2021
DOI: 10.1155/2021/9363824
|View full text |Cite|
|
Sign up to set email alerts
|

A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare

Abstract: Cloud computing aims to provide reliable, customized, and quality of service (QoS) guaranteed dynamic computing environments for end-users. However, there are applications such as e-health and emergency response monitoring that require quick response and low latency. Delays caused by transferring data over the cloud can seriously affect the performance and reliability of real-time applications. Before outsourcing e-health care data to the cloud, the user needs to perform encryption on these sensitive data to e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 61 publications
(114 reference statements)
0
2
0
Order By: Relevance
“…Some of the researchers also use the concept of paring free identity-based signature schemes [ 90 – 93 ]. A lightweight proxy re-encryption scheme with certificate-based and incremental cryptography for fog-enabled e-healthcare is proposed in [ 94 ].…”
Section: Related Workmentioning
confidence: 99%
“…Some of the researchers also use the concept of paring free identity-based signature schemes [ 90 – 93 ]. A lightweight proxy re-encryption scheme with certificate-based and incremental cryptography for fog-enabled e-healthcare is proposed in [ 94 ].…”
Section: Related Workmentioning
confidence: 99%
“…One of the ways in which reliability of such systems may be ensured is to guarantee the security of information flows. Information security can be described using such properties as: confidentiality, integrity, and availability [1], [2]. Compliance with these properties is ensured in ITS solutions, in particular, by the access control system allowing users to access or prohibiting them from accessing a given organization's resources [3].…”
Section: Introductionmentioning
confidence: 99%
“…Tis article has been retracted by Hindawi, as publisher, following an investigation undertaken by the publisher [1]. Tis investigation has uncovered evidence of systematic manipulation of the publication and peer-review process.…”
mentioning
confidence: 99%