2014
DOI: 10.1007/s11227-014-1253-3
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-aware attribute-based PHR sharing with user accountability in cloud computing

Abstract: Aquesta és una còpia de la versió author's final draft d'un article publicat a la revista Journal of supercomputing. Abstract As an emerging patient-centric model of health information exchange, personal health record (PHR) is often outsourced to be stored at a third party. The value of PHR data is its long-term cumulative record relevant with personal health which can be significant in the future when faced with disease occurrences. As a promising public key primitive, attribute-based encryption (ABE) has bee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 51 publications
(29 citation statements)
references
References 23 publications
0
28
0
1
Order By: Relevance
“…But they [8][9] also consider the privacy of the GID. Recently, Xhafa et al [10] proposed a privacyaware MA-ABE PHR scheme that incorporates user accountability in cloud computing. In the scheme, the access policy is hidden to protect the patient's privacy.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…But they [8][9] also consider the privacy of the GID. Recently, Xhafa et al [10] proposed a privacyaware MA-ABE PHR scheme that incorporates user accountability in cloud computing. In the scheme, the access policy is hidden to protect the patient's privacy.…”
Section: Related Workmentioning
confidence: 99%
“…As shown in Table 3 and Table 4, we compare our scheme with the previous methods [8,10,11,[15][16][17]19] in terms of system function, communication cost and security model. The function includes whether it supports multiple authorities, privacy protection and dynamic policy updating.…”
Section: Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Attribute‐based access control systems based on ABE were proposed in for secure cloud storage. There are also many works proposed to make further improvements on ABE, such as ABE with user accountability and expressive ABE . Although having various attractive features, most of the earlier CP‐ABE schemes only support a single attribute authority, which is not desirable in that users' attributes often are issued by different authorities in practice.…”
Section: Introductionmentioning
confidence: 99%