Harnal et al., 2020 - Google Patents

Towards secure, flexible and efficient role based hospital's cloud management system: case study

Harnal et al., 2020

View PDF
Document ID
17490467071982028016
Author
Harnal S
Chauhan R
Publication year
Publication venue
EAI Endorsed Transactions on Pervasive Health and Technology

External Links

Snippet

INTRODUCTION: Many organizations of health care have recognized that quality of service can be improved by maintaining e-records of patient's reports, medical histories, surgeries recordings, etc. over the multimedia cloud servers. But, the data breach is always a matter of …
Continue reading at eudl.eu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material

Similar Documents

Publication Publication Date Title
Al-Issa et al. eHealth cloud security challenges: a survey
Ali et al. SeDaSC: secure data sharing in clouds
Ranchal et al. Protection of identity information in cloud computing without trusted third party
Thilakanathan et al. Secure data sharing in the cloud
Vegesna Investigations on Different Security Techniques for Data Protection in Cloud Computing using Cryptography Schemes
Shynu et al. A comprehensive survey and analysis on access control schemes in cloud environment
Murray et al. Cloud service security & application vulnerability
Saravanan et al. Lattice based access control for protecting user data in cloud environments with hybrid security
Jayaraman et al. Secure privacy conserving provable data possession (SPC-PDP) framework
Satar et al. Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme
Panth et al. A survey on security mechanisms of leading cloud service providers
Alanazi Analysis of privacy and security challenges in e-health clouds
Harnal et al. Towards secure, flexible and efficient role based hospital’s cloud management system: case study
Nagaty Mobile health care on a secured hybrid cloud
French-Baidoo et al. Achieving confidentiality in electronic health records using cloud systems
Indu et al. Secure file sharing mechanism and key management for mobile cloud computing environment
Ullah et al. TCLOUD: A Trusted Storage Architecture for Cloud Computing
Begum et al. A privacy-preserving framework for personally controlled electronic health record (PCEHR) system
Sarode et al. Secure data sharing in medical cyber-physical system—a review
Mini et al. A comprehensive cloud security model with enhanced key management, access control and data anonymization features
US20140297333A1 (en) User-mediator mediating transfer of electronic content
Darwish et al. Privacy and security of cloud computing: a comprehensive review of techniques and challenges
Feldner et al. Security issues in mobile healthcare applications
Gagged et al. Improved secure dynamic bit standard technique for a private cloud platform to address security challenges
Rupasri et al. Scalable and Adaptable End-To-End Collection and Analysis of Cloud Computing Security Data: Towards End-To-End Security in Cloud Computing Systems