Harnal et al., 2020 - Google Patents
Towards secure, flexible and efficient role based hospital's cloud management system: case studyHarnal et al., 2020
View PDF- Document ID
- 17490467071982028016
- Author
- Harnal S
- Chauhan R
- Publication year
- Publication venue
- EAI Endorsed Transactions on Pervasive Health and Technology
External Links
Snippet
INTRODUCTION: Many organizations of health care have recognized that quality of service can be improved by maintaining e-records of patient's reports, medical histories, surgeries recordings, etc. over the multimedia cloud servers. But, the data breach is always a matter of …
- 230000005540 biological transmission 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Al-Issa et al. | eHealth cloud security challenges: a survey | |
Ali et al. | SeDaSC: secure data sharing in clouds | |
Ranchal et al. | Protection of identity information in cloud computing without trusted third party | |
Thilakanathan et al. | Secure data sharing in the cloud | |
Vegesna | Investigations on Different Security Techniques for Data Protection in Cloud Computing using Cryptography Schemes | |
Shynu et al. | A comprehensive survey and analysis on access control schemes in cloud environment | |
Murray et al. | Cloud service security & application vulnerability | |
Saravanan et al. | Lattice based access control for protecting user data in cloud environments with hybrid security | |
Jayaraman et al. | Secure privacy conserving provable data possession (SPC-PDP) framework | |
Satar et al. | Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme | |
Panth et al. | A survey on security mechanisms of leading cloud service providers | |
Alanazi | Analysis of privacy and security challenges in e-health clouds | |
Harnal et al. | Towards secure, flexible and efficient role based hospital’s cloud management system: case study | |
Nagaty | Mobile health care on a secured hybrid cloud | |
French-Baidoo et al. | Achieving confidentiality in electronic health records using cloud systems | |
Indu et al. | Secure file sharing mechanism and key management for mobile cloud computing environment | |
Ullah et al. | TCLOUD: A Trusted Storage Architecture for Cloud Computing | |
Begum et al. | A privacy-preserving framework for personally controlled electronic health record (PCEHR) system | |
Sarode et al. | Secure data sharing in medical cyber-physical system—a review | |
Mini et al. | A comprehensive cloud security model with enhanced key management, access control and data anonymization features | |
US20140297333A1 (en) | User-mediator mediating transfer of electronic content | |
Darwish et al. | Privacy and security of cloud computing: a comprehensive review of techniques and challenges | |
Feldner et al. | Security issues in mobile healthcare applications | |
Gagged et al. | Improved secure dynamic bit standard technique for a private cloud platform to address security challenges | |
Rupasri et al. | Scalable and Adaptable End-To-End Collection and Analysis of Cloud Computing Security Data: Towards End-To-End Security in Cloud Computing Systems |