Privacy Preserving Mobile Health Monitoring and Reduce the Outsourced Data Leakage using vCloud
Abstract
Keywords
Full Text:
PDFReferences
H. Lin, J. Shao, and Y. Fang, “Cloud-assisted privacy preserving mobile health monitoring.http://eprint.iacr org/ curr/,” IACR Cryptology ePrint Archive, 2012.
P. Mohan, D. Marin, S. Sultan, and A. Deen, “Medinet: personalizing the self-care process for patients with diabetes and cardiovascular disease using mobile telephony.” Conference Proceedings of the International Conference of IEEE Engineering in Medicine and Biology Society, vol. 2008, no. 3, pp. 755–758. [Online].Available:http://www.ncbi.nlm.nih.gov/pubmed/19162765
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,”ACM Trans. Inf. Syst. Secur., vol. 9, no. 1, pp. 1–30, 2006.
M. Green, S. Hohenberger, and B.Waters, “Outsourcing the decryption of abe ciphertexts,” in Usenix Security, 2011.
M. Layouni, K. Verslype, M. Sandıkkaya, B. De Decker, and H. Vangheluwe, “Privacy-preserving telemonitoring for ehealth,” Data and Applications Security XXIII, pp. 95–110, 2009
Zhaohui Cheng and Richard Comley. Efficient Certificateless Public Key Encryption. Cryptology ePrint Archive, Report 2005/012, 2005.
Uma Somani, Kanika Lakhani, Manish Mundra , “Implementing digital signature with RSA Encryption Algorithm to enhance the data security of cloud in Cloud Computing” [2010].
Jinyuan Li, Maxwell N. Krohn, David Mazi`eres, and Dennis Shasha. Secure untrusted data repository (SUNDR). In Proceedings of the 6th Symposium on Operating Systems Design and Implementation, pages 91–106, San Francisco, CA, December 2004.
DOI: http://dx.doi.org/10.36039/AA052014004
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.