Companion Proceedings of The10th International Conference on Utility and Cloud Computing 2017
DOI: 10.1145/3147234.3148132
|View full text |Cite
|
Sign up to set email alerts
|

Secure NoSQL Based Medical Data Processing and Retrieval

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 12 publications
(15 citation statements)
references
References 11 publications
0
15
0
Order By: Relevance
“…Network performance is a crucial factor in any environment. Different applications and services running on the network equate to higher resource utilization and, in turn, can lead to network latency [41] [42] [43]. Since security mechanisms are invasive and consume processing and storage resources, analyzing their impact on network latency and Quality of Service (QoS) is necessary.…”
Section: Latency Analysismentioning
confidence: 99%
“…Network performance is a crucial factor in any environment. Different applications and services running on the network equate to higher resource utilization and, in turn, can lead to network latency [41] [42] [43]. Since security mechanisms are invasive and consume processing and storage resources, analyzing their impact on network latency and Quality of Service (QoS) is necessary.…”
Section: Latency Analysismentioning
confidence: 99%
“…• Brute Force Attack or Dictionary Attack This is the basic attack where the attacker will try all the combinations of the password to access the data of the users. Th e more length of the password the more time it will take for the user to hack/attack to guess the correct one [28].…”
Section: Authentication Attacksmentioning
confidence: 99%
“…During the Header mapping stage, the data processing stage defines and populates a collection to keep track of the headers and the files in which they are present while the data loading process is building the data dictionary. This metadata is particularly important during the retrieval stage [2,[21][22][23][24].…”
Section: Privacy Preserving Data Extractions Transmissions and Loadingsmentioning
confidence: 99%
“…However, data analysts have been struggling to gain insight from raw data because of the differences in data formats. Furthermore, data must be secured and privacy-assured despite the continuous addition of more data including those that are de-identified but still protected personal health records [2]. Currently, a transdisciplinary team is in the process of implementing a secure system to convert these data and store these various data formats in the MongoDB database for further analysis of the TTU EXPOSOME Project data.…”
Section: Introductionmentioning
confidence: 99%