2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications 2013
DOI: 10.1109/bwcca.2013.142
|View full text |Cite
|
Sign up to set email alerts
|

Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management

Abstract: Recently introduced, Attribute-based encryption (ABE) is a promising cryptographic method proposed by Sahai and Waters. This technique provides means for designing scalable and ne-grained access control. In ABE, data are encrypted with an access structure which is the logical expression of the access policy (eg: the data can be accessed by physician in cardiology division or by nurses). The cyphertext (encrypted data) can be decrypted by any user if his secret key has attributes that satisfy the access policy.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Lounis et al [7] presented an architecture based on attribute-based encryption (ABE), as shown in Figure 5. Since emergency access is temporary, it is crucial to revoke access rights given.…”
Section: Access Controlmentioning
confidence: 99%
“…Lounis et al [7] presented an architecture based on attribute-based encryption (ABE), as shown in Figure 5. Since emergency access is temporary, it is crucial to revoke access rights given.…”
Section: Access Controlmentioning
confidence: 99%
“…Literature in [1,2,[14][15][16] proposed outsourcing decryption strategies that assumed that the data storage center had sufficient computing power and enough energy. The user sends its transformed secret key to data center.…”
Section: Previous Workmentioning
confidence: 99%
“…With the rapid growth of networking and computing technology, outsourcing decryption [1] has become a reality. Security of outsourcing decrypted data in wireless sensor networks (WSNs) has received much attention in recent years [2]. Sensor nodes in WSN can be randomly deployed in various environments, such as military surveillance, target tracking, health care, real-time monitoring system, etc.…”
Section: Introductionmentioning
confidence: 99%
“…There exists also a number of architectures that employ Attribute-Based encryption (ABE) scheme [14][15][16]19,27]. However, these approaches have several limitations.…”
Section: Existing Approachesmentioning
confidence: 99%