3,463 Hits in 8.0 sec

Securing electronic health records with novel mobile encryption schemes

Dasun Weerasinghe, Kalid Elmufti, Muttukrishnan Rajarajan, Veselin Rakocevic
2007 International Journal of Electronic Healthcare  
., Rajarajan, M. and Rakocevic, V. (2007) 'Securing electronic health records with novel mobile encryption schemes ', Int. J.  ...  He has active research in mobile and wireless security with a special focus on healthcare.  ...  Susilo and Win (2006) have highlighted the importance of encrypting electronic health records in broadcast messages in their paper and they introduced a novel encryption method specifically for health  ... 
doi:10.1504/ijeh.2007.015320 pmid:18048274 fatcat:gx7ffshg4bdzjh7ez2z4b6s6i4

A Distributed Access Control with Outsourced Computation in Fog Computing

Qihua Wang, Huaqun Wang, Yufeng Wang, Rui Guo
2019 Security and Communication Networks  
Security and privacy for electronic health records are very important because the electronic health data which plays an important role in medical server and treatment is directly associated with a particular  ...  The security and privacy of electronic health records stored at date center or cloud server are not guaranteed. Before being sent to date center or cloud server, this data should be encrypted.  ...  Conclusions In this work, a distributed access control with outsourced encryption and decryption for electronic health records is introduced.  ... 
doi:10.1155/2019/6782753 fatcat:agjphugduvacdpstatkbzzcvby

Secure Management of Health Care Data using Cloud Computing

Dr. A. Radhakrishnan
2019 International Journal for Research in Applied Science and Engineering Technology  
Electronic health record of patients are kept and managed by medical institutions in their databases.  ...  The medical records which are entered are encrypted using Advanced Encryption Standard (AES-256) algorithm.  ...  CONCLUSION In this work, a cloud based electronic health records system has been designed and implemented.  ... 
doi:10.22214/ijraset.2019.3067 fatcat:626ibeqctfdonkoxzsljydpjiu

Efficient CP-ABE Attribute/Key Management for IoT Applications

Lyes Touati, Yacine Challal
2015 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing  
Personal health records are not the same as electronic health records or electronic medical records, which are owned and operated by doctors' offices, hospitals or health insurance plans.  ...  The Electronic personal health record systems remedy that problem by making patient's personal health record accessible to you anytime via a web enabled device, such as your computer, phone or tablet.  ...  electronic prescriptions, emergency information like blood group, medication history, and electronic health records.  ... 
doi:10.1109/cit/iucc/dasc/picom.2015.49 dblp:conf/IEEEcit/TouatiC15 fatcat:qveblfge4jbu7g43jpaip6tvwa

Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health

Shikha Mittal, Ankit Bansal, Deepali Gupta, Sapna Juneja, Hamza Turabieh, Mahmoud M Elarabawy, Ashish Sharma, Zelalem Kiros Bitsue, Ziya Uddin
2022 Computational Intelligence and Neuroscience  
In this paper, we propose a novel algorithm along with implementation details as an effective and secure E-health cloud model using identity-based cryptography.  ...  Patients' confidential health records have been encrypted and saved in the cloud using cypher text so far. To ensure privacy and security in a cloud computing environment is a big issue.  ...  Electronic health record (EHR) is also known by the name of Electronic Medical Record (EMR) and the records utilize cloud servers for high quality infrastructure with cost benefit.  ... 
doi:10.1155/2022/7016554 pmid:35510050 pmcid:PMC9061039 fatcat:cxljsrodfzdgfcbcnx7odyldyi

A Survey on Security Challenges of Healthcare Analysis Over Cloud

Jaishree Jain, Dr. Ajit Singh
2017 International Journal of Engineering Research and  
Introducing the cloud services in the health sector not only facilitates the exchange of electronic medical records among the hospitals and clinics, but also enables the cloud to act as a medical record  ...  Various approaches have been used to preserve the security of the health information in the cloud environment.  ...  Ikuomola 2014 [50] proposed a system that ensure the security of electronic health records stored in the cloud using Homomorphic Encryption to secure patients medical records and Bilayer Access Control  ... 
doi:10.17577/ijertv6is040719 fatcat:56sqctq2lzgtdmxrfcx2kcvuee

Effective and Secure e-Health Cloud Model using Identity Based Cryptography

2020 International Journal of Engineering and Advanced Technology  
So far patients had the owner of personal health records, it encrypted and stored with cipher text in the cloud server. To ensure privacy and security in cloud computing environment is a big issue.  ...  In this paper, we propose a novel algorithm along with implementation details as effective and secure e-health cloud model using identity based cryptography.  ...  Electronic health record (EHR) is also known by the name of Electronic medical record (EMR) and the records utilized cloud servers for high quality infrastructure with cost benefit.  ... 
doi:10.35940/ijeat.c5534.029320 fatcat:jug5tmc3mjeqll3itpssgde5ky

Health Records Protection in Cloud Environment

Doan B. Hoang, Lingfeng Chen
2014 2014 IEEE 13th International Symposium on Network Computing and Applications  
It is inevitable that electronic health records (EHRs) and healthcare-related services will be deployed on cloud platforms to reduce the cost and complexity of handling and integrating medical records  ...  The paper presents a review of EHR including definitions, EHR file formats, structures leading to the discussion of interoperability and security issues.  ...  The paper presents an Active Data Cube model that can be used to protect health data in an outsourced environment such as Cloud.  ... 
doi:10.1109/nca.2014.19 dblp:conf/nca/HoangC14 fatcat:gfskscpqfzaubho5nkrlyfdkwu

