scholarly journals Correction to “Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing”

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 17045-17049 ◽  
Author(s):  
Syh-Yuan Tan
Author(s):  
S. Karthiga Devi ◽  
B. Arputhamary

Today the volume of healthcare data generated increased rapidly because of the number of patients in each hospital increasing.  These data are most important for decision making and delivering the best care for patients. Healthcare providers are now faced with collecting, managing, storing and securing huge amounts of sensitive protected health information. As a result, an increasing number of healthcare organizations are turning to cloud based services. Cloud computing offers a viable, secure alternative to premise based healthcare solutions. The infrastructure of Cloud is characterized by a high volume storage and a high throughput. The privacy and security are the two most important concerns in cloud-based healthcare services. Healthcare organization should have electronic medical records in order to use the cloud infrastructure. This paper surveys the challenges of cloud in healthcare and benefits of cloud techniques in health care industries.


2020 ◽  
Author(s):  
Zahra Zandesh

BACKGROUND The complicated nature of cloud computing encompassing internet-based technologies and service models for delivering IT applications, processing capability, storage, and memory space and some notable features motivate organizations to migrate their core businesses to the cloud. Consequently, healthcare organizations are much interested to migrate to this new paradigm despite challenges about security, privacy and compliances issues. OBJECTIVE The present study was conducted to investigate all related cloud compliances in health domain in order to find gaps in this context. METHODS All works on cloud compliance issues were surveyed after 2013 in health domain in PubMed, Scopus, Web of Science, and IEEE Digital Library databases. RESULTS Totally, 36 compliances had been found in this domain used in different countries for a variety of purposes. Initially, all founded compliances were divided into three parts as well as five standards, twenty-eight legislations and three policies and guidelines each of which is presented here by in detail. CONCLUSIONS Then, some main headlines like compliance management, data management, data governance, information security services, medical ethics, and patients' rights were recommended in terms of any compliance or frameworks and their corresponding patterns which should be involved in this domain.


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2664 ◽  
Author(s):  
Luis Belem Pacheco ◽  
Eduardo Pelinson Alchieri ◽  
Priscila Mendez Barreto

The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security.


2018 ◽  
Vol 8 (12) ◽  
pp. 2519
Author(s):  
Wei Li ◽  
Wei Ni ◽  
Dongxi Liu ◽  
Ren Liu ◽  
Shoushan Luo

With the rapid development of cloud computing, it is playing an increasingly important role in data sharing. Meanwhile, attribute-based encryption (ABE) has been an effective way to share data securely in cloud computing. In real circumstances, there is often a mutual access sub-policy in different providers’ access policies, and the significance of each attribute is usual diverse. In this paper, a secure and efficient data-sharing scheme in cloud computing, which is called unified ciphertext-policy weighted attribute-based encryption (UCP-WABE), is proposed. The weighted attribute authority assigns weights to attributes depending on their importance. The mutual information extractor extracts the mutual access sub-policy and generates the mutual information. Thus, UCP-WABE lowers the total encryption time cost of multiple providers. We prove that UCP-WABE is selectively secure on the basis of the security of ciphertext-policy weighted attribute-based encryption (CP-WABE). Additionally, the results of the implementation shows that UCP-WABE is efficient in terms of time.


2020 ◽  
Vol 19 ◽  

Fog computing is a promising technology that is used by many organizations and end-users. It has characteristics and advantages that offer services such as computing, storage, communication, and application services. It facilitates these services to end-users and allows to increase the number of devices that can connect to the network. In this paper, we provide a survey of Fog computing technology in terms of its architecture, features, advantages and disadvantages. We provide a comparison of this model with Cloud Computing, Mobile-Edge Computing, and Cloudlet Computing. We also present challenges and issues that face Fog Computing such as privacy and security, control and management, fog networking and task scheduling. Finally, we discuss aspects of Fog computing security and the benefits of integration between Fog computing and other techniques like Internet of Things and Cloud Computing.


Sign in / Sign up

Export Citation Format

Share Document