Security and privacy-preserving challenges of e-health solutions in cloud computing

S Chenthara, K Ahmed, H Wang, F Whittaker - IEEE access, 2019 - ieeexplore.ieee.org
A systematic and comprehensive review of security and privacy-preserving challenges in e-
health solutions indicates various privacy preserving approaches to ensure privacy and …

[HTML][HTML] Provably throttling SQLI using an enciphering query and secure matching

MA Hussain, ZA Hussien, ZA Abduljabbar, J Ma… - Egyptian Informatics …, 2022 - Elsevier
Web applications, which dominate the internet, act as communication media between
customers and service providers. Web applications are an internet innovation that provide …

Searchable encryption on the cloud: a survey

N Andola, R Gahlot, VK Yadav, S Venkatesan… - The Journal of …, 2022 - Springer
Outsourcing data to the cloud can be considered as a perfect solution for the storage and
computationally constrained data owners. However, data confidentiality is compromised …

Big data privacy and security using abundant data recovery techniques and data obliviousness methodologies

S Funde, G Swain - IEEE Access, 2022 - ieeexplore.ieee.org
The concept of big data security is introduced in this article along with many features. It
illustrates the need for security in healthcare systems as the volume of data increases …

Searchable encryption architectures: survey of the literature and proposing a unified architecture

W Almobaideen, H Jarboua… - International Journal of …, 2020 - inderscienceonline.com
While the world is developing rapidly, cloud security becomes the main concern of the era,
especially when dealing with big data and different environments. Users and different …

Security analysis, threats, & challenges in database

M Rijah - 2021 - 192.248.66.13
Database security alludes to keeping unauthorized users from getting into the data set and
to its core whether it is incidental or purposeful. Accordingly, every one of the organizations …

Towards Building Data Trust and Transparency in Data-Driven Business Applications

A Rath, W Codenie, A Hristoskova - … 2020, USDAI 2020, and WAISE 2020 …, 2020 - Springer
In view of deriving business value from their (product) data, organisations need to adopt the
right method and technology to analyse these data to infer new insights and business …

[PDF][PDF] Privacy Preservation of Electronic Health Records Using Blockchain Technology: Healthchain

S Chenthara - 2021 - vuir.vu.edu.au
The right to privacy is the most fundamental right of a citizen in any country. Electronic
Health Records (EHRs) in healthcare has faced problems with privacy breaches, insider …

Determination of Parameters Balancing between Security and Search Performance on Searchable Encryption

I Mori, T Hirano, Y Nakamura… - … Conference on Mobile …, 2021 - ieeexplore.ieee.org
In the searchable encryption, searching encrypted data is slow, compared to searching non-
encrypted data. As a solution, there is an acceleration method that discloses a small portion …

[PDF][PDF] エッジAI における訓練データ検索システムに関する研究

森郁海 - 2022 - fun.repo.nii.ac.jp
要旨エッジ AI (Artificial Intelligence) は, セキュリティの問題や応答時間へのリアルタイム要求に
応えるなどの目的で, データの生成元に近いエッジ上で機械学習や深層学習などの知的処理を実行 …