Figure - available from: Multimedia Tools and Applications
This content is subject to copyright. Terms and conditions apply.
Example of transactional Dataset (D)

Example of transactional Dataset (D)

Source publication
Article
Full-text available
This paper proposes a secure data access control framework that utilizes the attribute values and the user specific usage details to provide secure and fine-grained data access. It aims to minimize the data leakage during data retrieval which is a critical challenge for handling health data. No standard data retrieval policies are in place for pres...

Similar publications

Article
Full-text available
KubeEdge is an open-source system extending native containerized application orchestration and device management to hosts at the edge. One of the main disadvantages of edge computing is the lack of an effective resource allocation and privacy-preserving framework. The objective of this study dynamic task offloading is an important concept in resour...

Citations

... The proposed scheme provides strong privacy protection for patient data and efficient authentication for healthcare providers. However, the scheme requires a trusted third party and is vulnerable to DoS attacks [16]. ...
Article
Full-text available
E-healthcare has significantly improved healthcare services and overall health by utilizing digital technologies such as the internet, computers, and mobile devices. However, secure communication channels play a critical role in ensuring the safety and confidentiality of patients' information. Consequently, several user authentication and key agreement protocols have been developed to address this issue. Although numerous proposed protocols are robust against security attacks, researchers have reported vulnerabilities. In this study, we evaluate one such protocol and identify vulnerabilities to insider attacks, server impersonation attacks, and replay attacks. To address these vulnerabilities, we propose a two-factor mutual authentication and key agreement scheme that offers a secure, efficient, and effective solution with low computation cost, enhanced security, and superior performance against diverse security attacks. Our proposed technique guarantees the integrity, confidentiality, and availability of patient information while ensuring the authenticity of users during communication. We conducted thorough comparisons focusing on the practical implementation of ARM microcontrollers to assess computation efficiency. The total estimated execution time of our proposed scheme for registration and authentication phases is approximately 975.8 µs, which is the shortest among all related works. This finding illustrates that our proposed scheme is well-suited for applications in e-health, telemedicine, and healthcare systems.
... Healthcare institutions could implement improved authentication processes such as two-factor authentication. Based on the confidential and sensitive nature of health data, healthcare providers should implement role-based access control systems [26]; employees should only have access to a specific assigned system level. ...
Article
Full-text available
The digitalisation of healthcare has increased the risk of cyberattacks in this sector, targeting sensitive personal information. In this paper, we conduct a systematic review of existing solutions for data breach mitigation in healthcare, analysing 99 research papers. There is a growing trend in research emphasising the security of electronic health records, data storage, access control, and personal health records. The analysis identified the adoption of advanced technologies, including Blockchain and Artificial Intelligence, alongside encryption in developing resilient solutions. These technologies lay the foundations for addressing the prevailing cybersecurity threats, with a particular focus on hacking or malicious attacks, followed by unauthorised access. The research highlights the development of strategies to mitigate data breaches and stresses the importance of technological progress in strengthening data security. The paper outlines future directions, highlighting the need for continuous technological progress and identifying the gaps in the attack mitigations.
Article
Full-text available
The purpose of this research is to identify and evaluate the technical, ethical and regulatory challenges related to the use of Artificial Intelligence (AI) in healthcare. The potential applications of AI in healthcare seem limitless and vary in their nature and scope, ranging from privacy, research, informed consent, patient autonomy, accountability, health equity, fairness, AI-based diagnostic algorithms to care management through automation for specific manual activities to reduce paperwork and human error. The main challenges faced by states in regulating the use of AI in healthcare were identified, especially the legal voids and complexities for adequate regulation and better transparency. A few recommendations were made to protect health data, mitigate risks and regulate more efficiently the use of AI in healthcare through international cooperation and the adoption of harmonized standards under the World Health Organization (WHO) in line with its constitutional mandate to regulate digital and public health. European Union (EU) law can serve as a model and guidance for the WHO for a reform of the International Health Regulations (IHR).