2019
DOI: 10.4018/ijisp.2019010105
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing

Abstract: Recently, the electronic heath record (EHR) has become the chosen method to maintain a patient's health information. The advancement of cloud computing enables users to access their data with flexibility, providing large storage capability at low costs, which encourages EHR maintainers to consider shifting from their own storage to the cloud. In cloud computing, it is no doubt that securing EHRs poses a gigantic challenge. Various security properties like access control, data privacy, and scalable access betwe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 34 publications
(14 citation statements)
references
References 18 publications
0
14
0
Order By: Relevance
“…The efforts made by authors were in a direction to propose an advance version of traditional intruder detection system. The obtained results have showed better performance and intelligent detection [14].…”
Section: Introductionmentioning
confidence: 88%
“…The efforts made by authors were in a direction to propose an advance version of traditional intruder detection system. The obtained results have showed better performance and intelligent detection [14].…”
Section: Introductionmentioning
confidence: 88%
“…As per P. Gautam and et al [19] they used Obfuscate Original Source Code and RSA code to consider security on the electronic heath record by cloud computing.…”
Section: Related Workmentioning
confidence: 99%
“…Standard symmetric encryption programs like the data encryption standard (DES) and the advanced encryption standard (AES) can achieve a very good level of guaranty. In spite of most of these algorithms are utilized for most data like a binary data, they are not to be perfect for real-time audio encryption due to the following reasons [1][2][3][4][5][6]:…”
Section: Introductionmentioning
confidence: 99%