Privacy-preserving fusion of IoT and big data for e-health

Y Yang, X Zheng, W Guo, X Liu, V Chang - Future Generation Computer …, 2018 - Elsevier
In this paper, we propose a privacy-preserving e-health system, which is a fusion of Internet-
of-things (IoT), big data and cloud storage. The medical IoT network monitors patient's …

Smart pathological brain detection by synthetic minority oversampling technique, extreme learning machine, and Jaya algorithm

YD Zhang, G Zhao, J Sun, X Wu, ZH Wang… - Multimedia Tools and …, 2018 - Springer
Pathological brain detection is an automated computer-aided diagnosis for brain images.
This study provides a novel method to achieve this goal. We first used synthetic minority …

Privacy-Preserving Multi-Keyword Top- Similarity Search Over Encrypted Data

X Ding, P Liu, H Jin - IEEE Transactions on Dependable and …, 2017 - ieeexplore.ieee.org
Cloud computing provides individuals and enterprises massive computing power and
scalable storage capacities to support a variety of big data applications in domains like …

Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability

K Zhang, H Li, J Ma, X Liu - Science China Information Sciences, 2018 - Springer
Traceable multi-authority ciphertext-policy attribute-based encryption (CP-ABE) is a practical
encryption method that can achieve user traceability and fine-grained access control …

Blockchain-aided anonymous traceable and revocable access control scheme with dynamic policy updating for the cloud IoT

L Zhang, X Li, Q Wu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The Internet of Things has been applied in various fields of industry, which has promoted the
intelligent development of the industry and improved efficiency in industrial production. The …

A lightweight policy preserving EHR sharing scheme in the cloud

Z Ying, L Wei, Q Li, X Liu, J Cui - IEEE Access, 2018 - ieeexplore.ieee.org
Electronic Health Record (EHR) is a digital health documentary. It contains not only the
health-related records but also the personal sensitive information. Therefore, how to reliably …

Security and information assurance for IoT-based big data

MK Abiodun, JB Awotunde, RO Ogundokun… - Artificial Intelligence for …, 2021 - Springer
Abstract Internet of Things (IoT) based devices generated big data that comprises all data
collected by sensors equipment, both structured semi-structured, and unstructured, that can …

DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices

Q Huang, L Wang, Y Yang - World Wide Web, 2018 - Springer
Abstract The Internet of Things (IoT) is a novel paradigm where many of the objects that
surround us can be connected to the internet. Since IoT is always related to user's personal …

[HTML][HTML] Granular data access control with a patient-centric policy update for healthcare

F Khan, S Khan, S Tahir, J Ahmad, H Tahir, SA Shah - Sensors, 2021 - mdpi.com
Healthcare is a multi-actor environment that requires independent actors to have a different
view of the same data, hence leading to different access rights. Ciphertext Policy-Attribute …

[HTML][HTML] Multiauthority attribute-based encryption with traceable and dynamic policy updating

J Ling, J Chen, J Chen, W Gan - Security and Communication …, 2021 - hindawi.com
Ciphertext policy attribute-based encryption (CP-ABE) is an encryption mechanism that can
provide fine-grained access control and adequate cloud storage security for Internet of …