Internet of things for smart healthcare: Technologies, challenges, and opportunities

SB Baker, W Xiang, I Atkinson - Ieee Access, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) technology has attracted much attention in recent years for its
potential to alleviate the strain on healthcare systems caused by an aging population and a …

Security and privacy-preserving challenges of e-health solutions in cloud computing

S Chenthara, K Ahmed, H Wang, F Whittaker - IEEE access, 2019 - ieeexplore.ieee.org
A systematic and comprehensive review of security and privacy-preserving challenges in e-
health solutions indicates various privacy preserving approaches to ensure privacy and …

[HTML][HTML] A dynamic four-step data security model for data in cloud computing based on cryptography and steganography

R Adee, H Mouratidis - Sensors, 2022 - mdpi.com
Cloud computing is a rapidly expanding field. It allows users to access computer system
resources as needed, particularly data storage and computational power, without managing …

An efficient authentication scheme for blockchain-based electronic health records

F Tang, S Ma, Y Xiang, C Lin - IEEE access, 2019 - ieeexplore.ieee.org
In traditional electronic health records (EHRs), medical-related information is generally
separately controlled by different hospitals and thus it leads to the inconvenience of …

Secondary use of electronic health record: Opportunities and challenges

SM Shah, RA Khan - IEEE access, 2020 - ieeexplore.ieee.org
In the present technological era, healthcare providers generate huge amounts of clinical
data on a daily basis. Generated clinical data is stored digitally in the form of Electronic …

Privacy-preserving attribute-based access control model for XML-based electronic health record system

K Seol, YG Kim, E Lee, YD Seo, DK Baik - IEEE Access, 2018 - ieeexplore.ieee.org
Cloud-based electronic health record (EHR) systems enable medical documents to be
exchanged between medical institutions; this is expected to contribute to improvements in …

A survey on access control mechanisms for cloud computing

R El Sibai, N Gemayel, J Bou Abdo… - Transactions on …, 2020 - Wiley Online Library
Cloud computing is an Internet‐based computing where the information technology
resources are provided to end users following their request. With this technology, users and …

Real-time medical systems based on human biometric steganography: A systematic review

AH Mohsin, AA Zaidan, BB Zaidan, SA Ariffin… - Journal of medical …, 2018 - Springer
In real-time medical systems, the role of biometric technology is significant in authentication
systems because it is used in verifying the identity of people through their biometric features …

Blockchain-based access control scheme with incentive mechanism for eHealth systems: patient as supervisor

C Gan, A Saini, Q Zhu, Y Xiang, Z Zhang - Multimedia Tools and …, 2021 - Springer
This paper is dedicated to investigating the application of blockchain in eHealth systems.
Unlike the previous work, patients here play a supervisory role and allow medical institutions …

Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem

W Yang, S Wang, J Hu, G Zheng, J Chaudhry… - IEEE …, 2018 - ieeexplore.ieee.org
Most existing biometric systems designed for healthcare applications only use biometrics for
authentication/access control without considering its other function-data encryption. In this …