메뉴 건너뛰기




Volumn 43-44, Issue , 2015, Pages 74-86

A hybrid solution for privacy preserving medical data sharing in the cloud environment

Author keywords

Cloud storage; Integrity check; Medical data sharing; Privacy protection

Indexed keywords

CLASSIFICATION (OF INFORMATION); CRYPTOGRAPHY; DATA PRIVACY; DIGITAL STORAGE; STORAGE AS A SERVICE (STAAS);

EID: 84911416889     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2014.06.004     Document Type: Article
Times cited : (269)

References (74)
  • 1
    • 80053504222 scopus 로고    scopus 로고
    • Opportunities and challenges of cloud computing to improve health care services
    • A. Mu-Hsing Kuo Opportunities and challenges of cloud computing to improve health care services J. Med. Internet Res. 2011
    • (2011) J. Med. Internet Res.
    • Mu-Hsing Kuo, A.1
  • 3
    • 23844446475 scopus 로고    scopus 로고
    • Structuring information and incentives to improve health
    • S. Stansfield Structuring information and incentives to improve health Bull. World Health Org. 83 8 2005 562
    • (2005) Bull. World Health Org. , vol.83 , Issue.8 , pp. 562
    • Stansfield, S.1
  • 4
    • 84874109278 scopus 로고    scopus 로고
    • Towards enabling cyberinfrastructure as a service in clouds
    • L. Wang, D. Chen, Y. Hu, Y. Ma, and J. Wang Towards enabling cyberinfrastructure as a service in clouds Comput. Electr. Eng. 39 1 2013 3 14
    • (2013) Comput. Electr. Eng. , vol.39 , Issue.1 , pp. 3-14
    • Wang, L.1    Chen, D.2    Hu, Y.3    Ma, Y.4    Wang, J.5
  • 6
    • 70349309706 scopus 로고    scopus 로고
    • Data security in the world of cloud computing
    • L.M. Kaufman Data security in the world of cloud computing IEEE Secur. Priv. 7 4 2009 61 64
    • (2009) IEEE Secur. Priv. , vol.7 , Issue.4 , pp. 61-64
    • Kaufman, L.M.1
  • 12
    • 84878197970 scopus 로고    scopus 로고
    • Security and privacy in electronic health records: A systematic literature review
    • J.L. Fernández-Alemán, I.C. Señor, P.Á. Lozoya, and A. Toval Security and privacy in electronic health records: a systematic literature review J Biomed. Inf. 46 3 2013 541 562
    • (2013) J Biomed. Inf. , vol.46 , Issue.3 , pp. 541-562
    • Fernández-Alemán, J.L.1    Señor, I.C.2    Lozoya P.Á.3    Toval, A.4
  • 17
    • 84992227458 scopus 로고    scopus 로고
    • Proposed standard for role-based access control
    • D.F. Ferraiolo, and R. Sanhu Proposed standard for role-based access control ACM Trans. Inf. Syst. Secur. 4 3 2000 224 274
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.4 , Issue.3 , pp. 224-274
    • Ferraiolo, D.F.1    Sanhu, R.2
  • 18
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • R.S. Sandhu, and E.J. Coyne Role-based access control models IEEE Comput. 29 2 1996 38 47
    • (1996) IEEE Comput. , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.S.1    Coyne, E.J.2
  • 21
    • 30144433198 scopus 로고    scopus 로고
    • Privacy enforcement with an extended role-based access control model
    • North Carolina State University
    • Q. He, 2003,Privacy enforcement with an extended role-based access control model. Tech. rep. TR-2003-09, Department of Computer Science, North Carolina State University.
    • (2003) Tech. Rep. TR-2003-09, Department of Computer Science
    • He, Q.1
  • 28
    • 44049096900 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Y.-C. Chang, M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data, in: Proc. of ACNS, 2005.
    • (2005) Proc. of ACNS
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 29
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • R. Curtmola, J.A. Garay, S. Kamara, R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in: Proc. of ACM CCS, 2006.
    • (2006) Proc. of ACM CCS
    • Curtmola, R.1    Garay, J.A.2    Kamara, S.3    Ostrovsky, R.4
  • 39
    • 70349305273 scopus 로고    scopus 로고
    • Differential privacy: A survey of results
    • M. Agrawal, D.-Z. Du, Z. Duan, A. Li, 5th International Conference, TAMC 2008, Xi'an, China, April 25-29, 2008. Proceedings Lecture Notes in Computer Science Springer
    • C. Dwork Differential privacy: a survey of results M. Agrawal, D.-Z. Du, Z. Duan, A. Li, Theory and Applications of Models of Computation 5th International Conference, TAMC 2008, Xi'an, China, April 25-29, 2008. Proceedings Lecture Notes in Computer Science vol. 4978 2008 Springer 1 19
    • (2008) Theory and Applications of Models of Computation , vol.4978 VOL. , pp. 1-19
    • Dwork, C.1
  • 42
    • 43949118608 scopus 로고    scopus 로고
    • Caroline Fontaine and Fabien Galand, a survey of homomorphic encryption for nonspecialists
    • Caroline Fontaine and Fabien Galand, a survey of homomorphic encryption for nonspecialists, EURASIP J. Inf. Sec. (2007).
    • (2007) EURASIP J. Inf. Sec.
  • 44
  • 45
    • 34547239322 scopus 로고    scopus 로고
