Filters








351 Hits in 4.6 sec

Fine-Grained Ranked Multi-Keyword Search over Hierarchical Data for IoT-oriented Health System

Jianfei Sun, Shengnan Hu, Xuyun Nie
2019 IEEE Access  
As a potential and promising solution, attribute-based keyword search (ABKS) can provide fine-grained keyword search and access control over the encrypted data at the same time.  ...  In this paper, to tackle these issues, we propose a fine-grained ranked multi-keyword search scheme over hierarchical data by leveraging ciphertext-policy hierarchical attribute-based encryption (CP-HABE  ...  ACKNOWLEDGMENT The authors are would like to thank the associate editor and reviewers for their invaluable suggestions.  ... 
doi:10.1109/access.2019.2928441 fatcat:xgg27b33ovdvha3qf2sfitnvgi

Integration of Hierarchical Access Control and Keyword Search Encryption in Cloud Computing Environment

Chih Hung Wang, Chia-Chun Hsu
2013 International Journal of Computer and Communication Engineering  
Index Terms-Cloud computing, keyword search encryption, hidden vector encryption, fine-grained access control.  ...  The proposed approach combines the fine-grained access control and keyword search encryption to provide multiple users' access controls in the cloud environment with encrypted data protection.  ...  We develop a conjunctive keyword search encryption with the property of the fine-grained data access control.  ... 
doi:10.7763/ijcce.2013.v2.199 fatcat:4yfu6gldyrcc3h3wimfxlwsjhe

Security and Privacy-preserving Challenges of e-Health Solutions in Cloud Computing

Shekha Chenthara, Khandakar Ahmed, Hua Wang, Frank Whittaker
2019 IEEE Access  
This paper highlights the research challenges and directions concerning cyber security to build a comprehensive security model for EHR.  ...  records (EHRs) in the cloud.  ...  Hui Cui for their valuable comments, suggestions and reviews.  ... 
doi:10.1109/access.2019.2919982 fatcat:3sawv3nb5ndnncdzzk5q2anuwq

A Lightweight Fine-Grained Search Scheme over Encrypted Data in Cloud-Assisted Wireless Body Area Networks

Mingsheng Cao, Luhan Wang, Zhiguang Qin, Chunwei Lou
2019 Wireless Communications and Mobile Computing  
However, security and privacy preserving of the collected data is a major challenge on resource-limited WBANs devices and the urgent need for fine-grained search and lightweight access.  ...  , of which the proposed scheme can provide resource-constraint end users with fine-grained keyword search and lightweight access simultaneously.  ...  Definition and Security Model of Lightweight Fine-Grained Keyword Search over Encrypted Data. The following algorithms are involved in our lightweight fine-grained keyword search system. (i) (1 , ).  ... 
doi:10.1155/2019/9340808 fatcat:p6x7if5n7rd3te3c5vlfrzflj4

A Lightweight Fine-Grained Searchable Encryption Scheme in Fog-Based Healthcare IoT Networks

Hui Li, Tao Jing
2019 Wireless Communications and Mobile Computing  
To address these, we design a lightweight keyword searchable encryption scheme with fine-grained access control for our proposed healthcare related IoT-Fog-Cloud framework.  ...  For the fog-based healthcare system, data confidentiality, access control, and secure searching over ciphertext are the key issues in sensitive data.  ...  Conclusion In this paper, we design a keyword searchable encryption with fine gained access control for our proposed healthcare related IoT-fog-cloud framework.  ... 
doi:10.1155/2019/1019767 fatcat:64a7o6563vh23nos72kvudbdfm

Attribute-based Encryption for Fine-Grained Access Control on Secure Hybrid Clouds

Sridhar Reddy Vulapula, Srinivas Malladi
2020 International Journal of Advanced Computer Science and Applications  
The distribution enforces fine-grained data access control using attribute-based encryption.  ...  While there has been ample work for the delivery of health data for some time now, it does not appear to be more effective in terms of both data retrieval and consideration for fine-grained access control  ...  Fuzzy keyword search is suggested along with fine-grained access control of encrypted data.  ... 
doi:10.14569/ijacsa.2020.0111047 fatcat:w5oqokj23jctpe4culdtcn6nmi

Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability

Yue Tong, Jinyuan Sun, Sherman S. M. Chow, Pan Li
2014 IEEE journal of biomedical and health informatics  
Specifically, we propose to integrate key management from pseudorandom number generator for unlinkability, a secure indexing method for privacypreserving keyword search which hides both search and access  ...  Motivated by the privacy issues, curbing the adoption of electronic healthcare systems and the wild success of cloud service models, we propose to build privacy into mobile healthcare systems with the  ...  [29] utilizes multiauthority attribute-based encryption (ABE) [31] , [32] proposed by Chase and Chow for fine-grained access control.  ... 
doi:10.1109/jbhi.2013.2294932 pmid:24608047 fatcat:jgbaouikt5dstp5hjzbn6qrd2u

A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment

Min Xiao, Jing Zhou, Xuejiao Liu, Mingda Jiang
2017 Sensors  
In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users.  ...  Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities  ...  [16, 34] applied ABE technique in [26] to construct the first attribute-based keyword search scheme (ABKS) for fine-grained (file-level) owner-enforced search authorization in multi-user setting.  ... 
doi:10.3390/s17061423 pmid:28629131 pmcid:PMC5492313 fatcat:jxct7d77qrby5k3ziqxe2rbf2m

