2019
DOI: 10.1007/s11042-019-7494-7
|View full text |Cite
|
Sign up to set email alerts
|

Design an attribute based health record protection algorithm for healthcare services in cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…Azath et al proposed Attribute based health record protection scheme for securing the data is established to reduce the administrational and computational load on health care system. The proposed scheme involved access control and privilege mode to encrypt the information and authenticate the message respectively to preserve the data [22]. Kashish et al proposed biometric authentication approach for securing the cloud health data was proposed through the neural network and named it as BAM HealthCloud.…”
Section: Related Workmentioning
confidence: 99%
“…Azath et al proposed Attribute based health record protection scheme for securing the data is established to reduce the administrational and computational load on health care system. The proposed scheme involved access control and privilege mode to encrypt the information and authenticate the message respectively to preserve the data [22]. Kashish et al proposed biometric authentication approach for securing the cloud health data was proposed through the neural network and named it as BAM HealthCloud.…”
Section: Related Workmentioning
confidence: 99%
“…The mathematical model is used to assess the transmission risk of COVID-19 in various facilities. The agent-based simulation model which is used to take better decision for prevention of COVID-19 [22,23]. The synergic deep model is used to learn and predict various metrics like duration of days, discharge disposition, and inpatient expense for total hip arthroplasty [24,25].…”
Section: Literature Reviewmentioning
confidence: 99%
“…ABE has also been proposed for the eHealth domain [7,13,12,6,20,17,5]. Greene et al [7] use KP-ABE to restrict access to health data, and additionally incorporate hash-chaining for time-based access control; however the scenario is different from ours and deals with data sharing from smart health devices to a cloud database.…”
Section: Related Workmentioning
confidence: 99%