Security and privacy-preserving challenges of e-health solutions in cloud computing
A systematic and comprehensive review of security and privacy-preserving challenges in e-
health solutions indicates various privacy preserving approaches to ensure privacy and …
health solutions indicates various privacy preserving approaches to ensure privacy and …
Security and privacy in cloud-based e-health system
R Sivan, ZA Zukarnain - Symmetry, 2021 - mdpi.com
Cloud based healthcare computing have changed the face of healthcare in many ways. The
main advantages of cloud computing in healthcare are scalability of the required service and …
main advantages of cloud computing in healthcare are scalability of the required service and …
A lightweight privacy-preserving CNN feature extraction framework for mobile sensing
The proliferation of various mobile devices equipped with cameras results in an exponential
growth of the amount of images. Recent advances in the deep learning with convolutional …
growth of the amount of images. Recent advances in the deep learning with convolutional …
Fuzzy labeled private set intersection with applications to private {Real-Time} biometric search
The explosive growth of biometrics use (eg, in surveillance) poses a persistent challenge to
keep biometric data private without sacrificing the apps' functionality. We consider private …
keep biometric data private without sacrificing the apps' functionality. We consider private …
A novel 1D chaotic system for image encryption, authentication and compression in cloud
H Li, C Yu, X Wang - Multimedia Tools and Applications, 2021 - Springer
To solve the privacy image problem stored in cloud, we propose a compressive sensing
(CS) based image compression, authentication, encryption algorithm in cloud, which can …
(CS) based image compression, authentication, encryption algorithm in cloud, which can …
Deep secure quantization: On secure biometric hashing against similarity-based attacks
The widespread application of biometric recognition has emerged solid protection on the
privacy of biometric templates. Non-invertible transformations such as random projections …
privacy of biometric templates. Non-invertible transformations such as random projections …
Utilizing transfer learning and homomorphic encryption in a privacy preserving and secure biometric recognition system
Biometric verification systems have become prevalent in the modern world with the wide
usage of smartphones. These systems heavily rely on storing the sensitive biometric data on …
usage of smartphones. These systems heavily rely on storing the sensitive biometric data on …
Biometric identification on the cloud: a more secure and faster construction
Cloud-assisted biometric identification can benefit data owners with limited resources by
offloading their storage and identification tasks to cloud servers with abundant resources …
offloading their storage and identification tasks to cloud servers with abundant resources …
Pay as how you behave: A truthful incentive mechanism for mobile crowdsensing
Mobile crowdsensing (MCS) is widely applied in large-scale distributed networks for
collecting sensing data from workers. In an MCS system, workers are recruited to complete …
collecting sensing data from workers. In an MCS system, workers are recruited to complete …
An efficient biometric identification in cloud computing with enhanced privacy security
Biometric identification has developed rapidly in recent years because of its convenience
and reliability. Due to the sensitivity of biometric data, many privacy-preserving biometric …
and reliability. Due to the sensitivity of biometric data, many privacy-preserving biometric …