2021
DOI: 10.1007/s12652-021-02942-2
|View full text |Cite
|
Sign up to set email alerts
|

HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 41 publications
(13 citation statements)
references
References 48 publications
0
13
0
Order By: Relevance
“…The vehicle nodes were grouped optimally using the LEACH technique, and the optimum dependability network analysis was The System Lifetime for quite a number of motor vehicles is depicted in figure 5. In comparison to AES, RSA and Hybrid [22], it shows that enhanced RSA algorithm with hashing algorithm performed best. Figures 6 and 7 depict the ideal ERSA-hash algorithm output (proposed).…”
Section: Reliability Analysismentioning
confidence: 99%
“…The vehicle nodes were grouped optimally using the LEACH technique, and the optimum dependability network analysis was The System Lifetime for quite a number of motor vehicles is depicted in figure 5. In comparison to AES, RSA and Hybrid [22], it shows that enhanced RSA algorithm with hashing algorithm performed best. Figures 6 and 7 depict the ideal ERSA-hash algorithm output (proposed).…”
Section: Reliability Analysismentioning
confidence: 99%
“…Cryptography based access control and data a security in cloud have been under constant research. [21] Proposed a new steganography-based access control model that used Improved Key generation scheme of RSA for encrypting data over cloud and substring indexing and keyword search mechanism for extracting the encrypted stored data. The research compared its proposed method with the proposed method and compare with existing cryptographic methods over New York State Department of Health dataset [21].…”
Section: Api and Access Control Literature Reviewmentioning
confidence: 99%
“…It provides critical services such as restricting unauthorized access, maintaining data integrity, and ensuring data availability. To ensure cloud security, security challenges must be addressed to take full advantage of this computing paradigm [35]. To deeply analyze the origins of unauthorized access in cloud computing systems regarding causation, we followed a proper research methodology.…”
Section: Problem Statementmentioning
confidence: 99%