2020
DOI: 10.1007/s12652-020-02033-8
|View full text |Cite
|
Sign up to set email alerts
|

On developing dynamic and efficient cryptosystem for safeguarding healthcare data in public clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…For analyzing the security of this scheme, the different types of attacks have been considered for assessment, which includes side channel, authentication, brute-force, man-in-the-middle, and cloud malware. 27 Yet, this framework required to minimize the time consumption of key generation, encryption, and decryption operations.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For analyzing the security of this scheme, the different types of attacks have been considered for assessment, which includes side channel, authentication, brute-force, man-in-the-middle, and cloud malware. 27 Yet, this framework required to minimize the time consumption of key generation, encryption, and decryption operations.…”
Section: Related Workmentioning
confidence: 99%
“…The different modules involved in this work were registration phase, encryption, hash key generation, data storage, user authentication, auditing, data retrieval, and decryption. For analyzing the security of this scheme, the different types of attacks have been considered for assessment, which includes side channel, authentication, brute‐force, man‐in‐the‐middle, and cloud malware 27 . Yet, this framework required to minimize the time consumption of key generation, encryption, and decryption operations.…”
Section: Related Workmentioning
confidence: 99%
“…These issues are an obstacle that has moved back cloud determination and should be tended to in order to enable the trustworthiness of cloud structures. Fortunately, immense quantities of the best cloud providers in the market, for instance, Microsoft, Google, and Amazon have obligations to develop the best methodologies and practices to ensure about a customer’s data and assurance [ 111 , 112 ].…”
Section: Research Challengesmentioning
confidence: 99%
“…However, it exhibits a longer computational time while addressing the security issue. In [4], two robust and effective cryptosystems were created to ensure the safe storage and retrieval of medical data. These In [5], a novel cryptographic technique was presented to ensure data security analysis with reduced computing time.…”
Section: Introductionmentioning
confidence: 99%