A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography
暂无分享,去创建一个
M. Shamim Hossain | Atif Alamri | Ahmad Almogren | Sk Md Mizanur Rahman | Hadeal Abdulaziz Al Hamid | M. S. Hossain | Ahmad S. Almogren | Atif Alamri | S. Rahman | Sk Md Mizanur Rahman | M. S. Hossain | Hadeal Abdulaziz Al Hamid
[1] Karamjeet Singh,et al. IMAGE ENCRYPTION AND DECRYPTION USING BLOWFISH ALGORITHM IN MATLAB , 2013 .
[2] Manreet Kaur,et al. Fog Computing Providing Data Security: A Review , 2014 .
[3] Hien Ba Nguyen. An overview of the NTRU cryptographic system , 2014 .
[4] A. Menezes. An Introduction to Pairing-Based Cryptography , 2005 .
[5] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[6] A. Malla Reddy,et al. Securing the cloud using Decoy Information Technology to preventing them from distinguishing the Real Sensitive data from fake Worthless data , 2013 .
[7] Min Chen,et al. Wearable 2.0: Enabling Human-Cloud Integration in Next Generation Healthcare Systems , 2017, IEEE Communications Magazine.
[8] M. Shamim Hossain,et al. Healthcare Big Data Voice Pathology Assessment Framework , 2016, IEEE Access.
[9] Bora A. Akyol. Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry , 2012 .
[10] S. Solanke Vikas,et al. Mobile cloud computing: Security threats , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).
[11] Min Chen,et al. Disease Prediction by Machine Learning Over Big Data From Healthcare Communities , 2017, IEEE Access.
[12] M. Shamim Hossain,et al. Toward end-to-end biomet rics-based security for IoT infrastructure , 2016, IEEE Wireless Communications.
[13] Sonali Khairnar,et al. FOG COMPUTING: A NEW CONCEPT TO MINIMIZE THE ATTACKS AND TO PROVIDE SECURITY IN CLOUD COMPUTING ENVIRONMENT , 2014 .
[14] Vaibhav Patel,et al. A Hybrid Protocol to Secure the Cloud from Insider Threats , 2014, 2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).
[15] Jordan Shropshire,et al. Extending the Cloud with Fog: Security Challenges & Opportunities , 2014, AMCIS.
[16] Khalil El-Khatib,et al. Private key agreement and secure communication for heterogeneous sensor networks , 2010, J. Parallel Distributed Comput..
[17] Min Chen,et al. Emotion Communication System , 2017, IEEE Access.
[18] Arbat Rashmi Vinod,et al. HINDERING DATA THEFT ATTACK THROUGH FOG COMPUTING , 2014 .
[19] Nagesh Kumar,et al. DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .
[20] Yunhao Liu,et al. Big Data: A Survey , 2014, Mob. Networks Appl..
[21] Min Chen,et al. A 5G Cognitive System for Healthcare , 2017, Big Data Cogn. Comput..
[22] Fan Yu,et al. Towards large-scale twitter mining for drug-related adverse events , 2012, SHB '12.
[23] Amit K. Awasthi,et al. A Key Agreement Algorithm Based on ECDSA for Wireless Sensor Network , 2016 .
[24] B Nayak. Signcryption schemes based on elliptic curve cryptography , 2014 .
[25] Ayse Cufoglu,et al. User Profiling - A Short Review , 2014 .
[26] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[27] Salvatore J. Stolfo,et al. Bait and Snitch: Defending Computer Systems with Decoys , 2013 .
[28] Malek Ben Salem,et al. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[29] Wentao Liu,et al. Research on cloud computing security problem and strategy , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).
[30] Viju Raghupathi,et al. An Overview of Health Analytics , 2013 .
[31] S. Sunanda,et al. A Secure Framework for Mollifying Attacks in Cloud , 2014 .
[32] G. Dileep Kumar,et al. SURVEY ON INSIDER DATA THEFT MISUSE ATTACKS IN THE CLOUD , 2014 .
[33] Wayne A. Jansen,et al. Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[34] Ragib Hasan,et al. Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems , 2013, ArXiv.
[35] Hadeal Abdulaziz Al-Hamid,et al. Securing photos in the cloud using decoy photo gallery , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[36] Mehedi Masud,et al. Towards Secure Data Exchange in Peer-to-Peer Data Management Systems , 2014 .
[37] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[38] Roberto Di Pietro,et al. Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..
[39] Allen Roginsky,et al. Report on Pairing-based Cryptography , 2015, Journal of research of the National Institute of Standards and Technology.
[40] Saeid Gorgin,et al. A Review on Modern Distributed Computing Paradigms: Cloud Computing, Jungle Computing and Fog Computing , 2014, J. Comput. Inf. Technol..
[41] Michael Scott,et al. Implementing Cryptographic Pairings on Smartcards , 2006, CHES.
[42] M. Shamim Hossain,et al. Cloud-assisted Industrial Internet of Things (IIoT) - Enabled framework for health monitoring , 2016, Comput. Networks.
[43] Ahmad A. Al-Daraiseh,et al. Effectiveness of Iphone’s Touch ID: KSA Case Study , 2015 .
[44] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.