2022
DOI: 10.3390/app122412720
|View full text |Cite
|
Sign up to set email alerts
|

A Localized Bloom Filter-Based CP-ABE in Smart Healthcare

Abstract: Wearable technology-supported cloud-based smart health (s-health) has emerged as a promising answer to increase the efficiency and quality of healthcare as a result of rapid improvements in Internet of Things (IoT) technologies. However, the issues of data security and privacy preservation have not been fully resolved. In recent years, ciphertext policy attribute-based encryption (CP-ABE), which was developed as a versatile and potent cryptographic fundamental to accomplish one-to-many encryption with fine-gra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…This scheme leverages password reverse firewalls to safeguard against backdoor attacks and enhances the efficiency of MA-CP-ABE through an online/offline approach, consequently reducing storage and computational burdens for users. Remamany et al [ 30 ] put forward a CP-ABE scheme based on Bloom filters. Within this scheme, the access policy is individually examined during the key generation process to ensure the integrity of access policies, thereby fortifying key security.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This scheme leverages password reverse firewalls to safeguard against backdoor attacks and enhances the efficiency of MA-CP-ABE through an online/offline approach, consequently reducing storage and computational burdens for users. Remamany et al [ 30 ] put forward a CP-ABE scheme based on Bloom filters. Within this scheme, the access policy is individually examined during the key generation process to ensure the integrity of access policies, thereby fortifying key security.…”
Section: Related Workmentioning
confidence: 99%
“…Although online/offline key generation techniques and cryptographic reverse firewalls, as seen in Refs. [ [29] , [30] , [31] ], can enhance the security of CP-ABE keys, preventing key leakage in an unreliable edge computing environment is an issue that needs additional attention. Additionally, while offloading some computational tasks to more powerful devices or cloud servers, as explored in Refs.…”
Section: Related Workmentioning
confidence: 99%