Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain
Tóm tắt
Từ khóa
Tài liệu tham khảo
Abdalla, 2005, Simple password-based encrypted key exchange protocols, 191
Acharya, 2017, A novel algorithm to detect glaucoma risk using texton and local configuration pattern features extracted from fundus images, Comput. Biol. Med., 88, 72, 10.1016/j.compbiomed.2017.06.022
Armknecht, 2014, Outsourced proofs of retrievability, 831
Azaria, 2016, Medrec: using blockchain for medical data access and permission management, 25
Bellare, 2000, The security of the cipher block chaining message authentication code, J. Comput. Syst. Sci., 61, 362, 10.1006/jcss.1999.1694
Boneh, 2003, Identity-based encryption from the weil pairing, SIAM J. Comput., 32, 586, 10.1137/S0097539701398521
Boneh, 2004, Short signatures from the weil pairing, J. Cryptol., 17, 297, 10.1007/s00145-004-0314-9
Cai, 2017, Parametric and adaptive encryption of feature-based computer-aided design models for cloud-based collaboration, Integr. Comput. Aided Eng., 24, 129, 10.3233/ICA-160535
Caíno-Lores, 2017, Efficient design assessment in the railway electric infrastructure domain using cloud computing, Integr. Comput. Aided Eng., 24, 57, 10.3233/ICA-160532
Caraffini, 2019, A study on rotation invariance in differential evolution, Swarm Evol. Comput., 10.1016/j.swevo.2018.08.013
Caraffini, 2014, An analysis on separability for memetic computing automatic design, Inf. Sci., 265, 1, 10.1016/j.ins.2013.12.044
Casola, 2016, Healthcare-related data in the cloud: challenges and opportunities, IEEE Cloud Comput., 3, 10, 10.1109/MCC.2016.139
Du, 2009, Transactions papers a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks, IEEE Trans. Wireless Commun., 8, 1223, 10.1109/TWC.2009.060598
Du, 2007, An effective key management scheme for heterogeneous sensor networks, Ad Hoc Netw., 5, 24, 10.1016/j.adhoc.2006.05.012
Ekblaw, 2017
Fernández-Alemán, 2013, Security and privacy in electronic health records: a systematic literature review, J. Biomed. Inform., 46, 541, 10.1016/j.jbi.2012.12.003
Gao, 2018, M-sse: an effective searchable symmetric encryption with enhanced security for mobile devices, IEEE Access, 6, 38860, 10.1109/ACCESS.2018.2852329
Hei, 2013, Pipac: patient infusion pattern based access control scheme for wireless insulin pump system, 3030
Hirschauer, 2015, Computer-aided diagnosis of Parkinson’s disease using enhanced probabilistic neural network, J. Med. Syst., 39, 179, 10.1007/s10916-015-0353-9
Jiang, 2018, A trust-based collaborative filtering algorithm for e-commerce recommendation system, J. Ambient Intell. Hum. Comput., 1
Jiang, 2018, Anonymous communication via anonymous identity-based encryption and its application in iot, Wireless Commun. Mob. Comput., 2018, 10.1155/2018/6809796
Korytkowski, 2017, Novel visual information indexing in relational databases, Integr. Comput. Aided Eng., 24, 119, 10.3233/ICA-160534
Lee, 2008, A cryptographic key management solution for hipaa privacy/security regulations, IEEE Trans. Inf. Technol. Biomed., 12, 34, 10.1109/TITB.2007.906101
Li, 2014, Secure deduplication with efficient and reliable convergent key management, IEEE Trans. Parallel Distrib. Syst., 25, 1615, 10.1109/TPDS.2013.284
Li, 2014, Securely outsourcing attribute-based encryption with checkability, IEEE Trans. Parallel Distrib. Syst., 25, 2201, 10.1109/TPDS.2013.271
Li, 2018, A homomorphic network coding signature scheme for multiple sources and its application in IoT, Secur. Commun. Netw., 2018, 10.1155/2018/9641273
Lin, 2013, Cam: cloud-assisted privacy preserving mobile health monitoring, IEEE Trans. Inf. Forensics Secur., 8, 985, 10.1109/TIFS.2013.2255593
Liu, 2015, Secure deduplication of encrypted data without additional independent servers, 874
Nakamoto, 2008
Neri, 2016
Padillo, 2018, Mining association rules on big data through MapReduce genetic programming, Integr. Comput. Aided Eng., 25, 31, 10.3233/ICA-170555
Pan, 2017, Spiking neural P systems with communication on request, Int. J. Neural Syst., 27, 1, 10.1142/S0129065717500423
Shen, 2018, Secure data uploading scheme for a smart home system, Inf. Sci., 453, 186, 10.1016/j.ins.2018.04.048
Smolik, 2018, Large scattered data interpolation with radial basis functions and space subdivision, Integr. Comput. Aided Eng., 25, 1
Sridhar, 2017, Diagnosis of attention deficit hyperactivity disorder using imaging and signal processing techniques, Comput. Biol. Med., 88, 93, 10.1016/j.compbiomed.2017.07.009
Sun, 2011, Hcpp: cryptography based secure EHR system for patient privacy and emergency healthcare, 373
Tian, 2018, Public audit for operation behavior logs with error locating in cloud storage, Soft Comput., 1
Tschorsch, 2016, Bitcoin and beyond: a technical survey on decentralized digital currencies, IEEE Commun. Surv. Tutor., 18, 2084, 10.1109/COMST.2016.2535718
Wang, 2017, Identity-based data outsourcing with comprehensive auditing in clouds, IEEE Trans. Inf. Forensics Secur., 12, 940, 10.1109/TIFS.2016.2646913
Wood, 2014, Ethereum: a secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper, 151, 1
Yan, 2018, Centralized duplicate removal video storage system with privacy preservation in IoT, Sensors, 18, 1814, 10.3390/s18061814
Zhang, 2019, Identity-based key-exposure resilient cloud storage public auditing scheme from lattices, Inf. Sci., 472, 223, 10.1016/j.ins.2018.09.013
Zhang, 2016, Cryptographic public verification of data integrity for cloud storage systems, IEEE Cloud Comput., 44, 10.1109/MCC.2016.94
Zhang, 2018, Healthdep: an efficient and secure deduplication scheme for cloud-assisted ehealth systems, IEEE Trans. Ind. Inf., 14, 4101, 10.1109/TII.2018.2832251
Zhang, 2017, Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation, IEEE Trans. Inf. Forensics Secur., 12, 676, 10.1109/TIFS.2016.2631951