2021
DOI: 10.3389/fpubh.2021.688399
|View full text |Cite
|
Sign up to set email alerts
|

SCB-HC-ECC–Based Privacy Safeguard Protocol for Secure Cloud Storage of Smart Card–Based Health Care System

Abstract: The advent of the internet has brought an era of unprecedented connectivity between networked devices, making one distributed computing, called cloud computing, and popular. This has also resulted in a dire need for remote authentication schemes for transferring files of a sensitive nature, especially health-related information between patients, smart health cards, and cloud servers via smart health card solution providers. In this article, we elaborate on our proposed approach for such a system and accomplish… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 54 publications
0
3
0
Order By: Relevance
“…It is a method that determines the credentials of a user to access and obtain information [25], [26] Custom security checks…”
Section: Software Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…It is a method that determines the credentials of a user to access and obtain information [25], [26] Custom security checks…”
Section: Software Securitymentioning
confidence: 99%
“…Therefore, they consider that security solutions and authentication schemes are effective ways to address this problem. On the other hand, cloud computing is widely used in the healthcare sector, so it is especially important to implement the mechanism of a remote authentication scheme for secure transfer of confidential files, especially patient health information [26]. Similarly, the adoption of a security verification mechanism for medical devices, along with verified data security parameters and appropriate custom controls, is crucial to preventing cyber-attacks [27].…”
Section: Rq2: What Computer Security Mechanisms Are Most Commonly Imp...mentioning
confidence: 99%
“…Organizations usually use diversified protocols to encrypt their data and maintain confidentiality. Volume, heterogeneity of protocols, and encryption have posed several new challenges before the IDS system in detecting malicious activities (Resende & Drummond, 2018;Senthilkumar et al, 2021). An intruder attempts to gain unauthorized access to a system or network with malafide intentions and disrupt the normal execution (Butun et al, 2014;Liao et al, 2013;Low, 2005;Mitchell & Chen, 2014).…”
Section: Introductionmentioning
confidence: 99%