Remote Healthcare Monitoring System Using Attribute based Encryption
نویسندگان
چکیده
منابع مشابه
Securing Healthcare Records in the Cloud Using Attribute-Based Encryption
Cloud Computing has attracted interest as an efficient system for storing and access of data. Sharing of personal electronic health record is an arising concept of exchanging health information for research and other purposes. Cconfidentiality except for authorized users, and access auditability are strong security requirements for health record. This study will examine these requirements and p...
متن کاملUsing Wearable Sensors for Remote Healthcare Monitoring System
Recent technological advances in wireless communications and wireless sensor networks have enabled the design of low-cost, intelligent, tiny, and lightweight medical sensor nodes that can be strategically placed on human body, create a wireless body area network (WBAN) to monitor various physiological vital signs for a long period of time and providing real-time feedback to the user and medical...
متن کاملPrivacy-Preserving Personal Health Record System Using Attribute-Based Encryption
Personal health record (PHR) service is an emerging model for health information exchange. It allows patients to create, manage, control and share their health information with other users as well as healthcare providers. In reality, a PHR service is likely to be hosted by third-party cloud service providers in order to enhance its interoperability. However, there have been serious privacy conc...
متن کاملWearable Sensors for Remote Healthcare Monitoring System
In Today’s tautness life people are facing multiple physical, physiological, psychological problems. They have no time to visit doctors again and again. Sometimes there is a situation when a patient requires treatment on the spot. To solve these problems we require a technique which collects all the data about people’s disease in spaces ranging from personal to urban. Wireless sensor network (W...
متن کاملAttribute-based encryption implies identity-based encryption
In this short paper we formally prove that designing attribute-based encryption schemes cannot be easier than designing identity-based encryption schemes. In more detail, we show how an attribute-based encryption scheme which admits, at least, AND policies can be combined with a collision-resistant hash function to obtain an identity-based encryption scheme. Even if this result may seem natural...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The KIPS Transactions:PartC
سال: 2012
ISSN: 1598-2858
DOI: 10.3745/kipstc.2012.19c.1.063