Devassy, 2023 - Google Patents
Research Project QuestionsDevassy, 2023
View PDF- Document ID
- 2242436598606466947
- Author
- Devassy N
- Publication year
External Links
Snippet
The management of each patient's personal health records is a prominent usage of cloud- based health information security (HIS). Real-time healthcare data sharing is now possible because to cloud computing. Health data are typically outsourced and kept on third-party …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sharma et al. | RSA based encryption approach for preserving confidentiality of big data | |
Fabian et al. | Collaborative and secure sharing of healthcare data in multi-clouds | |
JP6884642B2 (en) | Computer implementation systems and methods for protecting sensitive data through data re-encryption | |
US8995655B2 (en) | Method for creating asymmetrical cryptographic key pairs | |
Vidhya et al. | A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme | |
Suresh et al. | Securing personal health record system in cloud using user usage based encryption | |
KR101220166B1 (en) | How to manage data access permissions | |
Yang et al. | Puncturable attribute-based encryption from lattices for classified document sharing | |
Devassy | Research Project Questions | |
Ramachandran et al. | Secure and efficient data forwarding in untrusted cloud environment | |
Dutta et al. | Hybrid Encryption Technique to Enhance Security of Health Data in Cloud Environment | |
Mani et al. | Cryptography in the cloud: securing cloud data with encryption | |
Chen et al. | BTMDS: Blockchain trusted medical data sharing scheme with privacy protection and access control | |
Hussein | Cloud-Based Efficient and Secure Scheme for Medical Images Storage and Sharing using ECC and SHA-3 | |
Kumar et al. | Multiple Precision Arithmetic with Blowfish Crypto Method for Medical Data Storage Using Blockchain Technology | |
Lyu et al. | Toward Personal Data Sharing Autonomy: A Task-Driven Data Capsule Sharing System | |
CN110445756B (en) | Implementation method of searchable encrypted audit log in cloud storage | |
Vyavahare | Exploring Hybrid Encryption for Enhanced Security of Electronic Health Record in Cloud Environment | |
Raja et al. | Dynamic Remote Data Auditing using Privacy-Preserving Auditing Protocol in Cloud Environment | |
Aitkhozhayeva et al. | International standards in the field of cryptography | |
Jakhotia et al. | Novel architecture for enabling proof of retrievability using AES algorithm | |
Hasan et al. | AES Encryption for Secure Storage and Transfer of Patient Health Records using Blockchain Technology | |
Ilokah | Design of a secure privacy preserving cloud based framework for sharing electronic health data | |
Kodada et al. | FSACE: finite state automata-based client-side encryption for secure data deduplication in cloud computing | |
Ashok Reddy et al. | Identity-Based Remote Data Integrity Checking Using Lattice Approach by Third-Party Auditor |