Shen et al., 2023 - Google Patents
A certificateless provable data possession scheme for cloud-based EHRsShen et al., 2023
- Document ID
- 5098161889035296739
- Author
- Shen J
- Zeng P
- Choo K
- Li C
- Publication year
- Publication venue
- ieee transactions on information forensics and security
External Links
Snippet
Electronic health records (EHRs: digital collections of patient health status and diagnosis) are generally shared, analyzed and stored on cloud servers. One operational challenge is to ensure that EHRs are stored correctly, for example using provable data possession (PDP) …
- 239000003550 marker 0 abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/34—Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tian et al. | Blockchain-based secure deduplication and shared auditing in decentralized storage | |
Zhang et al. | CIPPPA: Conditional identity privacy-preserving public auditing for cloud-based WBANs against malicious auditors | |
Shen et al. | A certificateless provable data possession scheme for cloud-based EHRs | |
Yang et al. | An efficient identity-based provable data possession protocol with compressed cloud storage | |
Hahn et al. | Enabling fast public auditing and data dynamics in cloud services | |
Li et al. | A Blockchain‐Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors | |
Tian et al. | Public auditing for trusted cloud storage services | |
Zhang et al. | Redactable transactions in consortium blockchain: Controlled by multi-authority CP-ABE | |
Li et al. | Algebraic signature-based public data integrity batch verification for cloud-IoT | |
Mishra et al. | Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment | |
Zhou et al. | An efficient and secure data integrity auditing scheme with traceability for cloud-based EMR | |
Liang et al. | Towards blockchain empowered trusted and accountable data sharing and collaboration in mobile healthcare applications | |
Deng et al. | Certificateless provable data possession scheme with provable security in the standard model suitable for cloud storage | |
Xu et al. | Data tag replacement algorithm for data integrity verification in cloud storage | |
Mishra et al. | Enabling efficient deduplication and secure decentralized public auditing for cloud storage: A redactable blockchain approach | |
Shen et al. | Multicopy and multiserver provable data possession for cloud-based IoT | |
Xu et al. | FileDES: a secure, scalable and succinct decentralized encrypted storage network | |
Yan et al. | Offline/Online Outsourced Attribute‐Based Encryption with Partial Policy Hidden for the Internet of Things | |
Mishra et al. | BB-tree based secure and dynamic public auditing convergence for cloud storage | |
Ba et al. | A Blockchain‐Based CP‐ABE Scheme with Partially Hidden Access Structures | |
CN113656829A (en) | Medical data security sharing method based on lattice code and alliance chain | |
Li et al. | IPOR: An efficient IDA-based proof of retrievability scheme for cloud storage systems | |
Xu et al. | A generic integrity verification algorithm of version files for cloud deduplication data storage | |
Ding et al. | An efficient integrity checking scheme with full identity anonymity for cloud data sharing | |
CN114398648B (en) | Practical cloud storage method and system supporting dynamic operation and multi-user storage certification |