2014
DOI: 10.1111/anec.12204
|View full text |Cite
|
Sign up to set email alerts
|

Cloud‐Based Privacy‐Preserving Remote ECG Monitoring and Surveillance

Abstract: We demonstrate that FHE could be used to securely transfer and analyze ambulatory health monitoring data. We present a unique concept that could represent a disruptive type of technology with broad applications to multiple monitoring devices. Future work will focus on performance optimizations to accelerate expansion to these other applications.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
47
0
2

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 63 publications
(49 citation statements)
references
References 16 publications
(13 reference statements)
0
47
0
2
Order By: Relevance
“…Koppel et al [25] Discusses cybersecurity issues and why some overly burdensome cybersecurity rules and regulations are prompting physicians to work around cyber safety measures to complete their work. [26] Analyzes cybersecurity within Telehealth technologies and how end-to-end encryption methods could make cloud storage and access of Protected Health Information (PHI) compatible with HIPAA requirements.…”
Section: Blanke and Mcgrady [13]mentioning
confidence: 99%
See 1 more Smart Citation
“…Koppel et al [25] Discusses cybersecurity issues and why some overly burdensome cybersecurity rules and regulations are prompting physicians to work around cyber safety measures to complete their work. [26] Analyzes cybersecurity within Telehealth technologies and how end-to-end encryption methods could make cloud storage and access of Protected Health Information (PHI) compatible with HIPAA requirements.…”
Section: Blanke and Mcgrady [13]mentioning
confidence: 99%
“…The most stressed security technique in the literature is proper employee training. Most security breaches are caused by employees accessing malicious files and most HIT security systems will not stop those kinds of breaches [20,25,26].…”
Section: Summary Of Evidencementioning
confidence: 99%
“…Hal inilah yang menyebabkan adanya modifikasi DES yang dikenal dengan Triple DES (kadang-kadang dikenal dengan 3DES). Terdapat dua varian 3DES yang dikenal dengan 3-key Triple DES (3TDES) dan 2-key Triple DES (2TDES) [7], [8].…”
Section: Triple Data Encryption Standard (3des)unclassified
“…Perubahan yang kecil pada plain text maupun kunci akan menyebabkan perubahan yang signifikan terhadap ciphertext yang dihasilkan. Suatu avalanche effect dikatakan baik jika perubahan bit yang dihasilkan berkisar antara 45% -60% [7]. Hal ini dikarenakan perubahan tersebut berarti membuat perbedaan yang cukup sulit untuk cryptanalist melakukan serangan.…”
Section: B Hasil Pengujian Dan Analisisunclassified
“…This proposed system of health care management is specially supposed to design as a Medical Home for older patients and this is equipped such that it can be a complete protection for the older patients even when they are in lone situations. For this Real time health status updating , Real time ECG [3], BP, Glucose level, temperature monitoring , Automatic wheel chair access facility , Medicine reminder , Panic switch facility, Automatic ambulance calling facility are provided. A password based main entrance lock system in the home only for near ones and ambulance crew is also designed.…”
Section: Introductionmentioning
confidence: 99%