2019
DOI: 10.1007/978-3-030-20005-3_8
|View full text |Cite
|
Sign up to set email alerts
|

Toward an Privacy Protection Based on Access Control Model in Hybrid Cloud for Healthcare Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 43 publications
(18 citation statements)
references
References 16 publications
0
18
0
Order By: Relevance
“…To improve the security of the system, the authors build an anonymous data sharing environment and encrypt the patient's personal data before storing them on cloud servers. Similarly, Du et al [1] and Son et al [24] used medical centers (i.e., hospitals) to store data and manage access and those hospitals. Specifically, they categorize two types of medical data protection policies: global for all data shared outside of the medical center, and local, which is accessed only by individuals at the medical center.…”
Section: Related Workmentioning
confidence: 99%
“…To improve the security of the system, the authors build an anonymous data sharing environment and encrypt the patient's personal data before storing them on cloud servers. Similarly, Du et al [1] and Son et al [24] used medical centers (i.e., hospitals) to store data and manage access and those hospitals. Specifically, they categorize two types of medical data protection policies: global for all data shared outside of the medical center, and local, which is accessed only by individuals at the medical center.…”
Section: Related Workmentioning
confidence: 99%
“…There are several blockchain-based approaches in terms of healthcare/blood donation management systems. For example, Du et al [17] and Son et al [18] used medical centers (i.e., hospitals) to store data and manage access and those hospitals. Specifically, they categorize two types of medical data protection policies: global for all data shared outside of the medical center, and local, which is accessed only by individuals at the medical center.…”
Section: A Healthcare Systems Based On Blockchain Technologymentioning
confidence: 99%
“…Integrity check was done by the data owner or a third party auditing by using RSA and MD5 (Rivest-Shamir-Adleman and Message Digest algorithm 5) cryptographic algorithm to avoid overwhelming workload for the data owner. [15] developed an authorization system to implement network security and protect sensitive data of each patient. The system is an access control model in hybrid cloud for healthcare systems, which handled security vulnerabilities.…”
Section: Literature Reviewmentioning
confidence: 99%