2016
DOI: 10.1109/mcc.2016.76
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Cryptographic Access Control for Cloud-Based EHR Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 61 publications
(34 citation statements)
references
References 13 publications
0
32
0
Order By: Relevance
“…Hybrid techniques represent combination of different complex cryptographic, access control, and data partitioning techniques. 2,9,24,34,35,[45][46][47][48][49][50][51][52][53][54][55][56][57][58][59] Privacy-aware anonymity-based techniques. Privacy-preserving techniques have different sanitization mechanisms to transform data into anonymized form.…”
Section: Ehr Privacy-preserving Techniques and Cloud Deployment Modelsmentioning
confidence: 99%
“…Hybrid techniques represent combination of different complex cryptographic, access control, and data partitioning techniques. 2,9,24,34,35,[45][46][47][48][49][50][51][52][53][54][55][56][57][58][59] Privacy-aware anonymity-based techniques. Privacy-preserving techniques have different sanitization mechanisms to transform data into anonymized form.…”
Section: Ehr Privacy-preserving Techniques and Cloud Deployment Modelsmentioning
confidence: 99%
“…Similar to [ 14 , 17 ], they propose a context-based access decision that adds the “Role Roaming” and the “Active Auditing” to the scheme. Also using an information segmentation approach to store EHR securely in the cloud environment, Premarathne et al [ 21 ] suggest the use of steganography-cryptography to index protected information. Also exploring context-based adaptions built upon RBAC, Bhatti et al [ 28 ] proposed encoding disclosure and privacy rules by using a declarative predicate-based syntax in the policy that is XML-based language they call X-GTRBAC.…”
Section: Literature Review Classificationmentioning
confidence: 99%
“… Access segmentation and interdomain/federation scenarios are needed. Record-dependent or attribute-based encryption using single or multiple trust supplier [ 15 , 21 , 24 , 33 ] is suggested. Fine granular authorization for better security policy representation either using semantic-, time-, or spatial-based approaches is advised [ 20 , 25 , 27 ].…”
Section: Rbac Current Security Trends and Limitations Mapped On Himentioning
confidence: 99%
“…The main concern of EHR system is to have simple structure of passwords and thus, attribute based or predicate based cryptographic algorithms are more suitable. Premarathne 2016 [12] addressed how to securely store and manage big EHR data, and how to ensure secure access to this data. To manage EHRs efficiently and securely, the author proposed a design based on steganography, which we use to hide confidential EHR data inside the ECG host data.…”
Section: Review Of Some Security Relatedmentioning
confidence: 99%