2018
DOI: 10.1109/jiot.2018.2825289
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
221
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 398 publications
(228 citation statements)
references
References 53 publications
1
221
0
Order By: Relevance
“…Although it does not consider access control, it shows the benefits of ABAC in IoT. Zhang et al use ABAC to code privacy rules for health applications . It encompasses the storage, use, and access of sensitive patient information.…”
Section: Related Workmentioning
confidence: 99%
“…Although it does not consider access control, it shows the benefits of ABAC in IoT. Zhang et al use ABAC to code privacy rules for health applications . It encompasses the storage, use, and access of sensitive patient information.…”
Section: Related Workmentioning
confidence: 99%
“…Setup algorithm, Encryption algorithm, Generate token algorithm, Check algorithm. [17] In this paper the flaws of traditional CP-ABE like revealing the confidential information have been overcome using PASH a privacy aware s-health access control system. In PASH the attribute values which are more sensitive are kept hidden in encrypted SHR and only attribute names are revealed through which it attains security in standard model.…”
Section: IImentioning
confidence: 99%
“…Compared with the traditionally fixed deployment sensing mode, the cloud-based mobile crowdsourcing has proven to be an attractive solution to provide data storage and share services for resource-limited mobile devices in a privacy preserving manner [3]. Mobile crowdsensing has been widely applied to environmental monitoring [4], intelligent traffic systems [5], social behavior analyses [6,7], urban management [6], public security [8] and other fields with the advantages of low deployment costs, simple maintenance, and excellent scalability.…”
Section: Introductionmentioning
confidence: 99%