2019
DOI: 10.1007/s10916-019-1301-x
|View full text |Cite
|
Sign up to set email alerts
|

Securing Personal Health Record System in Cloud Using User Usage Based Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…ABE has been employed in healthcare domain to address concerns relating to resource constrained client [5], doctor centric access control [6] and searchable trapdoor for hospital data [8,9] as seen from Table 1. However, existing schemes failed to grant patients with user-centric access control and policy update features as seen from Table 1.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…ABE has been employed in healthcare domain to address concerns relating to resource constrained client [5], doctor centric access control [6] and searchable trapdoor for hospital data [8,9] as seen from Table 1. However, existing schemes failed to grant patients with user-centric access control and policy update features as seen from Table 1.…”
Section: Related Workmentioning
confidence: 99%
“…In existing healthcare access control schemes [5][6][7][8][9], CP-ABE generates the same data for all users due to the fact that against every message a single ciphertext is generated and all the authorized users can have access to that same data. To elaborate, users satisfying individual attribute sets of a monotonic access policy in CP-ABE have access to the same data.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Dhina Suresh [28] proposed a framework for protecting the confidential information of patient which is stored in electronic health records by using ECC cryptographic algorithm.…”
Section: Related Workmentioning
confidence: 99%