Filters








3,180 Hits in 4.2 sec

Security and privacy in IoT communication

Jin Li, Xiaofeng Liao, Nicolas Puech
2019 Annales des télécommunications  
The article "Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things" describes a flexible keyword search scheme able to search over encrypted data in IoT  ...  Access control is a vital issue to ensure trust in the IoT, which makes security and privacy an increasing concern for users.  ...  The article "Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things" describes a flexible keyword search scheme able to search over encrypted data in IoT  ... 
doi:10.1007/s12243-019-00718-6 fatcat:dzkktnyp2ncnrodwvm5m7cum4a

Some Studies on Protection for the Hidden Attribute Based Signatures without Anonymity Revocation

S. Mahathi, M. Ravindar
2018 International Journal of Trend in Scientific Research and Development  
In this paper, w access control system with privilege separation based on privacy protection. In the PS-ACS scheme, we divide the users into personal domain and public domain logically.  ...  The purpose of this paper is to study of access control scheme to protect users' privacy in cloud environment is of great significance.  ...  In this paper, we propose access control system (PS-ACS), which is privilege separation based on privacy the analysis of cloud environment and the characteristics of the user, we divide the users into  ... 
doi:10.31142/ijtsrd18575 fatcat:ohqqzgczzffv3easc67yut7m74

Security and Privacy-preserving Challenges of e-Health Solutions in Cloud Computing

Shekha Chenthara, Khandakar Ahmed, Hua Wang, Frank Whittaker
2019 IEEE Access  
A systematic and comprehensive review of security and privacy-preserving challenges in e-health solutions indicates various privacy preserving approaches to ensure privacy and security of electronic health  ...  We surveyed, investigated, and reviewed various aspects of several articles and identified the following tasks: 1) EHR security and privacy; 2) security and privacy requirements of e-health data in the  ...  Hui Cui for their valuable comments, suggestions and reviews.  ... 
doi:10.1109/access.2019.2919982 fatcat:3sawv3nb5ndnncdzzk5q2anuwq

2020 Index IEEE Transactions on Dependable and Secure Computing Vol. 17

2021 IEEE Transactions on Dependable and Secure Computing  
., +, TDSC May-June 2020 634-647 Privacy-Preserving Data Processing with Flexible Access Control.  ...  -Dec. 2020 1333-1344 Outsourcing Authenticated Outlier Mining for Outsourced Databases. Dong, B., +, TDSC March-April 2020 222-235 Privacy-Preserving Data Processing with Flexible Access Control.  ...  Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds and Efficient Algorithms. Inan, A., +, TDSC Jan.-Feb. 2020 194-207  ... 
doi:10.1109/tdsc.2020.3038615 fatcat:vzqqhgq3rrda3atviwpz65ch5e

Security and privacy of electronic health information systems

Elisa Bertino, Robert H. Deng, Xinyi Huang, Jianying Zhou
2015 International Journal of Information Security  
In addition, we sincerely thank the reviewers for their time and effort on reviewing papers and all authors for their contributions.  ...  Acknowledgments We would like to express our gratitude to the Editors of the Springer's International Journal of Information Security, for giving us the opportunity to prepare this special section.  ...  By using ABE to encrypt data, the proposed approach supports fine-grained access control, which makes it more practical and functional.  ... 
doi:10.1007/s10207-015-0303-z fatcat:luweugyn7fexjnrfaiyz62bqpy

Enhanced Homomorphic Re-Encryption using Laplacian for Preserving the Privacy in Big Data Analytics

2020 International journal of recent technology and engineering  
Homomorphic Re-Encryption to supports access control, processed cipher-text on encrypted data and ensure data confidentiality.  ...  Big data offers various services like storing sensitive, private data and maintaining the data. Big data users may upload encrypted data rather than raw data for preserving data.  ...  It employs two service providers to manage encrypted data and flexibly support Group access control on cipher text processing results with two-level Encryption, thus successfully achieves re-encryption  ... 
doi:10.35940/ijrte.d1012.1284s519 fatcat:75k2wib4vvgnpgblcbblmd7vdq

Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities

Ming Li, Shucheng Yu, Wenjing Lou, Y. Thomas Hou
2012 2012 32nd International Conference on Distributed Computing Systems Workshops  
In this position paper, we identify the importance and challenges of designing privacyassured, flexible and practically efficient search mechanisms for outsourced cloud data services.  ...  A full-fledged cloud data service should effectively support data utilization tasks, especially flexible data search functionalities, while simultaneously achieve user privacy assurance and meet practical  ...  The authors would like to thank the anonymous reviewers for their helpful comments. W. Lou is partly supported by NSF under Grant CNS-1155988, and Y. T.  ... 
doi:10.1109/icdcsw.2012.41 dblp:conf/icdcsw/LiYLH12 fatcat:etuikjcsv5dgbgoiya7rkms5je