Security and Privacy in the Medical Internet of Things: A Review

Wencheng Sun, Zhiping Cai, Yangyang Li, Fang Liu, Shengqun Fang, Guoyan Wang
2018 Security and Communication Networks  
cloud storage, which greatly increases the efficiency, convenience, and cost performance of healthcare.  ...  The security and privacy of the data collected from MIoT devices, either during their transmission to a cloud or while stored in a cloud, are major unsolved concerns.  ...  The major methods for searchable encryption include searchable symmetric encryption (SSE) and public-key encryption with keyword search (PEKS).  ... 
doi:10.1155/2018/5978636 fatcat:odfuofjixnf25cdi7haxinhyny

Blockchain-based personal health records sharing scheme with data integrity verifiable

Shangping Wang, Dan Zhang, Yaling Zhang
2019 IEEE Access  
and attribute-based encryption techniques to achieve privacy protection, keyword search, and fine-grained access control.  ...  Finally, performance evaluation and security analysis indicate that our scheme is secure and feasible for practical use.  ...  encryption, blockchain technology and smart contract are combined together to achieve privacy protection, keyword search, fine-grained access control and data integrity verification.  ... 
doi:10.1109/access.2019.2931531 fatcat:dppoeykf3zazvmc3r5l7cwtpne

Lightweight Sharable and Traceable Secure Mobile Health System

Yang Yang, Ximeng Liu, Robert H. Deng, Yingjiu Li
2017 IEEE Transactions on Dependable and Secure Computing  
then uploading the encrypted data to the cloud for storage and access by healthcare staff and researchers.  ...  LiST enables efficient keyword search and finegrained access control of encrypted data, supports tracing of traitors who sell their search and access privileges for monetary gain, and allows on-demand  ...  In addition to fine-grained access control, effective keyword search over encrypted EHRs is an extremely useful feature in practice.  ... 
doi:10.1109/tdsc.2017.2729556 fatcat:74cfh2ury5gztm2r6r4hxo46e4

m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting

Yinbin Miao, Jianfeng Ma, Ximeng Liu, Fushan Wei, Zhiquan Liu, Xu An Wang
2016 Journal of medical systems  
To this end, we design a secure cryptographic primitive called as attributebased multi-keyword search over encrypted personal health records in multi-owner setting to support both fine-grained access control  ...  and multi-keyword search via Ciphertext-Policy Attribute-Based Encryption.  ...  Different from existing schemes, our scheme supports fine-grained access control and multi-keyword search query in cloud storage.  ... 
doi:10.1007/s10916-016-0617-z pmid:27696175 fatcat:ut3erpuwbrbxxo772wram4blku

Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing

Yinbin Miao, Jianfeng Ma, Ximeng Liu, Xinghua Li, Qi Jiang, Junwei Zhang
2017 IEEE Transactions on Services Computing  
To this end, we also propose two improved schemes (ABKS-HD-I,ABKS-HD-II) for the sake of supporting multi-keyword search and user revocation, respectively.  ...  Formal security analysis proves that our schemes are secure against both chosen-plaintext attack (CPA) and chosen-keyword attack (CKA) in the random oracle model.  ...  For data security concerns, the encryption mechanism is used to prevent the cloud server from gaining the underlying knowledge of cloud data, while data encryption makes it impossible for cloud server  ... 
doi:10.1109/tsc.2017.2757467 fatcat:kyifdi2x4vfa3hoknjjiveeku4

A Comprehensive Survey on Security and Privacy for Electronic Health Data

Se-Ra Oh, Young-Duk Seo, Euijong Lee, Young-Gab Kim
2021 International Journal of Environmental Research and Public Health  
Recently, the integration of state-of-the-art technologies, such as modern sensors, networks, and cloud computing, has revolutionized the conventional healthcare system.  ...  In particular, edge and fog computing studies for e-health security and privacy were reviewed since the studies had mostly not been analyzed in other survey papers.  ...  [104] also proposed a privacy-preserving e-health data sharing scheme using SE with keyword range search and multiple keyword search.  ... 
doi:10.3390/ijerph18189668 pmid:34574593 fatcat:nx7rjvy7tfczjbgmmpqgyiajuu

Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure

Isma Masood, Yongli Wang, Ali Daud, Naif Radi Aljohani, Hassan Dawood
2018 Wireless Communications and Mobile Computing  
This amalgamation of WBANs systems and CC technology, as sensor-cloud infrastructure (S-CI), is aiding the healthcare domain through real-time monitoring of patients and the early diagnosis of diseases  ...  Hence, the distributed environment of S-CI presents new threats to patient data privacy and security. In this paper, we review the techniques for patient data privacy and security in S-CI.  ...  Acknowledgments This article has been awarded by the National Natural Science Foundation of China (61170035, 61272420, 81674099), the Fundamental Research Fund for the Central Universities (30916011328  ... 
doi:10.1155/2018/2143897 fatcat:23b3lgvnfzgshn5ipanmk46iwm
« Previous Showing results 1 — 15 out of 351 results