Fugkeaw et al., 2024 - Google Patents
Secure and Fine-grained Access Control with Optimized Revocation for Outsourced IoT EHRs With Adaptive Load-Sharing in Fog-Assisted Cloud EnvironmentFugkeaw et al., 2024
View PDF- Document ID
- 17235797241054509564
- Author
- Fugkeaw S
- Gupta R
- Worapaluk K
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
With the employment of IoT technology and cloud computing in healthcare, outsourcing Electronic Health Records (EHRs) generated by IoT devices becomes the critical issue. In fact, as EHRs may be collected by different units within a hospital and traverse intranet or …
- 230000003044 adaptive effect 0 title abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Michalas | The lord of the shares: Combining attribute-based encryption and searchable encryption for flexible data sharing | |
Sajid et al. | Data privacy in cloud-assisted healthcare systems: state of the art and future challenges | |
Han et al. | A data sharing protocol to minimize security and privacy risks of cloud storage in big data era | |
JP5562687B2 (en) | Securing communications sent by a first user to a second user | |
WO2020119258A1 (en) | Data processing method and device | |
KR102219277B1 (en) | System and method for controlling the delivery of authenticated content | |
Praveena et al. | Ensuring data security in cloud based social networks | |
Ahmad et al. | Hybrid cryptographic approach to enhance the mode of key management system in cloud environment | |
Sharma et al. | Blockchain-based decentralized architecture for cloud storage system | |
Darwish et al. | Decentralizing privacy implementation at cloud storage using blockchain-based hybrid algorithm | |
Meisami et al. | Combining blockchain and IOT for decentralized healthcare data management | |
Bhandari et al. | A framework for data security and storage in Cloud Computing | |
Wang et al. | Secure‐aware and privacy‐preserving electronic health record searching in cloud environment | |
Xiong et al. | A secure re‐encryption scheme for data services in a cloud computing environment | |
Gajmal et al. | Blockchain-based access control and data sharing mechanism in cloud decentralized storage system | |
Neela et al. | An improved RSA technique with efficient data integrity verification for outsourcing database in cloud | |
Michalas et al. | Healthshare: Using attribute-based encryption for secure data sharing between multiple clouds | |
Xu et al. | Secure deduplication for big data with efficient dynamic ownership updates | |
Ramachandran et al. | Secure and efficient data forwarding in untrusted cloud environment | |
Nie et al. | Time‐enabled and verifiable secure search for blockchain‐empowered electronic health record sharing in IoT | |
Diwan et al. | Blockchain assisted encryption scheme for intellectual share estimation using medical research data | |
Sunil Kumar et al. | A Data Privacy Approach Using Shamir’s Secret Scheme in Permissioned Blockchain | |
Fugkeaw et al. | Secure and Fine-grained Access Control with Optimized Revocation for Outsourced IoT EHRs With Adaptive Load-Sharing in Fog-Assisted Cloud Environment | |
Abouali et al. | Patient full control over secured medical records transfer framework based on blockchain | |
Shaheen | Application of Attribute-Based Encryption in Fog Infrastructure for Securing Health Related Data |