2017
DOI: 10.1109/access.2017.2707584
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced <italic>Architecture</italic> for <italic>Privacy Preserving</italic> Data Integration in a Medical Research Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…To guarantee the security and data privacy over a patient's data, we should implement a smart storage method which include the smart IoT-based healthcare architecture is discussed in [27]. Other solutions for sharing delicate medical data on several methods like medical data accumulation of non-standard diagonal method was suggested in [28], sharing of medical data with a cloud-based model used in [29], a hybrid solution of sharing medical data in [30,31], storage structure of scalable privacy with data preserving scheme [32], a secure system using a fog computation technique in [33], and a distributed based architecture with doubles tag micro aggregation scheme in [34] are implemented. The main problems among these techniques are computational complexity and more time consumption.…”
Section: Related Workmentioning
confidence: 99%
“…To guarantee the security and data privacy over a patient's data, we should implement a smart storage method which include the smart IoT-based healthcare architecture is discussed in [27]. Other solutions for sharing delicate medical data on several methods like medical data accumulation of non-standard diagonal method was suggested in [28], sharing of medical data with a cloud-based model used in [29], a hybrid solution of sharing medical data in [30,31], storage structure of scalable privacy with data preserving scheme [32], a secure system using a fog computation technique in [33], and a distributed based architecture with doubles tag micro aggregation scheme in [34] are implemented. The main problems among these techniques are computational complexity and more time consumption.…”
Section: Related Workmentioning
confidence: 99%
“…1 shows the literature survey of block chain. The hybrid adaptive crypto cloud framework by combining blockchain technology and botnet Wang et al [25] To encrypt the data, and provide an effective privacy protection technique called Elliptic Curve Cryptography (ECC) Sun et al [26] To enhance privacy by preserving the distributed protocol for data aggregation based on blockchain and homomorphic encryption Anjana et al [27] Adaptive light weight encryption algorithm for securing multi-cloud storage Jabeen et al [28] Detection of threats in blockchain…”
Section: Review Of Literaturementioning
confidence: 99%
“…An enhanced architecture for privacy-preserving data integration in a medical research environment has been proposed by Jabeen et al (2017). The reversible pseudonym technique is used in which artificial identifiers replace data records.…”
Section: Literature Surveymentioning
confidence: 99%