[go: up one dir, main page]

Devassy, 2023 - Google Patents

Research Project Questions

Devassy, 2023

View PDF
Document ID
2242436598606466947
Author
Devassy N
Publication year

External Links

Snippet

The management of each patient's personal health records is a prominent usage of cloud- based health information security (HIS). Real-time healthcare data sharing is now possible because to cloud computing. Health data are typically outsourced and kept on third-party …
Continue reading at norma.ncirl.ie (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Similar Documents

Publication Publication Date Title
Sharma et al. RSA based encryption approach for preserving confidentiality of big data
Fabian et al. Collaborative and secure sharing of healthcare data in multi-clouds
JP6884642B2 (en) Computer implementation systems and methods for protecting sensitive data through data re-encryption
US8995655B2 (en) Method for creating asymmetrical cryptographic key pairs
Vidhya et al. A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme
Suresh et al. Securing personal health record system in cloud using user usage based encryption
KR101220166B1 (en) How to manage data access permissions
Yang et al. Puncturable attribute-based encryption from lattices for classified document sharing
Devassy Research Project Questions
Ramachandran et al. Secure and efficient data forwarding in untrusted cloud environment
Dutta et al. Hybrid Encryption Technique to Enhance Security of Health Data in Cloud Environment
Mani et al. Cryptography in the cloud: securing cloud data with encryption
Chen et al. BTMDS: Blockchain trusted medical data sharing scheme with privacy protection and access control
Hussein Cloud-Based Efficient and Secure Scheme for Medical Images Storage and Sharing using ECC and SHA-3
Kumar et al. Multiple Precision Arithmetic with Blowfish Crypto Method for Medical Data Storage Using Blockchain Technology
Lyu et al. Toward Personal Data Sharing Autonomy: A Task-Driven Data Capsule Sharing System
CN110445756B (en) Implementation method of searchable encrypted audit log in cloud storage
Vyavahare Exploring Hybrid Encryption for Enhanced Security of Electronic Health Record in Cloud Environment
Raja et al. Dynamic Remote Data Auditing using Privacy-Preserving Auditing Protocol in Cloud Environment
Aitkhozhayeva et al. International standards in the field of cryptography
Jakhotia et al. Novel architecture for enabling proof of retrievability using AES algorithm
Hasan et al. AES Encryption for Secure Storage and Transfer of Patient Health Records using Blockchain Technology
Ilokah Design of a secure privacy preserving cloud based framework for sharing electronic health data
Kodada et al. FSACE: finite state automata-based client-side encryption for secure data deduplication in cloud computing
Ashok Reddy et al. Identity-Based Remote Data Integrity Checking Using Lattice Approach by Third-Party Auditor