A Comprehensive Survey on Security and Privacy for Electronic Health Data

Se-Ra Oh, Young-Duk Seo, Euijong Lee, Young-Gab Kim
2021 International Journal of Environmental Research and Public Health  
Therefore, the security and privacy issues associated with e-health data must be properly explored.  ...  In this paper, to investigate the security and privacy of e-health systems, we identified major components of the modern e-health systems (i.e., e-health data, medical devices, medical networks and edge  ...  [87] proposed a flexible access control model, break-the-glass access control (BTG-AC), for medical data in wireless medical sensor networks.  ... 
doi:10.3390/ijerph18189668 pmid:34574593 fatcat:nx7rjvy7tfczjbgmmpqgyiajuu

Genomic Privacy (Dagstuhl Seminar 13412)

Kay Hamacher, Jean Pierre Hubaux, Gene Tsudik, Marc Herbstritt
2014 Dagstuhl Reports  
The participants discussed many aspects of genomic privacy and jointly identified the main requirements and the possible technical solutions for protecting genomic data.  ...  Third, complex privacy issues can arise if DNA analysis is used for criminal investigations, epidemiological research, and personalized medicine purposes.  ...  Recommendation 1 : Use multilevel data anonymization. Anonymized data could be made public (after some obfuscation), whereas precise data can be made available with strict access control.  ... 
doi:10.4230/dagrep.3.10.25 dblp:journals/dagstuhl-reports/HamacherHT13 fatcat:6dndynmzsbfv7nt55hpqfuvd3a

MediCloud: Cloud Computing Services to Health Sector

Amit S., Rajan S.
2018 International Journal of Computer Applications  
There are good reasons for keeping medical data private and limiting the access. An employer may decide not to hire someone with certain diseases.  ...  E-healthcare systems are increasingly popular, a large amount of personal data for medical purpose are involved, and people start to realize that they would completely lose control over their personal  ...  There are good reasons for keeping medical data private and limiting the access. An employer may decide not to hire someone with certain diseases.  ... 
doi:10.5120/ijca2018916417 fatcat:i5o77svu3faxvmd2y6mc6ecekq

PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds

Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah Attia
2016 Proceedings of the 13th International Joint Conference on e-Business and Telecommunications  
Second, PAbAC preserves users' privacy, while hiding any identifying information used to satisfy the access control.  ...  In this paper, we propose PAbAC, a novel privacy preserving Attribute-based framework, that combines attribute-based encryption and attribute-based signature mechanisms for securely sharing outsourced  ...  ., 2012) presented a privacy preserving authenticated access control scheme for securing data in clouds based on an attribute based signature scheme.  ... 
doi:10.5220/0005968201330146 dblp:conf/secrypt/BelguithKJLA16 fatcat:ocqq2ychifcg3g26oz7x32yi6a

Ensuring Security and Privacy Preservation for Cloud Data Services

Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya
2016 ACM Computing Surveys  
We then dwell on existing protection solutions to achieve secure, dependable, and privacy-assured cloud data services including data search, data computation, data sharing, data storage, and data access  ...  With the rapid development of cloud computing, more and more enterprises/individuals are starting to outsource local data to the cloud servers.  ...  ., financial privacy, medical privacy, political privacy, and data privacy).  ... 
doi:10.1145/2906153 fatcat:c57iz6lswvfxbmhireksha35vm

Need of Security in Health Care Automation: Survey Report

Soniya Raghu
2019 International Journal for Research in Applied Science and Engineering Technology  
For privacy preservation some techniques are used in proposed work, these techniques are RBAC, and ABAC, which establishes a mitigation approach called RABAC, access matrix with RABAC is applied for the  ...  Presented work focused on privacy protection of electronic medical records in cloud environment. Therefore, data needs to be protected from intruders and attackers and should have private storage.  ...  Therefore, implementation is required for preserving health data from intruders and maintains privacy of health data.  ... 
doi:10.22214/ijraset.2019.5517 fatcat:j5nn643cyvbmzb2v3qk7hvvfpa

A comprehensive approach to privacy in the cloud-based Internet of Things

Martin Henze, Lars Hermerschmidt, Daniel Kerpen, Roger Häußling, Bernhard Rumpe, Klaus Wehrle
2016 Future generations computer systems  
We allow an individual user to enforce all her privacy requirements before any sensitive data is uploaded to the cloud, enable developers of cloud services to integrate privacy functionality already into  ...  the development process of cloud services, and offer users a transparent and adaptable interface for configuring their privacy requirements.  ...  Additionally, we would like to thank Anna Feininger and Marie Ludwig for their research assistance and especially Lukas Koschmieder for the prototypical implementation of our approach.  ... 
doi:10.1016/j.future.2015.09.016 fatcat:4sr6vxbct5girfvqxbedquwaiq

Preserving Privacy in Outsourced Database

Yung-Wang Lin, Li-Cheng Yang, Luon-Chang Lin, Yeong-Chin Chen
2014 International Journal of Computer and Communication Engineering  
The data rapidly increases with time. To deal massive data, or called big data, the idea of database as a service has been proposed.  ...  Also, they were proposed some popular secure models including discretionary access control and mandatory access control.  ...  Therefore, the new hospital should investigate the history of medical records of old hospital of the patients, and establish medical records of the Preserving Privacy in Outsourced Database Yung-Wang Lin  ... 
doi:10.7763/ijcce.2014.v3.350 fatcat:i3ufyyfbkrfo3ldqjtxmpz52hy
« Previous Showing results 1 — 15 out of 3,180 results