2014
DOI: 10.1016/j.ins.2014.03.126
|View full text |Cite
|
Sign up to set email alerts
|

A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(26 citation statements)
references
References 10 publications
0
26
0
Order By: Relevance
“…Attribute-based Encryption [2, 11, 38, 39, 41-43, 43, 44, 48, 51] ( Hybrid Encryption [50] (1) Key generation = 3T 0 +T t , Data decryption = T r , 2014 Multivalued encryption [20] (1) Coverage time= CTFBT ≥ 1 1− ðþ N−1 and 'good, ' respectively [52]. In AYA [44], the efficiency analysis of C p-ABE algorithms is by comparison, using the Jpair library in terms of set time (ms), encryption time, and decryption time.…”
Section: Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Attribute-based Encryption [2, 11, 38, 39, 41-43, 43, 44, 48, 51] ( Hybrid Encryption [50] (1) Key generation = 3T 0 +T t , Data decryption = T r , 2014 Multivalued encryption [20] (1) Coverage time= CTFBT ≥ 1 1− ðþ N−1 and 'good, ' respectively [52]. In AYA [44], the efficiency analysis of C p-ABE algorithms is by comparison, using the Jpair library in terms of set time (ms), encryption time, and decryption time.…”
Section: Techniquesmentioning
confidence: 99%
“…While the importance of WBANs in healthcare is indubitable, the amount of data generated by these sensors is huge and demands more resources in terms of computation, memory, communication power, massive storage infrastructure, energy-efficient performance for processing, real-time monitoring, and data analysis [5,[7][8][9][10][11][12][13][14][15][16][17][18]. Cloud computing shows very promising progress in hosting the aforementioned resources as services over the Internet [10,19,20]. At present, IT professionals extend cloud computing to reduce the complexity and utilization of WBANs' resources.…”
Section: Introductionmentioning
confidence: 99%
“…The Message Authentication Code (MAC) provides such validation between sensor nodes and networks to establish a trustworthy communication. [19][26] [27] Fault Tolerance: one of the vital task of the WBAN'S system is to provide it's communication even if any fault appears.…”
Section: Security and Privacy Requirementsmentioning
confidence: 99%
“…The security problems in cloud-assisted WBSNs are also being studied by more and more researchers [62][63][64][65][66]. In [62], Zhou et al proposed a key management scheme for cloud-assisted WBSNs based on the Blom's symmetrical key.…”
Section: Related Workmentioning
confidence: 99%
“…Their schemes could resist two types of adversaries: the timebased adversaries and location-based adversaries. In [63], Han et al proposed a multivalued and ambiguous encryption scheme to ensure data confidentiality. In [64], Wan et al proposed a cloud-assisted WBSNs architecture to solve the problems including energy-efficient routing and cloud resource allocation; however, security properties were not achieved in their schemes.…”
Section: Related Workmentioning
confidence: 99%