IoT
One of the best ways to deal with the massive data generated by the Internet of Things (IoT)
is storing them in the cloud. However, outsourced storage raises some security and privacy …
is storing them in the cloud. However, outsourced storage raises some security and privacy …
Analysis of attribute‐based cryptographic techniques and their application to protect cloud services
S Belguith, N Kaaniche… - Transactions on …, 2022 - Wiley Online Library
Recent technological advances such as the internet of things, fog computing, and cloud
applications lead to exponential growth in the amount of generated data. Indeed, cloud …
applications lead to exponential growth in the amount of generated data. Indeed, cloud …
Efficient privacy-preserving access control scheme in electronic health records system
Y Ming, T Zhang - Sensors, 2018 - mdpi.com
The sharing of electronic health records (EHR) in cloud servers is an increasingly important
development that can improve the efficiency of medical systems. However, there are several …
development that can improve the efficiency of medical systems. However, there are several …
Ciphertext-policy attribute-based signcryption with verifiable outsourced designcryption for sharing personal health records
F Deng, Y Wang, L Peng, H Xiong, J Geng… - IEEE Access, 2018 - ieeexplore.ieee.org
Personal health record (PHR) is a patient-centric model of health information exchange,
which greatly facilitates the storage, access, and share of personal health information. In …
which greatly facilitates the storage, access, and share of personal health information. In …
Designing attribute-based verifiable data storage and retrieval scheme in cloud computing environment
The cloud computing technology is a novel storage and computing paradigm that enables
individuals and organizations to store data, share data with intended group of users and …
individuals and organizations to store data, share data with intended group of users and …