2020
DOI: 10.1109/access.2020.2968078
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Expressive Access Control With Revocation for Privacy of PHR Based on OBDD Access Structure

Abstract: With the advancement of information and communication technology (ICT), the medical sector is undergoing a massive transformation. Health records are being digitized, stored remotely in the cloud and shared with different stakeholders. However, the use of the cloud for personal health record (PHR) storage presents data security and privacy challenges. Ciphertext-policy attribute-based encryption (CP-ABE) is being widely studied for fine-grained access control of PHRs in the cloud. Expressiveness, efficiency an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…It enables individual to track their medical record that is stored in the cloud. Further, to strengthen the data security different policy-based schemes such as attribute-based systems, attribute-based encryption, cipher text policy, interplanetary file systems, and blockchain technology [14][15][16][17] have been introduced. Even though such schemes in PHR provide high security, its high cost renders as unaffordable for the common public especially for the low income group.…”
Section: A Secure Access Schemes Of Digital Health Recordmentioning
confidence: 99%
See 1 more Smart Citation
“…It enables individual to track their medical record that is stored in the cloud. Further, to strengthen the data security different policy-based schemes such as attribute-based systems, attribute-based encryption, cipher text policy, interplanetary file systems, and blockchain technology [14][15][16][17] have been introduced. Even though such schemes in PHR provide high security, its high cost renders as unaffordable for the common public especially for the low income group.…”
Section: A Secure Access Schemes Of Digital Health Recordmentioning
confidence: 99%
“…1. The lead-lag counter logic initiates the first stage to perform the round operation for rounds (0-11) followed by the remaining round (12)(13)(14)(15)(16)(17)(18)(19)(20)(21)(22)(23) by the second stage. For the subsequent rounds 'counter 1' leads and the 'counter 2' lags.…”
Section: B Sha-3 Architecture Reviewmentioning
confidence: 99%