Khan et al., 2021 - Google Patents
Granular data access control with a patient-centric policy update for healthcareKhan et al., 2021
View HTML- Document ID
- 10436870781085299069
- Author
- Khan F
- Khan S
- Tahir S
- Ahmad J
- Tahir H
- Shah S
- Publication year
- Publication venue
- Sensors
External Links
Snippet
Healthcare is a multi-actor environment that requires independent actors to have a different view of the same data, hence leading to different access rights. Ciphertext Policy-Attribute- based Encryption (CP-ABE) provides a one-to-many access control mechanism by defining …
- 238000004458 analytical method 0 abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/22—Health care, e.g. hospitals; Social work
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fan et al. | A secure and verifiable outsourced access control scheme in fog-cloud computing | |
Obour Agyekum et al. | A secured proxy-based data sharing module in IoT environments using blockchain | |
Al-Dahhan et al. | Survey on revocation in ciphertext-policy attribute-based encryption | |
Fan et al. | Decentralized privacy-preserving data aggregation scheme for smart grid based on blockchain | |
Ismail et al. | Blockchain paradigm for healthcare: Performance evaluation | |
Wu et al. | Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing | |
Xiao et al. | A hybrid scheme for fine-grained search and access authorization in fog computing environment | |
Ming et al. | Efficient privacy-preserving access control scheme in electronic health records system | |
Alabdulkarim et al. | PPSDT: A novel privacy-preserving single decision tree algorithm for clinical decision-support systems using IoT devices | |
Luo et al. | Secure and efficient data sharing scheme based on certificateless hybrid signcryption for cloud storage | |
Khan et al. | Granular data access control with a patient-centric policy update for healthcare | |
Jiang et al. | EPPS: Efficient and privacy-preserving personal health information sharing in mobile healthcare social networks | |
Alsayegh et al. | Towards secure searchable electronic health records using consortium blockchain | |
Lin et al. | A multi-user ciphertext policy attribute-based encryption scheme with keyword search for medical cloud system | |
Ming et al. | Identity-based encryption with filtered equality test for smart city applications | |
Gupta et al. | Secured and privacy-preserving multi-authority access control system for cloud-based healthcare data sharing | |
Yin et al. | A key-policy searchable attribute-based encryption scheme for efficient keyword search and fine-grained access control over encrypted data | |
Ali et al. | Lightweight fine-grained access control for wireless body area networks | |
Lakhan et al. | Potent blockchain-enabled socket RPC Internet of Healthcare Things (IoHT) framework for medical enterprises | |
Yang et al. | Blockchain-based multiple authorities attribute-based encryption for EHR access control scheme | |
Kallapu et al. | Enhancing cloud communication security: a blockchain-powered framework with attribute-aware encryption | |
Ullah et al. | A multi-message multi-receiver signcryption scheme with edge computing for secure and reliable wireless internet of medical things communications | |
Guo et al. | Decentralized policy-hidden fine-grained redaction in blockchain-based IoT systems | |
Chae et al. | Practical time-release blockchain | |
Ren et al. | Clap-pre: certificateless autonomous path proxy re-encryption for data sharing in the cloud |