335
Views
4
CrossRef citations to date
0
Altmetric
Articles

Preserving confidentiality and privacy of the patient’s EHR using the OrBAC and AES in cloud environment*

& ORCID Icon
Pages 50-61 | Received 17 Jul 2018, Accepted 23 Jul 2018, Published online: 03 Aug 2018

References

  • Arun KK, Gnanadeepa S, John H, et al. Survey on security and privacy preserving public auditing for content storage in cloud environment. Proceedings of the international conference on electrical, electronics, signals, communication and optimization (EESCO); 2015 Jan 24–25; Visakhapatnam, India.
  • Maghrabi L. The threats of data security over the cloud as perceived by experts and university students. Proceedings of the world symposium of computer applications & research (WSCAR); 2014 Jan 18–20; Sousse, Tunisia.
  • Aiswarya D, Sangeetha V. Harnessing healthcare data security in cloud. Proceedings of the international conference on recent trends in information technology (ICRTIT); 2013 Jul 25–27; Chennai, India.
  • Elmogazy H, Bamasak O. Towards healthcare data security in cloud computing. Proceedings of the 8th international conference for internet technology and secured transactions (ICITST); 2013 Dec 9–12; London, UK.
  • Zhang R, Liu L. Security models and requirements for healthcare application clouds. Proceedings of the IEEE 3rd international conference on cloud computing (CLOUD); 2010 Jul 5–10; Miami, FL.
  • Lynda K, Saliha O-K, Nadjia B. Data security and privacy in e-health cloud: comparative study. Proceedings on the international conference on intelligent information processing, security and advanced communication; 2015 Nov 23–25; Batna, Algeria.
  • Patil M. A review on enhancing healthcare system using cloud computing. Int J Comput Appl. 2014;2:8–11.
  • Mohandas A, Sabitha S. Privacy preserving content disclosure for enabling sharing of electronic health records in cloud computing. Proceedings on the 7th ACM India computing conference; 2014 Oct 9–11; Nagpur, India.
  • Preethi M, Balakrishnan R. Cloud enabled patient-centric EHR management system. Proceedings on the international conference on advanced communication control and computing technologies (ICACCCT); 2014 May 8–10; Ramanathapuram, India.
  • Chen YY, Lu JC, Jan JK. A secure EHR system based on hybrid clouds. J Med Syst. 2012;36(5):3375–3384.
  • Narayan S, Gagné M, Naini RS. Privacy preserving EHR system using attribute-based infrastructure. Proceedings of the 2010 ACM workshop on Cloud Computing Security Workshop (CCSW '10); 2010 Oct 8, New York, NY: ACM; 2010. p. 47–52. doi: 10.1145/1866835.1866845
  • El Kalam AA, El Baida R, Balbiani P. Organization based access control. Proceedings on IEEE 4th international workshop on policies for distributed systems and networks; 2003 Jun 4–6; Lake Como, Italy.
  • Nechvatal J, Barker E, Bassham L, et al. Report on the development of the advanced encryption standard (AES). J Res Natl Inst Stand Technol. 2001;106(3):511.
  • Stallings W. Cryptography and network security principles and practice sixth edition. Upper Saddle River, NJ: Pearson Education; 2013.
  • Calheiros1 RN, Ranjan R, Beloglazov A, et al. Cloudsim: a tool kit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Softw Pract Exper. 2011;41:23–50.
  • Resources – Blue Button [Internet]. NW Washington DC: U.S. Department of Veterans Affairs; [updated 2015 Jun 18; cited 2017 Dec 18]. Available from: https://www.va.gov/BLUEBUTTON/Resources.asp
  • Alshehri S, Radziszowski S, Raj R. Secure access for healthcare data in the cloud using ciphertext-policy attribute-based encryption. Proceedings on IEEE 28th international conference on data engineering workshops (ICDEW); 2012 Apr 1–5; Arlington, VA, USA.
  • Zibideh W, Matalgah M. Energy consumptions analysis for a class of symmetric encryption algorithm. Proceedings on IEEE radio and wireless symposium (RWS); 2014 Jan 19–23; Newport Beach, CA, USA.
  • Ambrosin M, Conti M, Dargahi T. On the feasibility of attribute-based encryption on smartphone devices. Proceedings of the 2015 workshop on IoT Challenges in Mobile and Industrial Systems (IoT-Sys '15); 2015 May 18; New York, NY: ACM; 2015. p. 49–54. doi: 10.1145/2753476.2753482.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.