A systematic review of homomorphic encryption and its contributions in healthcare industry

K Munjal, R Bhatia - Complex & Intelligent Systems, 2023 - Springer
Cloud computing and cloud storage have contributed to a big shift in data processing and its
use. Availability and accessibility of resources with the reduction of substantial work is one of …

Data localization and privacy-preserving healthcare for big data applications: Architecture and future directions

A Verma, P Bhattacharya, Y Patel, K Shah… - … and Smart Cities …, 2022 - Springer
With the exponential rise of generated big data in Healthcare 4.0 ecosystems, the data is
shared among multiple stakeholders for analysis and data collection process. During the …

全同态加密文献计量分析研究.

陈智罡, 宋新霞, 郑梦策… - Journal of Computer …, 2022 - search.ebscohost.com
全同态加密在不解密的情况下, 能够对密文数据进行任意处理. 这种特殊的性质能够立竿见影地
解决数据隐私安全问题. 目前全同态加密已经成为学术界, 工业界乃至商业界的热门话题 …

The Avg-Act Swap and Plaintext Overflow Detection in Fully Homomorphic Operations Over Deep Circuits

I Nam - Proceedings of the Fourteenth ACM Conference on …, 2024 - dl.acm.org
Fully homomorphic encryption is a cryptographic scheme that enables any function to be
computed on encrypted data. Although homomorphic evaluation on deep circuits has many …

Secure predictive analysis on heart diseases using partially homomorphic machine learning model

MD Boomija, SV Kasmir Raja - Proceedings of International Joint …, 2022 - Springer
Cardiovascular disease is the most important reason for death worldwide and significant
public health distress. Timely prevention and treatment are possible by early prediction of …

[PDF][PDF] How to strengthen Cloud Computing exploiting solutions to Edge

A Catalfamo - Universitá degli Studi di Messina, 2023 - iris.unime.it
The present PhD thesis deepens Cloud Computing's known issues proposing different
solutions in order to overcome them. The proposed solutions in the thesis exploit Edge …

A Secure Framework for Privacy-Preserving Analytics in Healthcare Records Using Zero-Knowledge Proofs and Blockchain in Multi-Tenant Cloud Environments

SB Babu, KR Jothi - IEEE Access, 2024 - ieeexplore.ieee.org
In the realm of healthcare analytics, preserving the privacy of sensitive data while enabling
valuable insights poses a significant challenge. Cryptographic operations play an inevitable …

A homomorphic encryption service to secure data processing in a cloud/edge continuum context

A Catalfamo, A Celesti, M Fazio… - 2022 9th International …, 2022 - ieeexplore.ieee.org
For years, one of the major issues against the adoption of Cloud computing has been
security. Typically, with traditional symmetric and asymmetric encryption schemes, data can …

On the performance and effectiveness of digital contact tracing in the second wave of COVID-19 in Italy

L Maccari - IEEE Transactions on Computational Social …, 2022 - ieeexplore.ieee.org
Contact-tracing smartphone applications have been developed and used as a complement
to manual contact tracing in the COVID-19 pandemic. The goal of these apps is to trace …

Optimizing Information Leakage in Multi Cloud Storage Services

R Baalagi, H Sindhura, M Keerthi… - Advances in Science and …, 2023 - Trans Tech Publ
Many new strategies for storing data across different clouds have lately been proposed.
Because a single point of attack can't leak all the information, distributing data among …