2015
DOI: 10.1007/978-3-319-12817-7_24
|View full text |Cite
|
Sign up to set email alerts
|

A Secured Hybrid Cloud Architecture for mHealth Care

Abstract: Abstract. This chapter presents a secure mHealth application which is based on hybrid cloud architecture combined with cryptographic techniques to protect data privacy, integrity and security of patients and health care givers and with role based access control to authenticate and authorize cloud users. Hybrid cloud platform combines the advantages of both the private cloud which guarantees privacy and safety of data and the public cloud which provides a platform for reduced services costs. Integrating cryptog… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Identification is not a unique safety challenge in itself, but its persistence is to recognize handlers. Consequently, it caused to affect the way a handler can be authenticated [43]- [45]. Authentication, in turn, offers assurance that the demanding information access is reliable and effective [29] likewise have the claims of identity upon accessing [42].…”
Section: Requirements For Privacy In Healthcare Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…Identification is not a unique safety challenge in itself, but its persistence is to recognize handlers. Consequently, it caused to affect the way a handler can be authenticated [43]- [45]. Authentication, in turn, offers assurance that the demanding information access is reliable and effective [29] likewise have the claims of identity upon accessing [42].…”
Section: Requirements For Privacy In Healthcare Systemsmentioning
confidence: 99%
“…Authentication, in turn, offers assurance that the demanding information access is reliable and effective [29] likewise have the claims of identity upon accessing [42]. There should be assurance that the communication is with an approved personnel on the other side [43]. Lastly, the authorization procedure defines which quantity of data can be limited to an outsider upon the safety rules and policies.…”
Section: Requirements For Privacy In Healthcare Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…The private cloud just stores the homomorphic keys and, even if leaked, without user location information, the encrypted data stored in the public cloud cannot be deciphered. Nagaty et al [18] integrated cryptography and access control to secure data in the hybrid cloud. Access control information along with cryptography keys are stored in the private cloud without any security.…”
Section: Related Workmentioning
confidence: 99%