Efficient and Privacy-Preserving Categorization for Encrypted EMR

نویسندگان

چکیده

Electronic Health Records (EHRs) must be encrypted for patient privacy; however, an EHR is a challenge the administrator to categorize. In addition, EHRs are predictable and possible guessed, although they in encryption style. this work, we propose secure scheme support categorization of EHRs, according some keywords. regard predictability focused on guessing attacks from not only storage server but also group administrator. The experiment result shows that our efficient practical.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-Preserving Queries on Encrypted Data

Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, performing queries becomes more challenging. In this paper, we study efficient and provably secure methods for queries on encrypted data stored in an outsourced database that may be susceptible to compromise. Specifically...

متن کامل

An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data

As so much advantage of cloud computing, more and more data owners centralize their sensitive data into the cloud. With a mass of data files stored in the cloud server, it is important to provide keyword based search service to data user. However, in order to protect the data privacy, sensitive data is usually encrypted before outsourced to the cloud server, which makes the search technologies ...

متن کامل

Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud

Ideally, a privacy-preserving database-in-the-cloud environment would allow a database owner to outsource its encrypted database to a cloud server. The owner would retain control over what records can be queried and by whom, by granting each authorized user a search token and a decryption key. A user would then present this token to cloud server who would use it to find encrypted matching recor...

متن کامل

Efficient Privacy Preserving Protocols for Visual Computation

The rapid expansion of the Internet is receiving a great deal of attention world-wide. The technological developments and the increase in online communications have played a vital role in revolutionalizing the Information Age. There is a tremendous growth of online applications to manipulate the user’s personal data, which has resulted in the widespread availability of the user’s personal data ...

متن کامل

Privacy Preserving for Efficient Authentication in Pervasive

In the present computer era and advancement in mobile communication system where many applications rely on the existence of small devices and small applications which exchange data in any communication networks challenging is to provide security where the significant portion of applications is based on the confidentiality and integrity of messages that are communicated by short encrypted messag...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematics

سال: 2023

ISSN: ['2227-7390']

DOI: https://doi.org/10.3390/math11030754