2021
DOI: 10.1007/978-981-16-2712-5_19
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Data Transfer in Cloud Environment Using Double-Layer Security for Internet of Medical Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 49 publications
0
1
0
Order By: Relevance
“…In this new approach, data mobility and data security are key issues (21). This problem leads to the invention of new security approaches like the double-layer security approach for data (22) and hiding schemes for medical images (23). Even though many methods are available for medical data security, EHR privacy and ownership are still the main issues, and data access is not controlled by patients.…”
Section: Background Work 21 Healthcare Data Securitymentioning
confidence: 99%
“…In this new approach, data mobility and data security are key issues (21). This problem leads to the invention of new security approaches like the double-layer security approach for data (22) and hiding schemes for medical images (23). Even though many methods are available for medical data security, EHR privacy and ownership are still the main issues, and data access is not controlled by patients.…”
Section: Background Work 21 Healthcare Data Securitymentioning
confidence: 99%