2022
DOI: 10.1149/10701.4905ecst
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Deployed PHR Using ABE Scheme

Abstract: Personal health record (PHR) is a patient’s personal health information where a patient can store and maintain his personal health details in a cloud server which is a third party. Therefore, security and sharing of personal health information is a concern from parties like cloud server and unauthorized users. It is very important for a patient to have full control on their personal PHRs, hence it is important that PHRs have to be encrypted before outsourcing them to cyber service provider. In this paper, anal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 22 publications
(25 reference statements)
0
1
0
Order By: Relevance
“…Moreover, ABE serves as a prevalent privacy protection method, playing a crucial role in safeguarding personal privacy and ensuring the secure communication of data in various domains such as cloud computing, medical insurance, intelligent transportation, and the Internet of Things. For instance, Zhang et al [5] surveyed various ABE-based techniques for securing cloud data, Rasori et al [6] proposed a KP-ABE scheme against the potential threat of malicious attacks of untrustworthy cloud servers, Kumar et al [7] researched how to combine IoT with ABE to protect user privacy, and Jaiswal et al [8] compared and analyzed various ABE schemes in medical privacy scenarios. In addition, there has been a plethora of research related to privacy protection, such as the adoption of the secure encryption random permutation pseudo algorithm (SERPPA) to enhance network security and energy efficiency [9], investigations into ABE in the post-quantum era [10], and the development of privacy-preserving schemes in federated learning [11], among others.…”
Section: Attribute-based Encryptionmentioning
confidence: 99%
“…Moreover, ABE serves as a prevalent privacy protection method, playing a crucial role in safeguarding personal privacy and ensuring the secure communication of data in various domains such as cloud computing, medical insurance, intelligent transportation, and the Internet of Things. For instance, Zhang et al [5] surveyed various ABE-based techniques for securing cloud data, Rasori et al [6] proposed a KP-ABE scheme against the potential threat of malicious attacks of untrustworthy cloud servers, Kumar et al [7] researched how to combine IoT with ABE to protect user privacy, and Jaiswal et al [8] compared and analyzed various ABE schemes in medical privacy scenarios. In addition, there has been a plethora of research related to privacy protection, such as the adoption of the secure encryption random permutation pseudo algorithm (SERPPA) to enhance network security and energy efficiency [9], investigations into ABE in the post-quantum era [10], and the development of privacy-preserving schemes in federated learning [11], among others.…”
Section: Attribute-based Encryptionmentioning
confidence: 99%