Editorial: special issue on advances in security and privacy for future mobile communications

Georgios Kambourakis, Gregorio Martínez, Felix Gómez Mármol
2019 Electronic Commerce Research  
His research interests include security and management of distributed communication networks. He received the M.Sc. and Ph.D. degrees in Computer Science from the University of Murcia.  ...  Lopes and Jaime Lloret, offers a novel data encryption solution for mobile health systems, considering a new and early-proposed cooperation strategy.  ...  This encryption solution, called data encryption for mobile health applications (DE4MHA), attempts to guarantee the best confidentiality, integrity, and authenticity of users' data of mhealth systems.  ... 
doi:10.1007/s10660-019-09365-4 fatcat:eos36xbv4zgtrcmo4n2xooyw5a

Blockchain-Based Healthcare Information Preservation Using Extended Chaotic Maps for HIPAA Privacy/Security Regulations

Tian-Fu Lee, I-Pin Chang, Ting-Shun Kung
2021 Applied Sciences  
The entire process is protected and complies with HIPAA privacy and security regulations.  ...  It also uses the non-tamperability of the blockchain to ensure that the data have not been tampered with, improving data security.  ...  (RPM) and Electronic Health Record (EHR) sharing.  ... 
doi:10.3390/app112210576 fatcat:dj7ryaf7u5bprhny6ltssbxgdu

Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing

Maryam Shabbir, Ayesha Shabbir, Celestine Iwendi, Abdul Rehman Javed, Muhammad Rizwan, Norbert Herencsar, Jerry Chun-Wei Lin
2021 IEEE Access  
Hence, this research is deliberated on to provide requirement-oriented health information security using the Modular Encryption Standard (MES) based on the layered modeling of the security measures.  ...  INDEX TERMS MES, health information security, mobile cloud computing, requirement-oriented approach, modular protection-based computing.  ...  A scheme that joins the watermarking scheme with encryption techniques for the exchanged medical image's security is the primary issue of this research.  ... 
doi:10.1109/access.2021.3049564 fatcat:4mkjrqngj5ffxnhun3xglcd4o4

Implementation of Authorization Framework for EHR Services using Enhanced Attribute Based Encryption

K. Rajathi
2020 International Journal for Research in Applied Science and Engineering Technology  
Electronic health record (EHR) systems provides several secured research on clinical basis and healthcare services.  ...  Electronic Health Record (EHR), which is based on cloud systems are with the features like big storage, clinical research with efficiencies as well as fostering collaborative care with several improvements  ...  And a novel has been created and it depends onattribute based authorization mechanism for EHR services, so it encrypt the data of patients securely by coping with the policies of medical organisation.  ... 
doi:10.22214/ijraset.2020.2054 fatcat:6wirtbkxq5cspgv2of6vpljtfm

Multi Authority Access Control in a Cloud EHR System with MA-ABE

Sharad Dixit, Karuna P. Joshi, Seung Geol Choi
2019 2019 IEEE International Conference on Edge Computing (EDGE)  
With the rapid adoption of Cloud-based Electronic Health Record (EHR) systems, health providers are particularly concerned about managing data privacy on the cloud.  ...  In this paper, we describe our novel approach along with the proof of concept prototype that we created to evaluate our framework.  ...  [16] proposed a secure encrypted access control application which implemented CP-ABE [17] for storing encrypted electronic health records with Amazon cloud service provider.  ... 
doi:10.1109/edge.2019.00032 dblp:conf/edge/DixitJC19 fatcat:7m4j3ukxmvhzlhfff66gvenvia

An Efficient Cloud Computing Security in Healthcare Management System

M. Vignesh Mahalakshmi, G. T. Shrivakshan
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
But today the security of data in cloud environment is not adequate. The electronic health record consists of images of the patient's record which is very confidential.  ...  The Electronic Health Records in the healthcare sector includes the scan images, X-rays,DNA reports etc., which are considered as the patients private data.It requires a very high degree of privacy and  ...  The left side image is the original Electronic Health Record (Plaintext) and the right side image is the encrypted Electronic Health Record (Ciphertext).  ... 
doi:10.23956/ijarcsse.v7i8.48 fatcat:vm7mdirz6vgqfl7i5p5lonwnr4

A Survey on Efficient Block Chain Authentication Scheme Based on Electronic Health Records

Swati Laxmeshwar, Deepak N.R
2020 International Journal of Innovative Science and Research Technology  
With the quick selection of the Cloud-based Electronic Health Record ( EHR) frameworks, health providers are particularly concerned about overseeing cloud-based information protection.  ...  The exchange of electronic health records ( EHRs) has a very good centrality for infection studies and the commitment of specialists Lately, a cloud-based electronic health record sharing program has offered  ...  With the quick headway of information development and Internet advancement, Electronic Health Records (EHRs), as a replacement of standard unique duplicate patient's wellbeing records on paper, deal with  ... 
doi:10.38124/ijisrt20jun406 fatcat:alp5cn73rzgn7pyfaxxuvsdrb4
« Previous Showing results 1 — 15 out of 3,463 results