2021
DOI: 10.3390/healthcare9111551
|View full text |Cite
|
Sign up to set email alerts
|

Morton Filter-Based Security Mechanism for Healthcare System in Cloud Computing

Abstract: Electronic health records contain the patient’s sensitive information. If these data are acquired by a malicious user, it will not only cause the pilferage of the patient’s personal data but also affect the diagnosis and treatment. One of the most challenging tasks in cloud-based healthcare systems is to provide security and privacy to electronic health records. Various probabilistic data structures and watermarking techniques were used in the cloud-based healthcare systems to secure patient’s data. Most of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 61 publications
0
3
0
Order By: Relevance
“…However, their scheme doesn’t fulfil all the security functionalities for participants. Bhatia and Malhotra [ 7 ] proposed a scheme based on Morton filters using cloud computing. They claimed that most of the security schemes for patient diagnosis are designed on cuckoo or bloom filters, which suffer from security and privacy issues.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…However, their scheme doesn’t fulfil all the security functionalities for participants. Bhatia and Malhotra [ 7 ] proposed a scheme based on Morton filters using cloud computing. They claimed that most of the security schemes for patient diagnosis are designed on cuckoo or bloom filters, which suffer from security and privacy issues.…”
Section: Literature Surveymentioning
confidence: 99%
“…Patients’ concerns about losing their privacy are a significant hurdle to adopting cloud-based healthcare systems since they may feel uneasy and lack confidence in the service providers to keep their identities a secret. The transmission of patient information through an insecure internet needs to be secure, and patient privacy is preserved [ 7 ]. Thus, a public cloud server’s stored medical information system needs a strong authentication technique to protect accessibility, confidence, and authenticity [ 8 ].…”
Section: Introductionmentioning
confidence: 99%
“…However, cloud security has vulnerabilities to computer attacks; to address this, they recommend combining it with blockchain technology. Meanwhile, Bhatia and Malhotra [56], strengthen security in the cloud with mechanisms for secure storage of data in health systems, which replace the shortcomings of existing approaches to conventional cloud security. Moreover, Al-Zumia et al [57], consider that cloud computing offers advantages in terms of having powerful computing capabilities and large storage resources.…”
mentioning
confidence: 99%