2023
DOI: 10.3390/electronics12122646
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Cloud Enabled Access Control Model for Preserving the Security and Privacy of Medical Big Data

Abstract: In the context of healthcare, big data refers to a complex compilation of digital medical data collected from many sources that are difficult to manage with normal technology and software due to its size and complexity. These big data are useful in various aspects of healthcare, such as disease diagnosis, early prevention of diseases, and predicting epidemics. Even though medical big data has many advantages and a lot of potential for revolutionizing healthcare, it also has a lot of drawbacks and problems, of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 69 publications
0
0
0
Order By: Relevance
“…However, due to the introduction of multi-attribute authorization center CP-ABE and DMA-ABS algorithms in this scheme, data owners and data users will bear higher encryption and decryption costs, and the outsourcing of encryption and decryption needs to be studied in the future. Al-Kahani et al [9] proposed a rule-based model for automatic user-role assignment (RB-RBAC), which dynamically assigns roles to users using a finite set of rules based on the attributes owned by users and the constraints preset by the enterprise. However, the model only considers the user attributes, but does not consider the object attributes and environment attributes, so it lacks certain flexibility.…”
Section: Status Of Researchmentioning
confidence: 99%
“…However, due to the introduction of multi-attribute authorization center CP-ABE and DMA-ABS algorithms in this scheme, data owners and data users will bear higher encryption and decryption costs, and the outsourcing of encryption and decryption needs to be studied in the future. Al-Kahani et al [9] proposed a rule-based model for automatic user-role assignment (RB-RBAC), which dynamically assigns roles to users using a finite set of rules based on the attributes owned by users and the constraints preset by the enterprise. However, the model only considers the user attributes, but does not consider the object attributes and environment attributes, so it lacks certain flexibility.…”
Section: Status Of Researchmentioning
confidence: 99%