2023
DOI: 10.1109/access.2023.3288332
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Lightweight Blockchain-Enabled Access Control for Fog-Assisted IoT Cloud Based Electronic Medical Records Sharing

Abstract: As for the advancement of IoT and cloud computing in healthcare, outsourcing encrypted Electronic medical records (EMRs) created by the aggregation of medical treatment applications and health data collected from IoT devices enables high accessibility, effective collaboration, and zero computational operation cost. Current applications and research works generally concern the privacy of the finest EMRs that are encrypted with secure and lightweight cryptographic protocols before they are outsourced to the clou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(2 citation statements)
references
References 27 publications
0
0
0
Order By: Relevance
“…Still, this approach does not avoid the attacks during the data transmission process or the attacks on the external cloud storage servers. Based on this problem, some researchers have proposed using fog computing to avoid attackers' attacks during data transmission and on cloud servers, such as in literature [14]. Still, literature [14] does not achieve user and attribute revocation, which enables access control to the system.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Still, this approach does not avoid the attacks during the data transmission process or the attacks on the external cloud storage servers. Based on this problem, some researchers have proposed using fog computing to avoid attackers' attacks during data transmission and on cloud servers, such as in literature [14]. Still, literature [14] does not achieve user and attribute revocation, which enables access control to the system.…”
Section: Introductionmentioning
confidence: 99%
“…Based on this problem, some researchers have proposed using fog computing to avoid attackers' attacks during data transmission and on cloud servers, such as in literature [14]. Still, literature [14] does not achieve user and attribute revocation, which enables access control to the system. This paper proposes a new electronic medical record scheme that uses blockchain and IPFS technology to address the existing problems.…”
Section: Introductionmentioning
confidence: 99%