secure information sharing
Recently Published Documents


TOTAL DOCUMENTS

64
(FIVE YEARS 10)

H-INDEX

10
(FIVE YEARS 1)

2021 ◽  
Vol 3 ◽  
Author(s):  
Emmanouil G. Spanakis ◽  
Stelios Sfakianakis ◽  
Silvia Bonomi ◽  
Claudio Ciccotelli ◽  
Sabina Magalini ◽  
...  

This work aims to provide information, guidelines, established practices and standards, and an extensive evaluation on new and promising technologies for the implementation of a secure information sharing platform for health-related data. We focus strictly on the technical aspects and specifically on the sharing of health information, studying innovative techniques for secure information sharing within the health-care domain, and we describe our solution and evaluate the use of blockchain methodologically for integrating within our implementation. To do so, we analyze health information sharing within the concept of the PANACEA project that facilitates the design, implementation, and deployment of a relevant platform. The research presented in this paper provides evidence and argumentation toward advanced and novel implementation strategies for a state-of-the-art information sharing environment; a description of high-level requirements for the transfer of data between different health-care organizations or cross-border; technologies to support the secure interconnectivity and trust between information technology (IT) systems participating in a sharing-data “community”; standards, guidelines, and interoperability specifications for implementing a common understanding and integration in the sharing of clinical information; and the use of cloud computing and prospectively more advanced technologies such as blockchain. The technologies described and the possible implementation approaches are presented in the design of an innovative secure information sharing platform in the health-care domain.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 3050-3053

Cloud computing is rapidly getting to be a direct result of the provisioning of flexible, versatile, and on-ask for storing and figuring administrations for customers. In cloud-based capacity idea, information proprietor does not have full power over claim information since information is controlled by the outsider called cloud service providers (CSP). Information security is testing issue when information proprietor shares claim information to another entity known as information sharer on cloud. Numerous specialists have tended to this issue by using cryptography with various encryption plots, that give secure information sharing on cloud. Here, we propose framework for secure information sharing on cloud with intension to give information secrecy, get to control all of the offered information, expelling the weight of key administration and document encryption/unscrambling by clients, bolster progressively changes of client’s participation and also working on providing information to the client whenever he/she needs it without the proprietor being constantly online to provide the same


The objective of the research work is focused on cloud computing which is a developing design to give secure change among continuous applications. Secure information sharing is characterized as transmission of at least one documents profitably this procedure is utilized to share data's, characteristics, records among different clients and associations in secure mode and verifies from outsider clients. Usually it is finished by encryption and unscrambling process over private system. This kind of information sharing is finished by new innovation of key cipher text KC-ABE. It can give secure record transmission by having confined access innovation. This developing procedure has been checked in tolerant individual wellbeing record upkeep. These documents are recorded and recovered safely without access by unapproved clients. KC-ABE encryption framework is material to produce for adaptable and secure sharing of information's in distributed computing, which will reinforcement persistent wellbeing creating records in increasingly defensive manner. In KC-ABE strategy, the subtleties of patient are put away in KC-ABE server farm. In KC-ABE, Key backer just legitimize the entrance control and can't issue by the encryption. Along these lines the relating tolerant just reserve the options to get to this KC-ABE innovation. It gives more secure information sharing than other encryption framework. The fundamental utilization of this technique are High key age time and encryption time. It can accomplish less encryption time and key age time to improve productivity of KC-ABE.


To give a community oriented way to deal with effective information partaking in OSN. To make limit dependent on which the client makes the last choice on information posting. A high limit demonstrates that the client has a generally low propensity to impart the information to other people, and just when the larger part of the included clients or clients that are profoundly trusted consent to post the information, the information can at long last be posted. By tuning the edge, the client can make an exchange off between information sharing and protection saving. To give programmed remark examination and remark blocking approach for secure picture sharing.


2019 ◽  
Vol 95 ◽  
pp. 430-444 ◽  
Author(s):  
J.L. Gonzalez-Compean ◽  
Oscar Telles ◽  
Ivan Lopez-Arevalo ◽  
Miguel Morales-Sandoval ◽  
Victor J. Sosa-Sosa ◽  
...  

2019 ◽  
Vol 2019 ◽  
pp. 1-16
Author(s):  
Hyun-A Park

Recently, privacy emerged as a hot issue again, as the General Data Protection Regulation (GDPR) of EU has become enforceable since May 25, 2018. This paper deals with the problem of health information sharing on a website securely and with preserving privacy. In the context of patient networks (such as ‘PatientsLikeMe’ or ‘CureTogether’), we propose the model Secure Information Sharing System (SISS) with the main method of group key cryptosystem. SISS addresses important problems of group key systems. (1) The new developed equations for encryption and decryption can eliminate the rekeying and redistribution process for every membership-change of the group, keeping the security requirements. (2) The new 3D Stereoscopic Image Mobile Security Technology with AR (augmented reality) solves the problem of conspiracy by group members. (3) SISS uses the reversed one-way hash chain to guarantee forward secrecy and backward accessibility (security requirements for information sharing in a group). We conduct a security analysis of SISS according to group information sharing secrecy and an experiment on its performance. Consequently, although current IT paradigm is changing to be more and more ‘complicated’, ‘overlapped’, and ‘virtualized’, SISS makes it possible to securely share sensitive information from collaborative work.


Sign in / Sign up

Export Citation Format

Share Document