2020
DOI: 10.1109/access.2020.2971088
|View full text |Cite
|
Sign up to set email alerts
|

A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms

Abstract: Recently, attribute-based keyword search (ABKS) schemes have been used to provide finegrained search over encrypted data on eHealth cloud in the Internet of Things (IoT) platforms. As compared to conventional public key encryption with keyword search (PEKS) schemes, ABKS schemes provide more powerful and flexible search operations which allow encrypted data to be retrieved by multiple users that satisfy set of attributes. However, there are still some limitations and security issues on the existing ABKS scheme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 40 publications
0
7
0
Order By: Relevance
“…Since the previous frame image is added with pseudorandom sequence and the latter frame image is subtracted with pseudorandom sequence, it has little impact on vision as a whole, which is the effect of hybrid complementarity. After complementary scrambling of the original image, the overall time domain and frequency domain are changed, which can also achieve the purpose of protecting the useful information of the image [23][24][25].…”
Section: Design Of Antileakage Methods Of Digital Videomentioning
confidence: 99%
“…Since the previous frame image is added with pseudorandom sequence and the latter frame image is subtracted with pseudorandom sequence, it has little impact on vision as a whole, which is the effect of hybrid complementarity. After complementary scrambling of the original image, the overall time domain and frequency domain are changed, which can also achieve the purpose of protecting the useful information of the image [23][24][25].…”
Section: Design Of Antileakage Methods Of Digital Videomentioning
confidence: 99%
“…e IoT awareness layer is at the bottom of the IoT architecture. It consists of various sensors, a control unit, a network communication unit, and a smart door that accesses the sensors, collects data, and links the perception layer with the network layer [13,14]. Compared with the traditional Internet, IoT has its distinctive characteristics: it is a ubiquitous network built on the Internet, and it is a wideranging application of various technological concepts.…”
Section: Technical Frameworkmentioning
confidence: 99%
“…Ewellbeing is a developing area at the crossroads of clinical informatics, general well-being, and industry, relating to well-being administrations and knowledge communicated or enhanced through the Internet and related technologies. [10][11][12][13] The word represents a specialized turn of events from a more detailed viewpoint, but also a perspective, a demeanor, and a duty for coordinated, national speculation to enhance patient care through the use of information and communication technologies locally, territorially, and internationally [14].…”
Section: Methodsmentioning
confidence: 99%