2021
DOI: 10.1002/dac.4909
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight and fine‐grained access control for cloud–fog‐based electronic medical record sharing systems

Abstract: Summary The electronic medical record (EMR) sharing systems promote medical services' efficiency, save human resources, and reduce energy consumption. A number of patients are ready to store their medical records in cloud. Nevertheless, owing to the medical record's privacy sensitivity, security problems are of critical importance in EMR sharing systems. This work presents a lightweight and fine‐grained access control with data security for EMR sharing by combining fog and cloud using symmetric encryption algo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…However, security is the primary concern for carrying on medical services through the wireless environment 8 . This key generation concept can avoid the third person in the cloud environment by locking the user details 9 . Hence, the closed details are only visible to the medical specialist who can have authenticated access 10 .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, security is the primary concern for carrying on medical services through the wireless environment 8 . This key generation concept can avoid the third person in the cloud environment by locking the user details 9 . Hence, the closed details are only visible to the medical specialist who can have authenticated access 10 .…”
Section: Introductionmentioning
confidence: 99%
“…8 This key generation concept can avoid Symbols and Abbreviations: DL, Deep learning; ML, Machine learning; IoT, Internet of Things; ABIDE, African buffalo-based International Data Encryption; CS, Cloud server; MRI, Magnetic resonance imaging; ABO, African buffalo optimization; IDE, International data encryption; SA-DS, Secure Authentication based data sharing; MWO, Modified whale optimization; a m n , General symptoms for each disease; n, Cloud database parameter; d p , The particular disease of the affected patient; z (1) 1 , z (2) 2 , z (3) 3 , z (4) 4 , Encryption process; h ′ , Hash function of the public cloud system; h d , Healthcare data card of the patient; r ′ , Randomly selected value; S ′ n , Medical data record; 𝛽 ′ , Actual healthcare information; 𝛼 ′ , Collected healthcare information; a ′ d , c ′ d , Healthcare information from the cloud database; P k+1 , Exploitation performance; e k , User detail; lg 1 F I G U R E 1 Public cryptosystem the third person in the cloud environment by locking the user details. 9 Hence, the closed details are only visible to the medical specialist who can have authenticated access. 10 The basic model of the cryptosystem is shown in Figure 1.…”
Section: Introductionmentioning
confidence: 99%