Efficient and Privacy-Preserving Categorization for Encrypted EMR
نویسندگان
چکیده
Electronic Health Records (EHRs) must be encrypted for patient privacy; however, an EHR is a challenge the administrator to categorize. In addition, EHRs are predictable and possible guessed, although they in encryption style. this work, we propose secure scheme support categorization of EHRs, according some keywords. regard predictability focused on guessing attacks from not only storage server but also group administrator. The experiment result shows that our efficient practical.
منابع مشابه
Privacy-Preserving Queries on Encrypted Data
Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, performing queries becomes more challenging. In this paper, we study efficient and provably secure methods for queries on encrypted data stored in an outsourced database that may be susceptible to compromise. Specifically...
متن کاملAn Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data
As so much advantage of cloud computing, more and more data owners centralize their sensitive data into the cloud. With a mass of data files stored in the cloud server, it is important to provide keyword based search service to data user. However, in order to protect the data privacy, sensitive data is usually encrypted before outsourced to the cloud server, which makes the search technologies ...
متن کاملPrivacy-preserving Logarithmic-time Search on Encrypted Data in Cloud
Ideally, a privacy-preserving database-in-the-cloud environment would allow a database owner to outsource its encrypted database to a cloud server. The owner would retain control over what records can be queried and by whom, by granting each authorized user a search token and a decryption key. A user would then present this token to cloud server who would use it to find encrypted matching recor...
متن کاملEfficient Privacy Preserving Protocols for Visual Computation
The rapid expansion of the Internet is receiving a great deal of attention world-wide. The technological developments and the increase in online communications have played a vital role in revolutionalizing the Information Age. There is a tremendous growth of online applications to manipulate the user’s personal data, which has resulted in the widespread availability of the user’s personal data ...
متن کاملPrivacy Preserving for Efficient Authentication in Pervasive
In the present computer era and advancement in mobile communication system where many applications rely on the existence of small devices and small applications which exchange data in any communication networks challenging is to provide security where the significant portion of applications is based on the confidentiality and integrity of messages that are communicated by short encrypted messag...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematics
سال: 2023
ISSN: ['2227-7390']
DOI: https://doi.org/10.3390/math11030754