메뉴 건너뛰기




Volumn 5, Issue , 2017, Pages 22313-22328

A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility with Pairing-Based Cryptography

Author keywords

decoy technique; fog computing; Key management; medical big data; pairing based cryptography; security and privacy

Indexed keywords

COMPUTERIZED TOMOGRAPHY; CRYPTOGRAPHY; DATA PRIVACY; DIGITAL STORAGE; ELECTRONIC DOCUMENT EXCHANGE; FOG; HEALTH CARE; MEDICAL COMPUTING; PUBLIC KEY CRYPTOGRAPHY; TELEMEDICINE;

EID: 85030773477     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2017.2757844     Document Type: Article
Times cited : (212)

References (53)
  • 1
    • 85089844954 scopus 로고    scopus 로고
    • A 5G cognitive system for healthcare
    • M. Chen, J. Yang, Y. Hao, S. Mao, and K. Hwang, ''A 5G cognitive system for healthcare, '' Big Data Cognit. Comput., vol. 1, no. 1, p. 2, 2017, doi: 10.3390/.bdcc1010002.
    • (2017) Big Data Cognit. Comput , vol.1 , Issue.1 , pp. 2
    • Chen, M.1    Yang, J.2    Hao, Y.3    Mao, S.4    Hwang, K.5
  • 3
    • 84898796363 scopus 로고    scopus 로고
    • Big data: A survey
    • Apr
    • M. Chen, S. Mao, and Y. Liu, ''Big data: A survey, '' Mobile Netw. Appl., vol. 19, no. 2, pp. 171-209, Apr. 2014.
    • (2014) Mobile Netw. Appl , vol.19 , Issue.2 , pp. 171-209
    • Chen, M.1    Mao, S.2    Liu, Y.3
  • 4
    • 85011023303 scopus 로고    scopus 로고
    • Healthcare big data voice pathol-ogy assessment framework
    • Dec
    • M. S. Hossain and G. Muhammad, ''Healthcare big data voice pathol-ogy assessment framework, '' IEEE Access, vol. 4, no. 1, pp. 7806-7815, Dec. 2016.
    • (2016) IEEE Access , vol.4 , Issue.1 , pp. 7806-7815
    • Hossain, M.S.1    Muhammad, G.2
  • 5
    • 85023602966 scopus 로고    scopus 로고
    • Disease prediction by machine learning over big data from healthcare communities
    • M. Chen, Y. Hao, K. Hwang, L. Wang, and L. Wang, ''Disease prediction by machine learning over big data from healthcare communities, '' IEEE Access, vol. 5, no. 1, pp. 8869-8879, 2017.
    • (2017) IEEE Access , vol.5 , Issue.1 , pp. 8869-8879
    • Chen, M.1    Hao, Y.2    Hwang, K.3    Wang, L.4    Wang, L.5
  • 6
    • 85018484036 scopus 로고    scopus 로고
    • Emotion communication system
    • M. Chen, P. Zhou, and G. Fortino, ''Emotion communication system, '' IEEE Access, vol. 5, pp. 326-337, 2017.
    • IEEE Access , vol.5 , Issue.2017 , pp. 326-337
    • Chen, M.1    Zhou, P.2    Fortino, G.3
  • 7
    • 85010005135 scopus 로고    scopus 로고
    • Wearable 2.0: Enabling human-cloud integration in next genera-Tion healthcare systems
    • Jan.
    • M. Chen, Y. Ma, Y. Li, D. Wu, Y. Zhang, and C.-H. Youn, ''Wearable 2.0: Enabling human-cloud integration in next genera-Tion healthcare systems, '' IEEE Commun., vol. 55, no. 1, pp. 54-61, Jan. 2017.
    • (2017) IEEE Commun , vol.55 , Issue.1 , pp. 54-61
    • Chen, M.1    Ma, Y.2    Li, Y.3    Wu, D.4    Zhang, Y.5    Youn, C.-H.6
  • 8
    • 84870431352 scopus 로고    scopus 로고
    • Towards large-scale twitter mining for drug-related adverse events
    • J. Bian, U. Topaloglu, and F. Yu, ''Towards large-scale twitter mining for drug-related adverse events, '' in Proc. SHB, Maui, HI, USA, 2012, pp. 25-32.
    • (2012) Proc. SHB, Maui, HI, USA , pp. 25-32
    • Bian, J.1    Topaloglu, U.2    Yu, F.3
  • 9
    • 84977743996 scopus 로고    scopus 로고
    • Cloud-Assisted industrial Internet of Things (IIoT)-Enabled framework for health monitoring
    • Jun
    • M. S. Hossain and G. Muhammad, ''Cloud-Assisted industrial Internet of Things (IIoT)-Enabled framework for health monitoring, '' Comput. Netw., vol. 101 pp. 192-202, Jun. 2016.
    • (2016) Comput. Netw , vol.101 , pp. 192-202
    • Hossain, M.S.1    Muhammad, G.2
  • 10
    • 84983015462 scopus 로고    scopus 로고
    • An overview of health analytics
    • W. Raghupathi and V. Raghupathi, ''An overview of health analytics, '' J. Health Med. Informat., vol. 4, no. 3, pp. 1-11, 2013.
    • (2013) J. Health Med. Informat , vol.4 , Issue.3 , pp. 1-11
