Security and privacy-preserving challenges of e-health solutions in cloud computing
A systematic and comprehensive review of security and privacy-preserving challenges in e-
health solutions indicates various privacy preserving approaches to ensure privacy and …
health solutions indicates various privacy preserving approaches to ensure privacy and …
[HTML][HTML] Security and privacy in cloud-based e-health system
R Sivan, ZA Zukarnain - Symmetry, 2021 - mdpi.com
Cloud based healthcare computing have changed the face of healthcare in many ways. The
main advantages of cloud computing in healthcare are scalability of the required service and …
main advantages of cloud computing in healthcare are scalability of the required service and …
Efficient and privacy-enhanced federated learning for industrial artificial intelligence
By leveraging deep learning-based technologies, industrial artificial intelligence (IAI) has
been applied to solve various industrial challenging problems in Industry 4.0. However, for …
been applied to solve various industrial challenging problems in Industry 4.0. However, for …
Blockchain-based public integrity verification for cloud storage against procrastinating auditors
The deployment of cloud storage services has significant benefits in managing data for
users. However, it also causes many security concerns, and one of them is data integrity …
users. However, it also causes many security concerns, and one of them is data integrity …
MedShare: A privacy-preserving medical data sharing system by using blockchain
Electronic Health Record (EHR) and its privacy have attracted widespread attention with the
development of the healthcare industry in recent years. As locking medical data in a single …
development of the healthcare industry in recent years. As locking medical data in a single …
Enabling efficient and geometric range query with access control over encrypted spatial data
As a basic query function, range query has been exploited in many scenarios such as SQL
retrieves, location-based services, and computational geometry. Meanwhile, with explosive …
retrieves, location-based services, and computational geometry. Meanwhile, with explosive …
[PDF][PDF] Cloud data encryption and authentication based on enhanced Merkle hash tree method.
JS Jayaprakash, K Balasubramanian… - … Materials & Continua, 2022 - cdn.techscience.cn
Many organizations apply cloud computing to store and effectively process data for various
applications. The user uploads the data in the cloud has less security due to the unreliable …
applications. The user uploads the data in the cloud has less security due to the unreliable …
HealthDep: An efficient and secure deduplication scheme for cloud-assisted eHealth systems
In this paper, we analyze the inherent characteristic of electronic medical records (EMRs)
from actual electronic health (eHealth) systems, where we found that first, multiple patients …
from actual electronic health (eHealth) systems, where we found that first, multiple patients …
A secure and verifiable data sharing scheme based on blockchain in vehicular social networks
The vehicular social networks (VSNs) supports diverse kinds of services such as traffic
management, road safety, and sharing data (videos, audios, roads photos, air quality, and …
management, road safety, and sharing data (videos, audios, roads photos, air quality, and …
A secure cryptocurrency scheme based on post-quantum blockchain
YL Gao, XB Chen, YL Chen, Y Sun, XX Niu… - Ieee …, 2018 - ieeexplore.ieee.org
Nowadays, blockchain has become one of the most cutting-edge technologies, which has
been widely concerned and researched. However, the quantum computing attack seriously …
been widely concerned and researched. However, the quantum computing attack seriously …