메뉴 건너뛰기




Volumn 18, Issue 2, 2014, Pages 419-429

Cloud-assisted mobile-access of health data with privacy and auditability

Author keywords

Access control; auditability; eHealth; privacy

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; DIGITAL STORAGE; EHEALTH; HEALTH CARE; INFORMATION MANAGEMENT; NUMBER THEORY; RANDOM NUMBER GENERATION; SEARCH ENGINES;

EID: 84896443001     PISSN: 21682194     EISSN: None     Source Type: Journal    
DOI: 10.1109/JBHI.2013.2294932     Document Type: Article
Times cited : (98)

References (43)
  • 1
    • 84896476722 scopus 로고    scopus 로고
    • U.S. Department of Health & Human Service [Online]. Available
    • U.S. Department of Health & Human Service, "Breaches Affecting 500 or More Individuals," (2001). [Online]. Available: http://www.hhs.gov/ ocr/privacy/hipaa/administrative/breachnotificationr ule/breachtool.html
    • (2001) Breaches Affecting 500 or More Individuals
  • 3
    • 27144464694 scopus 로고    scopus 로고
    • A flexible role-based secure messaging service: Exploiting IBE technology for privacy in health care
    • Prague, Czech Republic
    • M. C. Mont, P. Bramhall, and K. Harrison, "A flexible role-based secure messaging service: Exploiting IBE technology for privacy in health care," presented at the 14th Int. Workshop Database Expert Syst. Appl., Prague, Czech Republic, 2003.
    • (2003) 14th Int. Workshop Database Expert Syst. Appl.
    • Mont, M.C.1    Bramhall, P.2    Harrison, K.3
  • 4
  • 5
    • 0242456746 scopus 로고    scopus 로고
    • A role-based delegation framework for healthcare information systems
    • Monterey, CA, USA
    • L. Zhang, G. J. Ahn, and B. T. Chu, "A role-based delegation framework for healthcare information systems," in 7th ACM Symp. Access Control Models Technol., Monterey, CA, USA, 2002, pp. 125-134.
    • (2002) 7th ACM Symp. Access Control Models Technol. , pp. 125-134
    • Zhang, L.1    Ahn, G.J.2    Chu, B.T.3
  • 6
    • 3042684910 scopus 로고    scopus 로고
    • A rule-based framework for rolebased delegation and revocation
    • L. Zhang, G. J. Ahn, and B. T. Chu, "A rule-based framework for rolebased delegation and revocation," ACM Trans. Inf. Syst. Security, vol. 6, no. 3, pp. 404-441, 2003.
    • (2003) ACM Trans. Inf. Syst. Security , vol.6 , Issue.3 , pp. 404-441
    • Zhang, L.1    Ahn, G.J.2    Chu, B.T.3
  • 7
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing. Extended abstract in CRYPTO 2001
    • D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing. Extended abstract in CRYPTO 2001," SIAM J. Comput., vol. 32, no. 3, pp. 586-615, 2003.
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 8
    • 77955229114 scopus 로고    scopus 로고
    • An identity-based security system for user privacy in vehicular ad hoc networks
    • Sep.
    • J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "An identity-based security system for user privacy in vehicular ad hoc networks," IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 9, pp. 1227-1239, Sep. 2010.
    • (2010) IEEE Trans. Parallel Distrib. Syst. , vol.21 , Issue.9 , pp. 1227-1239
    • Sun, J.1    Zhang, C.2    Zhang, Y.3    Fang, Y.4
  • 9
    • 79551632924 scopus 로고    scopus 로고
    • Preserving privacy in emergency response based on wireless body sensor networks
    • Dec.
    • J. Sun, X. Zhu, and Y. Fang, "Preserving privacy in emergency response based on wireless body sensor networks," in Proc. IEEE Global Telecommun. Conf., Dec. 2010, pp. 1-6.
    • (2010) Proc. IEEE Global Telecommun. Conf. , pp. 1-6
    • Sun, J.1    Zhu, X.2    Fang, Y.3
  • 10
    • 77649172678 scopus 로고    scopus 로고
    • Privacy and emergency response in ehealthcare leveraging wireless body sensor networks
    • Feb.
    • J. Sun, X. Zhu, and Y. Fang, "Privacy and emergency response in ehealthcare leveraging wireless body sensor networks," IEEE Wireless Commun., vol. 17, no. 1, pp. 66-73, Feb. 2010.
    • (2010) IEEE Wireless Commun. , vol.17 , Issue.1 , pp. 66-73
    • Sun, J.1    Zhu, X.2    Fang, Y.3
  • 11
    • 80051864290 scopus 로고    scopus 로고
    • HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare
    • Jun.
    • J. Sun, X. Zhu, C. Zhang, andY. Fang, "HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare," in Proc. IEEE Int. Conf. Distrib. Comput. Syst., Jun. 2011, pp. 373-382.
    • (2011) Proc. IEEE Int. Conf. Distrib. Comput. Syst. , pp. 373-382
    • Sun, J.1    Zhu, X.2    Zhang, C.3    Fang, Y.4
  • 12
    • 84866889971 scopus 로고    scopus 로고
    • PAAS: Privacy-preserving attribute-based authentication system for eHealth networks
    • Jun.
    • L. Guo, C. Zhang, J. Sun, and Y. Fang, "PAAS: Privacy-preserving attribute-based authentication system for eHealth networks," in Proc. IEEE Intl. Conf. Distrib. Comput. Syst., Jun. 2012, pp. 224-233.
    • (2012) Proc. IEEE Intl. Conf. Distrib. Comput. Syst. , pp. 224-233
    • Guo, L.1    Zhang, C.2    Sun, J.3    Fang, Y.4
  • 13
    • 84893584610 scopus 로고    scopus 로고
    • Security and privacy for mobile healthcare (m-Health) systems
    • S. Das, K. Kant, and N. Zhang, Eds. Amsterdam, The Netherlands: Elsevier
    • J. Sun, X. Zhu, C. Zhang, and Y. Fang, Security and Privacy for Mobile Healthcare (m-Health) Systems, in Handbook on Securing Cyber-Physical Infrastructure, S. Das, K. Kant, and N. Zhang, Eds. Amsterdam, The Netherlands: Elsevier, 2011.
    • (2011) Handbook on Securing Cyber-Physical Infrastructure
    • Sun, J.1    Zhu, X.2    Zhang, C.3    Fang, Y.4
  • 16
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
    • Y. C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," in Proc. 3rd Int. Conf. Appl. Cryptogr. Netw. Security, 2005, pp. 442-455. (Pubitemid 41422132)
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 442-455
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 18
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious RAMs," J. ACM, vol. 43, pp. 431-473, 1996. (Pubitemid 126607640)
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 19
    • 0025154732 scopus 로고
    • Efficient computation on oblivious RAMs
    • R. Ostrovsky, "Efficient computation on oblivious RAMs," in Proc. ACM Symp. Theory Comput., 1990, pp. 514-523.
    • (1990) Proc. ACM Symp. Theory Comput. , pp. 514-523
    • Ostrovsky, R.1
  • 20
    • 84861636543 scopus 로고    scopus 로고
    • Achieving usable and privacyassured similarity search over outsourced cloud data
    • Mar.
    • C. Wang, K. Ren, S. Yu, and K. Urs, "Achieving usable and privacyassured similarity search over outsourced cloud data," in Proc. IEEE Conf. Comput. Commun., Mar. 2012, pp. 451-459.
    • (2012) Proc. IEEE Conf. Comput. Commun. , pp. 451-459
    • Wang, C.1    Ren, K.2    Yu, S.3    Urs, K.4
  • 21
  • 22
    • 79959305027 scopus 로고    scopus 로고
    • Patient self-controllable access policy on PHI in ehealthcare systems
    • Apr.
    • X. Liang, R. Lu, X. Lin, and X. S. Shen, "Patient self-controllable access policy on PHI in ehealthcare systems," Adv. Health Inform. Conf., pp. 1-5, Apr. 2010.
    • (2010) Adv. Health Inform. Conf. , pp. 1-5
    • Liang, X.1    Lu, R.2    Lin, X.3    Shen, X.S.4
  • 25
    • 79956315983 scopus 로고    scopus 로고
    • PEC:Aprivacy-preserving emergency call scheme formobile healthcare social networks
    • X. Liang, R. Lu, L.Chen, X. Lin, andX. Shen, "PEC:Aprivacy- preserving emergency call scheme formobile healthcare social networks" J. Commun. Netw., vol. 13, no. 2, pp. 102-112, 2011.
    • (2011) J. Commun. Netw. , vol.13 , Issue.2 , pp. 102-112
    • Liang, X.1    Lu, R.2    Chen, L.3    Lin, X.4    Shen, X.5
  • 26
    • 84896454729 scopus 로고    scopus 로고
    • A privacy-preserving attribute-based authentication system for mobile health networks
    • L. Guo, C. Zhang, J. Sun, and Y. Fang, "A privacy-preserving attribute-based authentication system for mobile health networks," IEEE Trans. Mobile Comput., vol. PP, no. 99, pp. 1-1, 2013.
    • (2013) IEEE Trans. Mobile Comput. , vol.PP , Issue.99 , pp. 1-1
    • Guo, L.1    Zhang, C.2    Sun, J.3    Fang, Y.4
  • 27
    • 39449106296 scopus 로고    scopus 로고
    • A cryptographic key management solution for HIPAA privacy/security regulations
