2015
DOI: 10.1504/ijcnds.2015.069673
|View full text |Cite
|
Sign up to set email alerts
|

Making data in cloud secure and usable: fully homomorphic encryption with symmetric keys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…The need for a secure link across various medical care clouds increases as healthcare providers shift to local and public cloud-based services. Furthermore, compliance with protection and security standards is a laborious task for the medical care Information Technology (IT) framework because it is mandated by the Health Insurance Portability and Accountability Act (HIPAA) [6] and Health Information Technology for Economic and Clinical Health (HITECH) [7]. Additionally, with the growth of the Internet of Things (IoT) market and its integration into the enormous information cloud stage, there is increased concern about security and protection in the context of cloud-based medical services.…”
Section: Literature Surveymentioning
confidence: 99%
“…The need for a secure link across various medical care clouds increases as healthcare providers shift to local and public cloud-based services. Furthermore, compliance with protection and security standards is a laborious task for the medical care Information Technology (IT) framework because it is mandated by the Health Insurance Portability and Accountability Act (HIPAA) [6] and Health Information Technology for Economic and Clinical Health (HITECH) [7]. Additionally, with the growth of the Internet of Things (IoT) market and its integration into the enormous information cloud stage, there is increased concern about security and protection in the context of cloud-based medical services.…”
Section: Literature Surveymentioning
confidence: 99%
“…Authors in [42,43] emphasized on the need of symmetric FHE schemes because certain applications inherently need secret keys and proposed Fully Homomorphic schemes with symmetric keys based on matrix operations. The time complexity has been claimed to be linear in the security parameter λ.…”
Section: Gupta Et Al (2013 2014 2015)mentioning
confidence: 99%