Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Privacy preserving secure data exchange in mobile P2P cloud healthcare environment
by
Masud, Md. Mehedi
, Alelaiwi, Abdulhameed
, Rahman, Sk. Md. Mizanur
, Alamri, Atif
, Hossain, M. Anwar
, Hassan, Mohammad Mehedi
in
Cloud computing
/ Communications Engineering
/ Computer Communication Networks
/ Computer privacy
/ Data exchange
/ Engineering
/ Exchange
/ Health care
/ Health informatics
/ Information sharing
/ Information Systems and Communication Service
/ Mathematical models
/ Messages
/ Network security
/ Networks
/ Organizations
/ Peer to peer computing
/ Privacy
/ Signal,Image and Speech Processing
2016
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Privacy preserving secure data exchange in mobile P2P cloud healthcare environment
by
Masud, Md. Mehedi
, Alelaiwi, Abdulhameed
, Rahman, Sk. Md. Mizanur
, Alamri, Atif
, Hossain, M. Anwar
, Hassan, Mohammad Mehedi
in
Cloud computing
/ Communications Engineering
/ Computer Communication Networks
/ Computer privacy
/ Data exchange
/ Engineering
/ Exchange
/ Health care
/ Health informatics
/ Information sharing
/ Information Systems and Communication Service
/ Mathematical models
/ Messages
/ Network security
/ Networks
/ Organizations
/ Peer to peer computing
/ Privacy
/ Signal,Image and Speech Processing
2016
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Privacy preserving secure data exchange in mobile P2P cloud healthcare environment
by
Masud, Md. Mehedi
, Alelaiwi, Abdulhameed
, Rahman, Sk. Md. Mizanur
, Alamri, Atif
, Hossain, M. Anwar
, Hassan, Mohammad Mehedi
in
Cloud computing
/ Communications Engineering
/ Computer Communication Networks
/ Computer privacy
/ Data exchange
/ Engineering
/ Exchange
/ Health care
/ Health informatics
/ Information sharing
/ Information Systems and Communication Service
/ Mathematical models
/ Messages
/ Network security
/ Networks
/ Organizations
/ Peer to peer computing
/ Privacy
/ Signal,Image and Speech Processing
2016
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Privacy preserving secure data exchange in mobile P2P cloud healthcare environment
Journal Article
Privacy preserving secure data exchange in mobile P2P cloud healthcare environment
2016
Request Book From Autostore
and Choose the Collection Method
Overview
Cloud computing technology offers the possibility of inter-organizational medical data sharing at a larger scale. The different organizations can maintain their own cloud environment while exchanging healthcare data among them in a peer-to-peer(P2P) fashion according to some defined polices. However, there are many security and privacy challenges that hamper the adoption of cloud computing solutions in healthcare domain. Besides, due to the privacy sensitivity of healthcare data, an organization may not wish to disclose its identity to others when exchanging data in the network to avoid different attacks by the intruders. Hence, anonymously authenticated data exchange is essential between the different peer organizations. In this paper we propose an anonymous on-the-fly secure data exchange protocol for such environment based on pairing-based cryptography. Our proposed solution allows cloud peers to dynamically generate temporary identities that are used to produce a session key for each session of data exchange. The proposed protocol is robust against different attacks, such as target-oriented, man-in-the middle, masquerade, and message manipulation attacks.
Publisher
Springer US,Springer Nature B.V
This website uses cookies to ensure you get the best experience on our website.