Mostra el registre d'ítem simple
Cost-effective secure e-health cloud system using identity based cryptographic techniques
dc.contributor.author | Wang, Xu An |
dc.contributor.author | Ma, Jianfeng |
dc.contributor.author | Xhafa Xhafa, Fatos |
dc.contributor.author | Zhang, Mingwu |
dc.contributor.author | Luo, Xiaoshuang |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament de Ciències de la Computació |
dc.date.accessioned | 2016-09-23T14:16:43Z |
dc.date.available | 2018-08-31T00:30:47Z |
dc.date.issued | 2016-08-31 |
dc.identifier.citation | Wang, X., Ma, J., Xhafa, F., Zhang, M., Luo, X. Cost-effective secure e-health cloud system using identity based cryptographic techniques. "Future generation computer systems", Febrer 2017, vol. 67, p.242-254. |
dc.identifier.issn | 0167-739X |
dc.identifier.uri | http://hdl.handle.net/2117/90174 |
dc.description.abstract | Nowadays E-health cloud systems are more and more widely employed. However the security of these systems needs more consideration for the sensitive health information of patients. Some protocols on how to secure the e-health cloud system have been proposed, but many of them use the traditional PKI infrastructure to implement cryptographic mechanisms, which is cumbersome for they require every user having and remembering its own public/private keys. Identity based encryption (View the MathML sourceIBE) is a cryptographic primitive which uses the identity information of the user (e.g., email address) as the public key. Hence the public key is implicitly authenticated and the certificate management is simplified. Proxy re-encryption is another cryptographic primitive which aims at transforming a ciphertext under the delegator AA into another ciphertext which can be decrypted by the delegatee BB. In this paper, we describe several identity related cryptographic techniques for securing E-health system, which include new View the MathML sourceIBE schemes, new identity based proxy re-encryption (View the MathML sourceIBPRE) schemes. We also prove these schemes’ security and give the performance analysis, the results show our View the MathML sourceIBPRE scheme is especially highly efficient for re-encryption, which can be used to achieve cost-effective cloud usage. |
dc.language.iso | eng |
dc.publisher | Elsevier |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica |
dc.subject.lcsh | Cloud computing |
dc.subject.lcsh | Computer security |
dc.subject.lcsh | Medical records--Data processing |
dc.subject.other | Secure e-health cloud system |
dc.subject.other | Identity based encryption |
dc.subject.other | Identity based proxy re-encryption |
dc.subject.other | Cost-effective |
dc.title | Cost-effective secure e-health cloud system using identity based cryptographic techniques |
dc.type | Article |
dc.subject.lemac | Computació en núvol |
dc.subject.lemac | Encriptació de dades (Informàtica) |
dc.subject.lemac | Històries clíniques -- Informàtica |
dc.identifier.doi | 10.1016/j.future.2016.08.008 |
dc.description.peerreviewed | Peer Reviewed |
dc.relation.publisherversion | http://www.sciencedirect.com/science/article/pii/S0167739X16302588 |
dc.rights.access | Open Access |
local.identifier.drac | 18817705 |
dc.description.version | Postprint (author's final draft) |
local.citation.author | Wang, X.; Ma, J.; Xhafa, F.; Zhang, M.; Luo, X. |
local.citation.publicationName | Future generation computer systems |
local.citation.volume | 67 |
local.citation.startingPage | 242 |
local.citation.endingPage | 254 |
Fitxers d'aquest items
Aquest ítem apareix a les col·leccions següents
-
Articles de revista [1.046]