    • Raghupathi, W.1    Raghupathi, V.2
  • 14
    • 85038243045 scopus 로고    scopus 로고
    • A review on issues and chal-lenges of cloud computing
    • D. Sangita, C. Ankita, and P. Reshamlal, ''A review on issues and chal-lenges of cloud computing, '' Int. J. Innov. Adv. Comput. Sci., vol. 4, no. 1, pp. 81-88, 2015.
    • (2015) Int. J. Innov. Adv. Comput. Sci , vol.4 , Issue.1 , pp. 81-88
    • Sangita, D.1    Ankita, C.2    Reshamlal, P.3
  • 16
    • 78650558794 scopus 로고    scopus 로고
    • Secure virtualization for cloud computing
    • F. Lombardi and R. Di Pietro, ''Secure virtualization for cloud computing, '' J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1113-1122, 2010.
    • (2010) J. Netw. Comput. Appl , vol.34 , Issue.4 , pp. 1113-1122
    • Lombardi, F.1    Di Pietro, R.2
  • 18
    • 85038234411 scopus 로고    scopus 로고
    • Survey on insider data theft misuse attacks in the cloud
    • D. Kumar and K. Morarjee, ''Survey on insider data theft misuse attacks in the cloud, '' Int. J. Comput. Sci. Mobile Appl., vol. 2, no. 2, pp. 26-29, 2014.
    • (2014) Int. J. Comput. Sci. Mobile Appl , vol.2 , Issue.2 , pp. 26-29
    • Kumar, D.1    Morarjee, K.2
  • 20
    • 84975041891 scopus 로고    scopus 로고
    • Fog computing providing data security: A review
    • M. Kaur and M. Bharti, ''Fog computing providing data security: A review, '' Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 4, no. 1, pp. 832-834, 2014.
    • (2014) Int. J. Adv. Res. Comput. Sci. Softw. Eng , vol.4 , Issue.1 , pp. 832-834
    • Kaur, M.1    Bharti, M.2
  • 23
    • 85038227121 scopus 로고    scopus 로고
    • A secure framework for mollifying attacks in cloud
    • B. R. Singh, S. Sunanda, and Y. Moligi Sangeetha Lakshmi Kanth, ''A secure framework for mollifying attacks in cloud, '' Int. J. Comput. Trends Technol., vol. 16, pp. 204-207, 2014.
    • (2014) Int. J. Comput. Trends Technol , vol.16 , pp. 204-207
    • Singh, B.R.1    Sunanda, S.2    Moligi, S.L.K.Y.3
  • 24
    • 85038217879 scopus 로고    scopus 로고
    • Perspective of decoy technique using mobile fog computing with effect to wireless environment
    • S. P. Karekar and S. M. Vaidya, ''Perspective of decoy technique using mobile fog computing with effect to wireless environment, '' Int. J. Sci. Eng. Technol. Res., vol. 4, no. 14, pp. 2620-2626, 2015.
    • (2015) Int. J. Sci. Eng. Technol. Res , vol.4 , Issue.14 , pp. 2620-2626
    • Karekar, S.P.1    Vaidya, S.M.2
  • 25
    • 84940284783 scopus 로고    scopus 로고
    • A review on modern distributed computing paradigm: Cloud computing, jungle computing and fog computing
    • M. Hajibaba and S. Gorgin, ''A review on modern distributed computing paradigm: Cloud computing, jungle computing and fog computing, '' J. Comput. Inf. Technol., vol. 22, no. 2, pp. 69-84, 2014.
    • (2014) J. Comput. Inf. Technol , vol.22 , Issue.2 , pp. 69-84
    • Hajibaba, M.1    Gorgin, S.2
  • 27
    • 77957230388 scopus 로고    scopus 로고
    • Private key agreement and secure communication for heterogeneous sensor networks
    • S. M. M. Rahman and K. El-Khatib, ''Private key agreement and secure communication for heterogeneous sensor networks, '' J. Parallel Distrib. Comput., vol. 70, no. 8, pp. 858-870, 2010.
    • (2010) J. Parallel Distrib. Comput , vol.70 , Issue.8 , pp. 858-870
    • Rahman, S.M.M.1    El-Khatib, K.2
  • 28
    • 84989950607 scopus 로고    scopus 로고
    • M.S.Thesis, Dept. Comput. Sci., Radboud Univ., Nijmegen, The Netherland
    • D. Meffert, ''Bilinear pairing in cryptography, '' M.S.Thesis, Dept. Comput. Sci., Radboud Univ., Nijmegen, The Netherland, 2009.
    • (2009) Bilinear Pairing in Cryptography
    • Meffert, D.1
  • 31
  • 35
    • 85038219298 scopus 로고    scopus 로고
    • Securing the cloud using decoy information technology to preventing them from distinguishing the real sensitive data from fake worthless data
    • Sep
