Sood, 2023 - Google Patents
Physically Unclonable Functions with Confidential Computing for Enhanced Encryption of EHRsSood, 2023
View PDF- Document ID
- 17181649676271478547
- Author
- Sood A
- Publication year
- Publication venue
- Authorea Preprints
External Links
Snippet
Continual exploitation of Electronic Health Records (EHRs) has led to increasing amounts of ransomware and identity theft in recent years. Existing cryptosystems protecting these EHRs are weak due to their inherently transparent software that allows adversaries to extract …
- 230000006870 function 0 title abstract description 34
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10484365B2 (en) | Space-time separated and jointly evolving relationship-based network access and data protection system | |
Guin et al. | Ensuring proof-of-authenticity of IoT edge devices using blockchain technology | |
Yu et al. | A lockdown technique to prevent machine learning on PUFs for lightweight authentication | |
Turan et al. | Recommendation for password-based key derivation | |
US11683178B2 (en) | System and method for measuring and reporting IoT boot integrity | |
Lee | Security basics for computer architects | |
CN111614467B (en) | System backdoor defense method and device, computer equipment and storage medium | |
Shepherd et al. | EmLog: tamper-resistant system logging for constrained devices with TEEs | |
Wang et al. | Revisiting Anonymous Two‐Factor Authentication Schemes for IoT‐Enabled Devices in Cloud Computing Environments | |
Chen et al. | End-to-same-end encryption: Modularly augmenting an app with an efficient, portable, and blind cloud storage | |
US9264234B2 (en) | Secure authentication of identification for computing devices | |
Narendrakumar et al. | Token security for internet of things | |
Khalil et al. | Lightweight hardware security and physically unclonable functions | |
Verma et al. | A new tool for lightweight encryption on android | |
Abdulraheem | Performance Comparison of Xen AND Hyper-V in Cloud Computing While Using Cryptosystems. | |
Kirkpatrick et al. | Enforcing physically restricted access control for remote data | |
Drăguşin et al. | A Brief Overview Of Current Encryption Techniques Used In Embedded Systems: Present And Future Technologies | |
Turan et al. | Sp 800-132. recommendation for password-based key derivation: Part 1: Storage applications | |
Sood | Physically Unclonable Functions with Confidential Computing for Enhanced Encryption of EHRs | |
Sarma | Security of hard disk encryption | |
Shah | A Hybrid Model for Cloud Data Security Using ECC-DES | |
Ramesh et al. | Cha-Cha 20: stream cipher based encryption for cloud data centre | |
Banga et al. | Protecting user credentials against SQL injection through cryptography and image steganography | |
Jianluan et al. | Computer Vision Operating System of Bank Economic Management Security under 5G Wireless Communication Technology | |
Xie et al. | A lightweight dual-link accelerated authentication protocol based on NLFSR-XOR APUF |