    • DOI 10.1109/TITB.2007.906101
    • W.-B. Lee and C.-D. Lee, "A cryptographic key management solution for HIPAA privacy/security regulations," IEEE Trans. Inf. Technol. Biomed., vol. 12, no. 1, pp. 34-41, Jan. 2008. (Pubitemid 351266641)
    • (2008) IEEE Transactions on Information Technology in Biomedicine , vol.12 , Issue.1 , pp. 34-41
    • Lee, W.-B.1    Lee, C.-D.2
  • 28
    • 56749165131 scopus 로고    scopus 로고
    • Body sensor network security: An identity-based cryptography approach
    • Apr.
    • C. C. Tan, H.Wang, S. Zhong, and Q. Li, "Body sensor network security: An identity-based cryptography approach," in Proc. ACM Conf. Wireless Netw. Security, Apr. 2008, pp. 148-153.
    • (2008) Proc. ACM Conf. Wireless Netw. Security , pp. 148-153
    • Tan, C.C.1    Wang, H.2    Zhong, S.3    Li, Q.4
  • 30
    • 84870885441 scopus 로고    scopus 로고
    • Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
    • Jan.
    • M. Li, S. Yu, Y. Zheng, K. Ren, andW. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.1 , pp. 131-143
    • Li, M.1    Yu, S.2    Zheng, Y.3    Ren, K.4    Lou, W.5
  • 31
    • 84891807562 scopus 로고    scopus 로고
    • Keyaggregate cryptosystem for scalable data sharing in cloud storage
    • PrePrints Available
    • C.-K. Chu, S. S. M. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng, "Keyaggregate cryptosystem for scalable data sharing in cloud storage," IEEE Trans. Parallel Distrib. Syst., vol. 99, no. PrePrints, p. 1, 2013. Available: http://doi.ieeecomputersociety.org/10.1109/TPDS.2013.112
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.99 , pp. 1
    • Chu, C.-K.1    Chow, S.S.M.2    Tzeng, W.-G.3    Zhou, J.4    Deng, R.H.5
  • 32
    • 74049163235 scopus 로고    scopus 로고
    • Improving privacy and security in multiauthority attribute-based encryption
    • M. Chase and S. S. M. Chow, "Improving privacy and security in multiauthority attribute-based encryption," in Proc. ACM Conf. Comput. Commun. Security, 2009, pp. 121-130.
    • (2009) Proc. ACM Conf. Comput. Commun. Security , pp. 121-130
    • Chase, M.1    Chow, S.S.M.2
  • 33
    • 79956053735 scopus 로고    scopus 로고
    • New privacy-preserving architectures for identity-/attribute-based encryption
    • Ph.D. dissertation New York University, New York, NY, USA
    • S. S. M. Chow, "New privacy-preserving architectures for identity-/attribute-based encryption" Ph.D. dissertation, Courant Inst. Math. Sci., New York University, New York, NY, USA, 2010.
    • (2010) Courant Inst. Math. Sci.
    • Chow, S.S.M.1
  • 35
    • 84863238100 scopus 로고    scopus 로고
    • Dynamic secure cloud storage with provenance
    • Berlin, Germany, Springer-Verlag
    • S. S. M. Chow, C.-K. Chu, X. Huang, J. Zhou, and R. H. Deng, "Dynamic secure cloud storage with provenance," in Cryptography and Security, Berlin, Germany, Springer-Verlag, 2012, pp. 442-464.
    • (2012) Cryptography and Security , pp. 442-464
    • Chow, S.S.M.1    Chu, C.-K.2    Huang, X.3    Zhou, J.4    Deng, R.H.5
  • 36
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 37
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attributed-based encryption for fine-grained access control of encrypted data," in Proc. ACMConf. Comput. Commun. Security, 2006, pp. 89-98. (Pubitemid 47131359)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 38
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • San Diego, CA, USA, Mar.
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," presented at the IEEE Conf. Comput. Commun., San Diego, CA, USA, Mar. 2010.
    • (2010) IEEE Conf. Comput. Commun.
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 40
    • 67650394655 scopus 로고    scopus 로고
    • Location cloaking for safety protection of ad hoc networks
    • T. Xu and Y. Cai, "Location cloaking for safety protection of ad hoc networks," in Proc. IEEE Conf. Comput. Commun., 2009, pp. 1944-1952.
    • (2009) Proc. IEEE Conf. Comput. Commun. , pp. 1944-1952
    • Xu, T.1    Cai, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.