    • Achieving efficient conjunctive keyword searches over encrypted data
    • L. Ballard, S. Kamara, F. Monrose, Achieving efficient conjunctive keyword searches over encrypted data, in: Proc. of ICICS, 2005.
    • (2005) Proc. of ICICS
    • Ballard, L.1    Kamara, S.2    Monrose, F.3
  • 46
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh, B. Waters, Conjunctive, subset, and range queries on encrypted data, in: Proc. of TCC, 2007, pp. 535-554.
    • (2007) Proc. of TCC , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 47
    • 80052378201 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • Y. Hwang, P. Lee, Public key encryption with conjunctive keyword search and its extension to a multi-user system, in: Pairing, 2007.
    • (2007) Pairing
    • Hwang, Y.1    Lee, P.2
  • 49
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou Privacy-preserving multi-keyword ranked search over encrypted cloud data INFOCOM 2011 829 837
    • (2011) INFOCOM , pp. 829-837
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 50
    • 33947621113 scopus 로고    scopus 로고
    • Securing electronic health records without impeding the flow of information
    • R. Agrawal, and C. Johnson Securing electronic health records without impeding the flow of information Int. J. Med. Inf. 76 5-6 2007 471 479
    • (2007) Int. J. Med. Inf. , vol.76 , Issue.56 , pp. 471-479
    • Agrawal, R.1    Johnson, C.2
  • 54
    • 33747622542 scopus 로고    scopus 로고
    • Personal health record systems and their security protection
    • K.T. Win, W. Susilo, and Y. Mu Personal health record systems and their security protection J. Med. Syst. 30 4 2006 309 315
    • (2006) J. Med. Syst. , vol.30 , Issue.4 , pp. 309-315
    • Win, K.T.1    Susilo, W.2    Mu, Y.3
  • 55
    • 78650118369 scopus 로고    scopus 로고
    • Privacy preserving EHR system using attribute-based infrastructure
    • S. Narayan, M. Gagné, R. Safavi-Naini, Privacy preserving EHR system using attribute-based infrastructure, in: Proc. ACM Workshop on Cloud Computing Security, 2010, pp. 47-52.
    • (2010) Proc. ACM Workshop on Cloud Computing Security , pp. 47-52
    • Narayan, S.1
  • 57
    • 78751704723 scopus 로고    scopus 로고
    • Medical record search engines, using pseudonymised patient identity: An alternative to centralised medical records
    • C. Quantin, D.O. Jaquet-Chiffelle, G. Coatrieux, E. Benzenine, and F.A. Allaert Medical record search engines, using pseudonymised patient identity: an alternative to centralised medical records Int. J. Med. Inf. 80 2 2011 e6 e11
    • (2011) Int. J. Med. Inf. , vol.80 , Issue.2 , pp. 6-e11
    • Quantin, C.1    Jaquet-Chiffelle, D.O.2    Coatrieux, G.3    Benzenine, E.4    Allaert, F.A.5
  • 58
    • 79951680016 scopus 로고    scopus 로고
    • Patient-centric authorization framework for electronic healthcare services
    • J. Jin, G.J. Ahn, H. Hu, M.J. Covington, and X. Zhang Patient-centric authorization framework for electronic healthcare services Comput. Secur. 30 2-3 2011 116 127
    • (2011) Comput. Secur. , vol.30 , Issue.23 , pp. 116-127
    • Jin, J.1    Ahn, G.J.2    Hu, H.3    Covington, M.J.4    Zhang, X.5
  • 59
    • 77955333989 scopus 로고    scopus 로고
    • A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
    • J. Hu, H.H. Chen, and T.W. Hou A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations Comput. Stand. Interfaces 32 5-6 2010 274 280
    • (2010) Comput. Stand. Interfaces , vol.32 , Issue.56 , pp. 274-280
    • Hu, J.1    Chen, H.H.2    Hou, T.W.3
  • 64
    • 34548805858 scopus 로고    scopus 로고
    • T-closeness: Privacy beyond k-anonymity and l-diversity
    • N. Li, T. Li, and S. Venkatasubramanian T-closeness: privacy beyond k-anonymity and l-diversity ICDE 2007 106 115
    • (2007) ICDE , pp. 106-115
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 65
    • 85000222533 scopus 로고    scopus 로고
    • A Top-down approach for approximate data anonymization
    • J. Li, J.-J. Yang, and B. Liu A Top-down approach for approximate data anonymization Enterprise Inf. Syst. 2012
    • (2012) Enterprise Inf. Syst.
    • Li, J.1    Yang, J.-J.2    Liu, B.3
  • 66
    • 79960900327 scopus 로고    scopus 로고
    • A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
    • Z. Hao, S. Zhong, and N. Yu A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability IEEE Trans. Knowl. Data Eng. 23 9 2011 1432 1437
    • (2011) IEEE Trans. Knowl. Data Eng. , vol.23 , Issue.9 , pp. 1432-1437
    • Hao, Z.1    Zhong, S.2    Yu, N.3
  • 70
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • P. Golle, J. Staddon, B. Waters, Secure conjunctive keyword search over encrypted data, in: Proc. of ACNS, 2004, pp. 31-45.
    • (2004) Proc. of ACNS , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.3
  • 73


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.