Security and privacy-preserving challenges of e-health solutions in cloud computing

S Chenthara, K Ahmed, H Wang, F Whittaker - IEEE access, 2019 - ieeexplore.ieee.org
A systematic and comprehensive review of security and privacy-preserving challenges in e-
health solutions indicates various privacy preserving approaches to ensure privacy and …

[HTML][HTML] Security and privacy in cloud-based e-health system

R Sivan, ZA Zukarnain - Symmetry, 2021 - mdpi.com
Cloud based healthcare computing have changed the face of healthcare in many ways. The
main advantages of cloud computing in healthcare are scalability of the required service and …

Efficient and privacy-enhanced federated learning for industrial artificial intelligence

M Hao, H Li, X Luo, G Xu, H Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
By leveraging deep learning-based technologies, industrial artificial intelligence (IAI) has
been applied to solve various industrial challenging problems in Industry 4.0. However, for …

Blockchain-based public integrity verification for cloud storage against procrastinating auditors

Y Zhang, C Xu, X Lin, X Shen - IEEE Transactions on Cloud …, 2019 - ieeexplore.ieee.org
The deployment of cloud storage services has significant benefits in managing data for
users. However, it also causes many security concerns, and one of them is data integrity …

MedShare: A privacy-preserving medical data sharing system by using blockchain

M Wang, Y Guo, C Zhang, C Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Electronic Health Record (EHR) and its privacy have attracted widespread attention with the
development of the healthcare industry in recent years. As locking medical data in a single …

Enabling efficient and geometric range query with access control over encrypted spatial data

G Xu, H Li, Y Dai, K Yang, X Lin - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As a basic query function, range query has been exploited in many scenarios such as SQL
retrieves, location-based services, and computational geometry. Meanwhile, with explosive …

[PDF][PDF] Cloud data encryption and authentication based on enhanced Merkle hash tree method.

JS Jayaprakash, K Balasubramanian… - … Materials & Continua, 2022 - cdn.techscience.cn
Many organizations apply cloud computing to store and effectively process data for various
applications. The user uploads the data in the cloud has less security due to the unreliable …

HealthDep: An efficient and secure deduplication scheme for cloud-assisted eHealth systems

Y Zhang, C Xu, H Li, K Yang, J Zhou… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we analyze the inherent characteristic of electronic medical records (EMRs)
from actual electronic health (eHealth) systems, where we found that first, multiple patients …

A secure and verifiable data sharing scheme based on blockchain in vehicular social networks

K Fan, Q Pan, K Zhang, Y Bai, S Sun… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The vehicular social networks (VSNs) supports diverse kinds of services such as traffic
management, road safety, and sharing data (videos, audios, roads photos, air quality, and …

A secure cryptocurrency scheme based on post-quantum blockchain

YL Gao, XB Chen, YL Chen, Y Sun, XX Niu… - Ieee …, 2018 - ieeexplore.ieee.org
Nowadays, blockchain has become one of the most cutting-edge technologies, which has
been widely concerned and researched. However, the quantum computing attack seriously …