2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC) 2016
DOI: 10.1109/icdipc.2016.7470795
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced e-health framework for security and privacy in healthcare system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(20 citation statements)
references
References 9 publications
0
20
0
Order By: Relevance
“…It is only a theoretical approach, no practical [63] Group signatures Maintain anonymity of signer No practical solution for the efficient searching, link-ability problem not solved [79] Bilinear pairing Fast and efficient Low expansion rate - [83] GDC + TSA Service delay minimization Privacy preservation Capable of reducing traffic analysis attacks Not suitable for more complicated circumstances dealing with different requirements for privacy preservation and arbitrary medical requests [86] MACSM + ACLSM Offers high dependability, effectiveness, trustworthiness Gives flexible authentication to patient's e-health data Information controlled by stakeholders and provides mechanisms for critical and difficult circumstances.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…It is only a theoretical approach, no practical [63] Group signatures Maintain anonymity of signer No practical solution for the efficient searching, link-ability problem not solved [79] Bilinear pairing Fast and efficient Low expansion rate - [83] GDC + TSA Service delay minimization Privacy preservation Capable of reducing traffic analysis attacks Not suitable for more complicated circumstances dealing with different requirements for privacy preservation and arbitrary medical requests [86] MACSM + ACLSM Offers high dependability, effectiveness, trustworthiness Gives flexible authentication to patient's e-health data Information controlled by stakeholders and provides mechanisms for critical and difficult circumstances.…”
Section: Resultsmentioning
confidence: 99%
“…After all the findings for cloud-based e-health system security we would like to recommend to consider the papers ( [68], [78], [81], [82], [85]) on blockchain-based mechanism as it is more trending in recent days, the papers ( [74], [75], [76], [80]) on biometric-based mechanism for mobile devices. If anyone considering cryptographic methods for securing cloud-based e-health system then they should consider the papers ( [27], [30], [31], [42], [43], [63], [64] for AES based), ( [43], [64], [69] for RSA based) and ( [38], [42], [51], [53], [63], [65] for ABE based) hybrid system.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…This gives rise to the application of cryptographic techniques over cloudbased eHealth systems. At present, the cryptographic techniques such as Role-based access control (RBAC) and Attribute based Encryption (ABE) is prevalent among cloud-based e-health systems [2,3]. RBAC is the traditional access control model that grants user access provision depending upon the role of the data users.…”
Section: Introductionmentioning
confidence: 99%
“…Further, it applies the technique of attribute based searchable encryption through which the key pairing complexities are reduced. In [21,22], a precise description of Ehealth cloud architecture and its working is provided. Depending upon the nature of the EHR the architecture for E-health clouds is divided into two types such as distributed and cloud based architectures.…”
Section: Introductionmentioning
confidence: 99%