2014
DOI: 10.14257/ijsia.2014.8.3.25
|View full text |Cite
|
Sign up to set email alerts
|

Security System for Healthcare Data in Cloud Computing

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
7
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…Louk et.al. [2] proposed the constructive idea of Healthcare data via cloud computing and the security accessing data by authorized individuals. This paper also described security elements like monitoring, recording, tracking and notification.…”
Section: International Journal Of Engineering Research and Technology (mentioning
confidence: 99%
See 1 more Smart Citation
“…Louk et.al. [2] proposed the constructive idea of Healthcare data via cloud computing and the security accessing data by authorized individuals. This paper also described security elements like monitoring, recording, tracking and notification.…”
Section: International Journal Of Engineering Research and Technology (mentioning
confidence: 99%
“…These systems provide a platform for sharing medical information systems, infrastructure and applications in a format with the ability to provide automatic subscription. Since cloud computing shares distributed resources via the network in the open environment, thus security problems are important issues to address by developing application programs which will secure to work best for medical purposes [2]. In cloud computing performance, availability and security are main research topics.…”
Section: Introductionmentioning
confidence: 99%
“…A public cloud can be accessed by other users, because the cloud does not provide available storage space as a personal storage environment. This causes problems, such as a malicious user accessing and abusing another user's data for their own benefit [2][3][4]. This decreases the reliability of the cloud service providers, which would eventually lead to fewer cloud users.…”
Section: Introductionmentioning
confidence: 99%
“…Reencryption data is used to tag and mark data that is to be saved in cloud storage. Any untagged person will be unable to access the data since no authorization is given [8].…”
mentioning
confidence: 99%
“…This encryption system takes into consideration authorization so as to avoid repudiation of information [8]. Its simplicity aids fast communication between both parties involved [2].…”
mentioning
confidence: 99%