[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Fugkeaw et al., 2024 - Google Patents

Secure and Fine-grained Access Control with Optimized Revocation for Outsourced IoT EHRs With Adaptive Load-Sharing in Fog-Assisted Cloud Environment

Fugkeaw et al., 2024

View PDF
Document ID
17235797241054509564
Author
Fugkeaw S
Gupta R
Worapaluk K
Publication year
Publication venue
IEEE Access

External Links

Snippet

With the employment of IoT technology and cloud computing in healthcare, outsourcing Electronic Health Records (EHRs) generated by IoT devices becomes the critical issue. In fact, as EHRs may be collected by different units within a hospital and traverse intranet or …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer

Similar Documents

Publication Publication Date Title
Michalas The lord of the shares: Combining attribute-based encryption and searchable encryption for flexible data sharing
Sajid et al. Data privacy in cloud-assisted healthcare systems: state of the art and future challenges
Han et al. A data sharing protocol to minimize security and privacy risks of cloud storage in big data era
JP5562687B2 (en) Securing communications sent by a first user to a second user
WO2020119258A1 (en) Data processing method and device
KR102219277B1 (en) System and method for controlling the delivery of authenticated content
Praveena et al. Ensuring data security in cloud based social networks
Ahmad et al. Hybrid cryptographic approach to enhance the mode of key management system in cloud environment
Sharma et al. Blockchain-based decentralized architecture for cloud storage system
Darwish et al. Decentralizing privacy implementation at cloud storage using blockchain-based hybrid algorithm
Meisami et al. Combining blockchain and IOT for decentralized healthcare data management
Bhandari et al. A framework for data security and storage in Cloud Computing
Wang et al. Secure‐aware and privacy‐preserving electronic health record searching in cloud environment
Xiong et al. A secure re‐encryption scheme for data services in a cloud computing environment
Gajmal et al. Blockchain-based access control and data sharing mechanism in cloud decentralized storage system
Neela et al. An improved RSA technique with efficient data integrity verification for outsourcing database in cloud
Michalas et al. Healthshare: Using attribute-based encryption for secure data sharing between multiple clouds
Xu et al. Secure deduplication for big data with efficient dynamic ownership updates
Ramachandran et al. Secure and efficient data forwarding in untrusted cloud environment
Nie et al. Time‐enabled and verifiable secure search for blockchain‐empowered electronic health record sharing in IoT
Diwan et al. Blockchain assisted encryption scheme for intellectual share estimation using medical research data
Sunil Kumar et al. A Data Privacy Approach Using Shamir’s Secret Scheme in Permissioned Blockchain
Fugkeaw et al. Secure and Fine-grained Access Control with Optimized Revocation for Outsourced IoT EHRs With Adaptive Load-Sharing in Fog-Assisted Cloud Environment
Abouali et al. Patient full control over secured medical records transfer framework based on blockchain
Shaheen Application of Attribute-Based Encryption in Fog Infrastructure for Securing Health Related Data