2022
DOI: 10.1007/s11277-022-09666-2
|View full text |Cite
|
Sign up to set email alerts
|

Multi-data Multi-user End to End Encryption for Electronic Health Records Data Security in Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…Technology companies must assess regulatory requirements and develop solutions that proactively embed compliance. Concurrently, innovations such as blockchain aim to revolutionize how medical data moves between parties through a fresh paradigm emphasizing security and effectiveness [33]. However, existing regulations may not necessarily accommodate such complex technologies.…”
Section: Compliance With Regulationsmentioning
confidence: 99%
See 3 more Smart Citations
“…Technology companies must assess regulatory requirements and develop solutions that proactively embed compliance. Concurrently, innovations such as blockchain aim to revolutionize how medical data moves between parties through a fresh paradigm emphasizing security and effectiveness [33]. However, existing regulations may not necessarily accommodate such complex technologies.…”
Section: Compliance With Regulationsmentioning
confidence: 99%
“…Reliable cybersecurity, including user authentication and authorization, is important. An effective framework incorporates standards like ISO/TS 18308, HIPAA, and authentication-based access control to regulate EHR access [10], [33]. Properly implementing this framework can help mitigate vulnerabilities in securing patient data [26], [27].…”
Section: User Authentication and Authorization Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…When intimate and informative images, like medical, forensic, personal, etc., are stored in the cloud, it is essential to provide privacy and security to those images [1]. This can be achieved using steganography or encryption [2].…”
Section: Introductionmentioning
confidence: 99%