[HTML][HTML] Security and privacy challenges in mobile cloud computing: Survey and way ahead

MB Mollah, MAK Azad, A Vasilakos - Journal of Network and Computer …, 2017 - Elsevier
The rapid growth of mobile computing is seriously challenged by the resource constrained
mobile devices. However, the growth of mobile computing can be enhanced by integrating …

Secondary use of electronic health record: Opportunities and challenges

SM Shah, RA Khan - IEEE access, 2020 - ieeexplore.ieee.org
In the present technological era, healthcare providers generate huge amounts of clinical
data on a daily basis. Generated clinical data is stored digitally in the form of Electronic …

Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system

BB Gupta, KC Li, VCM Leung… - IEEE/CAA Journal of …, 2021 - ieeexplore.ieee.org
The concept of sharing of personal health data over cloud storage in a healthcare-cyber
physical system has become popular in recent times as it improves access quality. The …

[HTML][HTML] Blockchain based searchable encryption for electronic health record sharing

L Chen, WK Lee, CC Chang, KKR Choo… - Future generation …, 2019 - Elsevier
Data leakage in electronic health records (EHRs) could result in the compromise of patient
privacy (eg medical conditions). Generally most data in EHRs remain unchanged once they …

Blockchain-based secure storage and access scheme for electronic medical records in IPFS

J Sun, X Yao, S Wang, Y Wu - IEEE access, 2020 - ieeexplore.ieee.org
Electronic medical records can help people prevent diseases, improve cure rates, provide a
significant basis for medical institutions and pharmaceutical companies, and provide legal …

Design of secure and lightweight authentication protocol for wearable devices environment

AK Das, M Wazid, N Kumar, MK Khan… - IEEE journal of …, 2017 - ieeexplore.ieee.org
Wearable devices are used in various applications to collect information including step
information, sleeping cycles, workout statistics, and health-related information. Due to the …

HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud

P Chinnasamy, P Deepalakshmi - Journal of Ambient Intelligence and …, 2022 - Springer
Technology that is perfect is free of vulnerability. Technological growth offers users online
data storage and access to it from anywhere. Cloud computing is a model that provides data …

Distributed memetic algorithm for outsourced database fragmentation

YF Ge, WJ Yu, J Cao, H Wang, ZH Zhan… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Data privacy and utility are two essential requirements in outsourced data storage.
Traditional techniques for sensitive data protection, such as data encryption, affect the …

[HTML][HTML] A smartphone-based wearable sensors for monitoring real-time physiological data

I You, KKR Choo, CL Ho - Computers & Electrical Engineering, 2018 - Elsevier
Abstract Recently, Wireless Body Sensor Networks (WBSNs) have been popularly employed
to measure people's physiological parameters, particularly for disease monitoring …

Healthcare-related data in the cloud: Challenges and opportunities

V Casola, A Castiglione, KKR Choo… - IEEE cloud …, 2016 - ieeexplore.ieee.org
A key issue in electronic health systems is the underlying security and privacy risk. For
example, confidential patient information or medical records ending up in the hands of a …