2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE C 2019
DOI: 10.1109/ithings/greencom/cpscom/smartdata.2019.00123
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving Computations over Healthcare Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…• Homomorphic encryption: Healthcare data can be analyzed in encrypted form to preserve privacy while valuable insights can be extracted [130]. • Anti-man-in-the-middle and anti-replay attack security attributes: Blockchain-based solution can prevent personal health data tampering and protect privacy effectively [131].…”
Section: Legal and Technologicalmentioning
confidence: 99%
“…• Homomorphic encryption: Healthcare data can be analyzed in encrypted form to preserve privacy while valuable insights can be extracted [130]. • Anti-man-in-the-middle and anti-replay attack security attributes: Blockchain-based solution can prevent personal health data tampering and protect privacy effectively [131].…”
Section: Legal and Technologicalmentioning
confidence: 99%
“…In 2019, Wang et al [18] combined homomorphic encryption and proxy reencrytion technology to implement outsourcing computing solutions in healthcare systems. In this solution, there are several clients with different public keys, an electronic medical cloud platform, and an auxiliary cloud server.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, intending to protect patients' sensitive data while the smart health platform needs to do some analysis over these data, researchers Wang et al [60] proposed a privacy-preserving outsourced computation scheme in the healthcare system. ey enhanced the security of this scheme by splitting the decryption permissions into both servers.…”
Section: Centralized Architecturementioning
confidence: 99%