2023
DOI: 10.32604/cmc.2023.034435
|View full text |Cite
|
Sign up to set email alerts
|

Severity Based Light-Weight Encryption Model for Secure Medical Information System

Abstract: As the amount of medical images transmitted over networks and kept on online servers continues to rise, the need to protect those images digitally is becoming increasingly important. However, due to the massive amounts of multimedia and medical pictures being exchanged, low computational complexity techniques have been developed. Most commonly used algorithms offer very little security and require a great deal of communication, all of which add to the high processing costs associated with using them. First, a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…This increases the difficulty of the task. Because of this, administration and monitoring solutions for the cloud that are at the leading edge of technology are required [33].…”
Section: Software As a Service (Saas)mentioning
confidence: 99%
“…This increases the difficulty of the task. Because of this, administration and monitoring solutions for the cloud that are at the leading edge of technology are required [33].…”
Section: Software As a Service (Saas)mentioning
confidence: 99%
“…Phishing is a technique that fraudsters employ to fool their victims into exposing confidential information or downloading malicious software on their computers, such as ransomware. This is a technique that thieves employ to steal money [41,42]. In recent years, phishing schemes have gotten so sophisticated that they often look to be clear mirror duplicates of the websites that they are trying to mimic.…”
Section: Background Theorymentioning
confidence: 99%
“…When data are encrypted, the risk of information being stolen while it is in transit is significantly reduced. The data that is being sent from your device to the cloud service may be encrypted while it is in transit to ensure its safety [104]. Information that is retained with a service provider may be protected against unauthorized access by using encryption while it is "at rest."…”
Section: Architecture and Organization Of Cloud And Information Storagementioning
confidence: 99%