Search
Search Results
-
A hybrid optimization approach for securing cloud-based e-health systems
In modern healthcare, cloud-based e-health technology offers substantial benefits but faces significant security challenges. Sensitive patient data...
-
Distributed edge to cloud ensemble deep learning architecture to diagnose Covid-19 from lung image in IoT based e-Health system
Today, with the expansion of technology and new architectures of deep learning, the accuracy of artificial intelligence methods in diagnosing...
-
Exploitation of healthcare IoT–fog-based smart e-health gateways: a resource optimization approach
In the domains of health and medicine, current technology facilitates the quicker identification of effective solutions. Smart electronic health...
-
CP2EH: a comprehensive privacy-preserving e-health scheme over cloud
In the Attribute-Based Encryption (ABE) scheme, patients encrypt their electronic health record (EHR), attach the appropriate attributes with it, and...
-
A Novel Resilient and Intelligent Predictive Model for CPS-Enabled E-Health Applications
Cyber-physical-social-systems interconnect diverse technologies and communication infrastructure to the Internet for environmental sensing and...
-
Modeling the Green Cloud Continuum: integrating energy considerations into Cloud–Edge models
The energy consumption of Cloud–Edge systems is becoming a critical concern economically, environmentally, and societally; some studies suggest data...
-
Cloud-HPA: hierarchical privacy perseverance anatomy for data storage in cloud environment
Sharing the data in the cloud environment may generate some loopholes and backdoor entries for intruders. In concern to the attributes of storage...
-
Encryption with access policy and cloud data selection for secure and energy-efficient cloud computing
With the rapid advancements in technology, cloud computing has emerged as a prominent paradigm for efficient data storage and processing. However,...
-
Designing an Attribute-Based Encryption Scheme with an Enhanced Anonymity Model for Privacy Protection in E-Health
The medical field and the health care industry generate large volumes of data that are ultimately beneficial to society. Yet, the exposure of...
-
Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration
The Internet of Things (IoT) devices are used in almost every aspect of life to automate routine or critical tasks with great precision. The IoT...
-
DNA-chaos governed cryptosystem for cloud-based medical image repository
Nowadays, digital medical images have become an essential source for the grand success of e-health technology. At the same time, the massive storage...
-
An efficient secure channel establishment through lightweight key distribution in e-health communication systems
E-healthcare has significantly improved healthcare services and overall health by utilizing digital technologies such as the internet, computers, and...
-
Research on Older Adults’ Interaction with E-Health Interface Based on Explainable Artificial Intelligence
This paper proposed a comprehensive mixed-methods framework with varied samples of older adults, including user experience, usability assessments,... -
Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing
In recent days, cloud computing is a universal computing and conventional paradigm, in which the resources are provided over the Internet based on...
-
Spoofing detection system for e-health digital twin using EfficientNet Convolution Neural Network
Digital Twin is the mirror image of any living or non-living objects. Digital Twin and Cyber-physical system (CPS) provides a new era for industries...
-
Efficient Mobile Security for E Health Care Application in Cloud for Secure Payment Using Key Distribution
Through the growing attractiveness of the financial world, the e health care application has developed quicker than the previous period, such that...
-
Blockchain Survey for Security and Privacy in the e-Health Ecosystem
This survey paper focuses on the use of blockchain technology to ensure security and privacy properties in e-health applications. For that,... -
Biosignal encryption algorithm based on Ushio chaotic map for e-health
In last years, chaos-based encryption algorithms have been proposed in the literature to provide information confidentiality in digital images,...
-
Cloud Cost Visibility
Chapter 1 established the importance of a “construction project manager” (FinOps), using the analogy of building...