2017 International Conference on Innovations in Green Energy and Healthcare Technologies (IGEHT) 2017
DOI: 10.1109/igeht.2017.8094085
|View full text |Cite
|
Sign up to set email alerts
|

Prevention of personal data in cloud computing using bio-metric

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…After all the findings for cloud-based e-health system security we would like to recommend to consider the papers ( [68], [78], [81], [82], [85]) on blockchain-based mechanism as it is more trending in recent days, the papers ( [74], [75], [76], [80]) on biometric-based mechanism for mobile devices. If anyone considering cryptographic methods for securing cloud-based e-health system then they should consider the papers ( [27], [30], [31], [42], [43], [63], [64] for AES based), ( [43], [64], [69] for RSA based) and ( [38], [42], [51], [53], [63], [65] for ABE based) hybrid system.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…After all the findings for cloud-based e-health system security we would like to recommend to consider the papers ( [68], [78], [81], [82], [85]) on blockchain-based mechanism as it is more trending in recent days, the papers ( [74], [75], [76], [80]) on biometric-based mechanism for mobile devices. If anyone considering cryptographic methods for securing cloud-based e-health system then they should consider the papers ( [27], [30], [31], [42], [43], [63], [64] for AES based), ( [43], [64], [69] for RSA based) and ( [38], [42], [51], [53], [63], [65] for ABE based) hybrid system.…”
Section: Discussionmentioning
confidence: 99%
“…For encryption of the files, the RC4 algorithm is used. Some of the prevention techniques for Cross-site request forgery (CSRF) and Cross-site scripting (XSS) attacks considered are the use of web-application firewalls, protection of cookie details and checking of the validation of user input [74]. The proposed biometricbased architecture of paper [74] is shown in figure (4).…”
Section: Biometric-based Techniquesmentioning
confidence: 99%
See 1 more Smart Citation