[go: up one dir, main page]

Sood, 2023 - Google Patents

Physically Unclonable Functions with Confidential Computing for Enhanced Encryption of EHRs

Sood, 2023

View PDF
Document ID
17181649676271478547
Author
Sood A
Publication year
Publication venue
Authorea Preprints

External Links

Snippet

Continual exploitation of Electronic Health Records (EHRs) has led to increasing amounts of ransomware and identity theft in recent years. Existing cryptosystems protecting these EHRs are weak due to their inherently transparent software that allows adversaries to extract …
Continue reading at www.techrxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Similar Documents

Publication Publication Date Title
US10484365B2 (en) Space-time separated and jointly evolving relationship-based network access and data protection system
Guin et al. Ensuring proof-of-authenticity of IoT edge devices using blockchain technology
Yu et al. A lockdown technique to prevent machine learning on PUFs for lightweight authentication
Turan et al. Recommendation for password-based key derivation
US11683178B2 (en) System and method for measuring and reporting IoT boot integrity
Lee Security basics for computer architects
CN111614467B (en) System backdoor defense method and device, computer equipment and storage medium
Shepherd et al. EmLog: tamper-resistant system logging for constrained devices with TEEs
Wang et al. Revisiting Anonymous Two‐Factor Authentication Schemes for IoT‐Enabled Devices in Cloud Computing Environments
Chen et al. End-to-same-end encryption: Modularly augmenting an app with an efficient, portable, and blind cloud storage
US9264234B2 (en) Secure authentication of identification for computing devices
Narendrakumar et al. Token security for internet of things
Khalil et al. Lightweight hardware security and physically unclonable functions
Verma et al. A new tool for lightweight encryption on android
Abdulraheem Performance Comparison of Xen AND Hyper-V in Cloud Computing While Using Cryptosystems.
Kirkpatrick et al. Enforcing physically restricted access control for remote data
Drăguşin et al. A Brief Overview Of Current Encryption Techniques Used In Embedded Systems: Present And Future Technologies
Turan et al. Sp 800-132. recommendation for password-based key derivation: Part 1: Storage applications
Sood Physically Unclonable Functions with Confidential Computing for Enhanced Encryption of EHRs
Sarma Security of hard disk encryption
Shah A Hybrid Model for Cloud Data Security Using ECC-DES
Ramesh et al. Cha-Cha 20: stream cipher based encryption for cloud data centre
Banga et al. Protecting user credentials against SQL injection through cryptography and image steganography
Jianluan et al. Computer Vision Operating System of Bank Economic Management Security under 5G Wireless Communication Technology
Xie et al. A lightweight dual-link accelerated authentication protocol based on NLFSR-XOR APUF