2020
DOI: 10.1109/access.2020.3001152
|View full text |Cite
|
Sign up to set email alerts
|

CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC

Abstract: Smart architecture is the concept to manage the facilities via internet utilization in a proper manner. There are various technologies used in smart architecture such as cloud computing, internet of things, green computing, automation and fog computing. Smart medical system (SMS) is one of the application used in architecture, which is based on communication networking along with sensor devices. In SMS, a doctor provides online treatment to patients with the help of cloud-based applications such as mobile devi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 73 publications
(52 citation statements)
references
References 66 publications
0
49
0
Order By: Relevance
“…erefore, keeping in view these measures/ calculations and computations, the storage overhead analysis of the proposed authentication protocol is shown in Table 4. Upon comparing it with Kumari et al [31], Rathore et al [32], Wu et al [33], and Amin et al [5], it proves different and fundamental security characteristics/objectives that are higher than those of the mentioned protocols. Graphically, the storage overhead analysis is shown in Figure 7.…”
Section: Storage-overheads Analysis and Comparisonmentioning
confidence: 76%
See 3 more Smart Citations
“…erefore, keeping in view these measures/ calculations and computations, the storage overhead analysis of the proposed authentication protocol is shown in Table 4. Upon comparing it with Kumari et al [31], Rathore et al [32], Wu et al [33], and Amin et al [5], it proves different and fundamental security characteristics/objectives that are higher than those of the mentioned protocols. Graphically, the storage overhead analysis is shown in Figure 7.…”
Section: Storage-overheads Analysis and Comparisonmentioning
confidence: 76%
“…Comparing the proposed scheme in terms of computation time complexity due to the experiment performed by phase 6t h + 1t ⊕ . e computation time complexity of the proposed scheme is slightly higher compared to [5,31,33], as shown in Table 5. e protocol presented by [31] is a minimum one-way hash time, but it has maximum exponential execution time, while the XOR time complexity is negligibly equal to zero.…”
Section: Computation Costs Analysis and Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…It establishes a mutually exclusive environment among patients, cloud servers, doctors, and healthcare centers, for preserving individual privacy and communication security. The cloud-based secure and efficient framework (CSEF) [34], establishes the session key among the pairs of doctor & cloud, patient & cloud, healthcare center & patient, and healthcare center & cloud, for the satisfaction of several security attributes.…”
Section: Cloud Computingmentioning
confidence: 99%