From: ReportFlow: an application for EEG visualization and reporting using cloud platform
First author | Method | Setting | Cloud accessibility | Access control | Encryption technique |
---|---|---|---|---|---|
Bertuccio | ReportFlow | EEGs data sharing for medical reporting | Public | RBAC | CP-ABE |
Pugazhenthi | ID HKE | Securing and sharing of health data | Public | Not indicated | SE-KAC |
Ahmed | CONNECT and ad hoc protocol | EHRs data sharing | Public | DAC | Not indicated |
Basu | Fusion | EHRs data sharing and managing | Public and private | Not indicated | Symmetric |
Marwan | Shamir’s secret share scheme | Securing health data | Public and private | Shamir’s secret share scheme | Shamir’s secret share scheme |
Sneha | K-Anonymity | Securing and sharing of EHRs | Public | Not indicated | Re-encryption |
Hwang | – | Data securing | Public | Not indicated | Knapsack public-key cryptosystem |
Wei | EFADS | Data sharing for outsourcing data | Not indicated | Not indicated | Proxy re-encryption |
Chu | – | Securing and sharing of scalable data | Public and private | Shamir’s secret share scheme | Key-aggregate encryption |
Rezaeibagha | – | Securing and sharing of EHRs | Public and private | RBAC | Cryptographic building blocks for secret sharing |
Thilakanathan | Ad hoc Java application | Securing and sharing of ECG data | Public | Not indicated | Public-key cryptography system |
Tran | – | Securing and sharing of cloud-based social networks data | Public | Personal secret key to encrypt and decrypt data | Proxy re-encryption |