    • E. Aruna, C. Prasad, and M. A. Reddy, ''Securing the cloud using decoy information technology to preventing them from distinguishing the real sensitive data from fake worthless data, '' Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 3, pp. 292-299, Sep. 2013.
    • (2013) Int. J. Adv. Res. Comput. Sci. Softw. Eng , vol.3 , pp. 292-299
    • Aruna, E.1    Prasad, C.2    Reddy, M.A.3
  • 37
    • 85038251583 scopus 로고    scopus 로고
    • Fog computing: A new concept to minimize the attacks and to provide security in cloud computing environment
    • S. Khairnar and D. Borkar, ''Fog computing: A new concept to minimize the attacks and to provide security in cloud computing environment, '' Int. J. Res. Eng. Technol., vol. 3, no. 6, pp. 124-127, 2014.
    • (2014) Int. J. Res. Eng. Technol , vol.3 , Issue.6 , pp. 124-127
    • Khairnar, S.1    Borkar, D.2
  • 40
    • 84861917864 scopus 로고    scopus 로고
    • Research on cloud computing security problem and strategy
    • Apr
    • W. Liu, ''Research on cloud computing security problem and strategy, '' in Proc. IEEE Conf., Yichang, China, Apr. 2012, pp. 1216-1219.
    • (2012) Proc IEEE Conf., Yichang, China , pp. 1216-1219
    • Liu, W.1
  • 41
    • 85038236651 scopus 로고    scopus 로고
    • User pro-ling-A short review
    • A. Cufoglu, ''User pro-ling-A short review, '' Int. J. Comput. Appl., vol. 108, no. 3, pp. 1-9, 2014.
    • (2014) Int. J. Comput. Appl , vol.108 , Issue.3 , pp. 1-9
    • Cufoglu, A.1
  • 42
    • 85038219925 scopus 로고    scopus 로고
    • A survey on image encryption and decryption using blowfish & watermarking
    • P. Gaur and N. Manglani, ''A survey on image encryption and decryption using blowfish & watermarking, '' Int. J. Recent Innov. Trend Comput. Commun., vol. 3, no. 5, pp. 3285-3288, 2015.
    • (2015) Int. J. Recent Innov. Trend Comput. Commun , vol.3 , Issue.5 , pp. 3285-3288
    • Gaur, P.1    Manglani, N.2
  • 43
    • 84942849840 scopus 로고    scopus 로고
    • Image encryption and decryption using blowfish algorithm in MATLAB
    • P. Singh, ''Image encryption and decryption using blowfish algorithm in MATLAB, '' Int. J. Sci. Eng. Res., vol. 4, no. 7, pp. 150-154, 2013.
    • (2013) Int. J. Sci. Eng. Res , vol.4 , Issue.7 , pp. 150-154
    • Singh, P.1
  • 45
    • 85035135826 scopus 로고    scopus 로고
    • Design and development of combined algorithm computing technique to enhanceWeb security
    • H. Gohel, ''Design and development of combined algorithm computing technique to enhanceWeb security, '' Int. J. Innov. Emerg. Res. Eng., vol. 2, no. 1, pp. 76-79, 2015.
    • (2015) Int. J. Innov. Emerg. Res. Eng , vol.2 , Issue.1 , pp. 76-79
    • Gohel, H.1
  • 49
    • 84934939483 scopus 로고    scopus 로고
    • Comparative analysis of symmetric key encryp-Tion algorithms
    • Aug
    • N. Tyagi and A. Ganpati, ''Comparative analysis of symmetric key encryp-Tion algorithms, '' Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 4, no. 8, pp. 348-354, Aug. 2014.
    • (2014) Int. J. Adv. Res. Comput. Sci. Softw. Eng , vol.4 , Issue.8 , pp. 348-354
    • Tyagi, N.1    Ganpati, A.2
  • 50
    • 84880174298 scopus 로고    scopus 로고
    • DES, AES and blowfish: Symmetric key cryptography algorithms simulation based performance analysis
    • Dec
    • N. Kumar and J. Thakur, ''DES, AES and blowfish: Symmetric key cryptography algorithms simulation based performance analysis, '' Int. J. Emerg. Technol. Adv. Eng., vol. 1, no. 1, pp. 6-12, Dec. 2011.
    • (2011) Int. J. Emerg. Technol. Adv. Eng , vol.1 , Issue.1 , pp. 6-12
    • Kumar, N.1    Thakur, J.2
  • 51
    • 84904569239 scopus 로고    scopus 로고
    • Towards secure data exchange in peer-To-peer data man-Agement systems
    • S. M. M. Rahman, M. Masud, A. N. M. Noman, A. Alamri, and M. M. Hassan, ''Towards secure data exchange in peer-To-peer data man-Agement systems, '' Appl. Math. Inf. Sci., vol. 8, no. 6, pp. 2775-2787, 2014.
    • (2014) Appl. Math. Inf. Sci , vol.8 , Issue.6 , pp. 2775-2787
    • Rahman, S.M.M.1    Masud, M.2    Noman, A.N.M.3    Alamri, A.4    Hassan, M.M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.