Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain

Information Sciences - Tập 485 - Trang 427-440 - 2019
Sheng Cao1,2, Gexiang Zhang3, Pengfei Liu4, Xiaosong Zhang1,4, Ferrante Neri5
1Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China
2School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China
3School of Electrical Engineering, Southwest Jiaotong University, Chengdu, Sichuan, 610031, China
4School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China
5Institute of Artificial Intelligence, School of Computer Science and Informatics, De Montfort University, Leicester, UK

Tóm tắt

Từ khóa


Tài liệu tham khảo

Abdalla, 2005, Simple password-based encrypted key exchange protocols, 191

Acharya, 2017, A novel algorithm to detect glaucoma risk using texton and local configuration pattern features extracted from fundus images, Comput. Biol. Med., 88, 72, 10.1016/j.compbiomed.2017.06.022

Armknecht, 2014, Outsourced proofs of retrievability, 831

Azaria, 2016, Medrec: using blockchain for medical data access and permission management, 25

Bellare, 2000, The security of the cipher block chaining message authentication code, J. Comput. Syst. Sci., 61, 362, 10.1006/jcss.1999.1694

Boneh, 2003, Identity-based encryption from the weil pairing, SIAM J. Comput., 32, 586, 10.1137/S0097539701398521

Boneh, 2004, Short signatures from the weil pairing, J. Cryptol., 17, 297, 10.1007/s00145-004-0314-9

Cai, 2017, Parametric and adaptive encryption of feature-based computer-aided design models for cloud-based collaboration, Integr. Comput. Aided Eng., 24, 129, 10.3233/ICA-160535

Caíno-Lores, 2017, Efficient design assessment in the railway electric infrastructure domain using cloud computing, Integr. Comput. Aided Eng., 24, 57, 10.3233/ICA-160532

Caraffini, 2019, A study on rotation invariance in differential evolution, Swarm Evol. Comput., 10.1016/j.swevo.2018.08.013

Caraffini, 2014, An analysis on separability for memetic computing automatic design, Inf. Sci., 265, 1, 10.1016/j.ins.2013.12.044

Casola, 2016, Healthcare-related data in the cloud: challenges and opportunities, IEEE Cloud Comput., 3, 10, 10.1109/MCC.2016.139

Du, 2009, Transactions papers a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks, IEEE Trans. Wireless Commun., 8, 1223, 10.1109/TWC.2009.060598

Du, 2007, An effective key management scheme for heterogeneous sensor networks, Ad Hoc Netw., 5, 24, 10.1016/j.adhoc.2006.05.012

Ekblaw, 2017

Fernández-Alemán, 2013, Security and privacy in electronic health records: a systematic literature review, J. Biomed. Inform., 46, 541, 10.1016/j.jbi.2012.12.003

Gao, 2018, M-sse: an effective searchable symmetric encryption with enhanced security for mobile devices, IEEE Access, 6, 38860, 10.1109/ACCESS.2018.2852329

Hei, 2013, Pipac: patient infusion pattern based access control scheme for wireless insulin pump system, 3030

Hirschauer, 2015, Computer-aided diagnosis of Parkinson’s disease using enhanced probabilistic neural network, J. Med. Syst., 39, 179, 10.1007/s10916-015-0353-9

Jiang, 2018, A trust-based collaborative filtering algorithm for e-commerce recommendation system, J. Ambient Intell. Hum. Comput., 1

Jiang, 2018, Anonymous communication via anonymous identity-based encryption and its application in iot, Wireless Commun. Mob. Comput., 2018, 10.1155/2018/6809796

Korytkowski, 2017, Novel visual information indexing in relational databases, Integr. Comput. Aided Eng., 24, 119, 10.3233/ICA-160534

Lee, 2008, A cryptographic key management solution for hipaa privacy/security regulations, IEEE Trans. Inf. Technol. Biomed., 12, 34, 10.1109/TITB.2007.906101

Li, 2014, Secure deduplication with efficient and reliable convergent key management, IEEE Trans. Parallel Distrib. Syst., 25, 1615, 10.1109/TPDS.2013.284

Li, 2014, Securely outsourcing attribute-based encryption with checkability, IEEE Trans. Parallel Distrib. Syst., 25, 2201, 10.1109/TPDS.2013.271

Li, 2018, A homomorphic network coding signature scheme for multiple sources and its application in IoT, Secur. Commun. Netw., 2018, 10.1155/2018/9641273

Lin, 2013, Cam: cloud-assisted privacy preserving mobile health monitoring, IEEE Trans. Inf. Forensics Secur., 8, 985, 10.1109/TIFS.2013.2255593

Liu, 2015, Secure deduplication of encrypted data without additional independent servers, 874

Nakamoto, 2008

Neri, 2016

Padillo, 2018, Mining association rules on big data through MapReduce genetic programming, Integr. Comput. Aided Eng., 25, 31, 10.3233/ICA-170555

Pan, 2017, Spiking neural P systems with communication on request, Int. J. Neural Syst., 27, 1, 10.1142/S0129065717500423

Shen, 2018, Secure data uploading scheme for a smart home system, Inf. Sci., 453, 186, 10.1016/j.ins.2018.04.048

Smolik, 2018, Large scattered data interpolation with radial basis functions and space subdivision, Integr. Comput. Aided Eng., 25, 1

Sridhar, 2017, Diagnosis of attention deficit hyperactivity disorder using imaging and signal processing techniques, Comput. Biol. Med., 88, 93, 10.1016/j.compbiomed.2017.07.009

Sun, 2011, Hcpp: cryptography based secure EHR system for patient privacy and emergency healthcare, 373

Tian, 2018, Public audit for operation behavior logs with error locating in cloud storage, Soft Comput., 1

Tschorsch, 2016, Bitcoin and beyond: a technical survey on decentralized digital currencies, IEEE Commun. Surv. Tutor., 18, 2084, 10.1109/COMST.2016.2535718

Wang, 2017, Identity-based data outsourcing with comprehensive auditing in clouds, IEEE Trans. Inf. Forensics Secur., 12, 940, 10.1109/TIFS.2016.2646913

Wood, 2014, Ethereum: a secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper, 151, 1

Yan, 2018, Centralized duplicate removal video storage system with privacy preservation in IoT, Sensors, 18, 1814, 10.3390/s18061814

Zhang, 2019, Identity-based key-exposure resilient cloud storage public auditing scheme from lattices, Inf. Sci., 472, 223, 10.1016/j.ins.2018.09.013

Zhang, 2016, Cryptographic public verification of data integrity for cloud storage systems, IEEE Cloud Comput., 44, 10.1109/MCC.2016.94

Zhang, 2018, Healthdep: an efficient and secure deduplication scheme for cloud-assisted ehealth systems, IEEE Trans. Ind. Inf., 14, 4101, 10.1109/TII.2018.2832251

Zhang, 2017, Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation, IEEE Trans. Inf. Forensics Secur., 12, 676, 10.1109/TIFS.2016.2631951

Zhang, 2015, SCLPV: secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors, IEEE Trans. Comput. Social Syst., 2, 159, 10.1109/TCSS.2016.2517205