[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Premarathne et al., 2016 - Google Patents

Hybrid cryptographic access control for cloud-based EHR systems

Premarathne et al., 2016

View PDF
Document ID
12355377315385412997
Author
Premarathne U
Abuadbba A
Alabdulatif A
Khalil I
Tari Z
Zomaya A
Buyya R
Publication year
Publication venue
IEEE Cloud Computing

External Links

Snippet

Cloud-based electronic health record (EHR) systems are next-generation big data systems for facilitating efficient and scalable storage and fostering collaborative care, clinical research, and development. Mobility and the use of multiple mobile devices in collaborative …
Continue reading at cloudbus.cis.unimelb.edu.au (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00

Similar Documents

Publication Publication Date Title
Premarathne et al. Hybrid cryptographic access control for cloud-based EHR systems
US11212268B2 (en) Method and system for identity and access management for blockchain interoperability
Azbeg et al. Access control and privacy-preserving blockchain-based system for diseases management
Pussewalage et al. Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions
Mohit et al. A standard mutual authentication protocol for cloud computing based health care system
US20190305955A1 (en) Push notification authentication
Vithanwattana et al. Developing a comprehensive information security framework for mHealth: a detailed analysis
Yu et al. Internet of Things security and privacy-preserving method through nodes differentiation, concrete cluster centers, multi-signature, and blockchain
Mahajan et al. Secure gene profile data processing using lightweight cryptography and blockchain
CN103780393A (en) Virtual-desktop security certification system and method facing multiple security levels
Han et al. Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices
CN114938382B (en) Electronic medical record safe and controllable sharing method based on alliance block chain
Singh et al. TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor
CN116318617B (en) Medical rescue material charity donation method based on RFID and blockchain
Sethia et al. CP-ABE for selective access with scalable revocation: A case study for mobile-based healthfolder.
Huang et al. Sharing medical data using a blockchain‐based secure EHR system for New Zealand
Jayabalan et al. A study on authentication factors in electronic health records
Perumal et al. Architectural framework of a group key management system for enhancing e‐healthcare data security
Wenhua et al. A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications
Mohammed et al. Efficient and flexible multi-factor authentication protocol based on fuzzy extractor of administrator’s fingerprint and smart mobile device
Barman et al. A blockchain‐based approach to secure electronic health records using fuzzy commitment scheme
Abbasi et al. A lightweight and robust authentication scheme for the healthcare system using public cloud server
Dhivya et al. Hybrid cryptographic access control for cloud based electronic health records systems
Shehu et al. Spidverify: A secure and privacy-preserving decentralised identity verification framework
Lei et al. A Secure Anonymous Authentication Scheme for Electronic Medical Records Systems