Page 84 - IJEEE-2022-Vol18-ISSUE-1
P. 84
80 | Hamed & Yassin
[6] T. Chakraborty, S. Jajodia, J. Katz, A. Picariello, G. Sperli, advanced smart convergence, vol. 8, no. 2, pp. 204-210,
and V. Subrahmanian, "FORGE: A fake online repository 2019.
generation engine for cyber deception," IEEE Transactions [22] I. Chiuchisan, D.-G. Balan, O. Geman, I. Chiuchisan, and
on Dependable and Secure Computing, 2019. I. Gordin, "A security approach for health care information
systems," in 2017 E-health and bioengineering conference
[7] D. He, N. Kumar, M. K. Khan, and J.-H. Lee, "Anonymous (EHB), 2017: IEEE, pp. 721-724.
two-factor authentication for consumer roaming service in [23] B. Drohan, C. A. Roche, J. C. Cusack, and K. S. Hughes,
global mobility networks," IEEE Transactions on Consumer "Hereditary breast and ovarian cancer and other hereditary
Electronics, vol. 59, no. 4, pp. 811-817, 2013. syndromes: using technology to identify carriers," Annals of
surgical oncology, vol. 19, no. 6, pp. 1732-1737, 2012.
[8] R. Fazal, M. A. Shah, H. A. Khattak, H. T. Rauf, and F. Al- [24] S. Shafqat, S. Kishwer, R. U. Rasool, J. Qadir, T. Amjad,
Turjman, "Achieving data privacy for decision support and H. F. Ahmad, "Big data analytics enhanced healthcare
systems in times of massive data sharing," Cluster systems: a review," The Journal of Supercomputing, vol. 76,
Computing, pp. 1-13, 2022. no. 3, pp. 1754-1799, 2020.
[25] F. Shafqat, M. N. A. Khan, and S. Shafqat, "SmartHealth:
[9] J. Kaur, R. A. Dara, C. Obimbo, F. Song, and K. Menard, IoT-Enabled Context-Aware 5G Ambient Cloud Platform,"
"A comprehensive keyword analysis of online privacy in IoT in Healthcare and Ambient Assisted Living: Springer,
policies," Information Security Journal: A Global 2021, pp. 43-67.
Perspective, vol. 27, no. 5-6, pp. 260-275, 2018. [26] A. K. Das and A. Goswami, "A secure and efficient
uniqueness-and-anonymity-preserving remote user
[10] S. K. Mukhiya and Y. Lamo, "An HL7 FHIR and GraphQL authentication scheme for connected health care," Journal of
approach for interoperability between heterogeneous medical systems, vol. 37, no. 3, pp. 1-16, 2013.
Electronic Health Record systems," Health Informatics [27] D. He, N. Kumar, J. Chen, C.-C. Lee, N. Chilamkurti, and
Journal, vol. 27, no. 3, p. 14604582211043920, 2021. S.-S. Yeo, "Robust anonymous authentication protocol for
health-care applications using wireless medical sensor
[11] P. C. Paul, J. Loane, F. McCaffery, and G. Regan, networks," Multimedia Systems, vol. 21, no. 1, pp. 49-60,
"Towards Design and Development of a Data Security and 2015.
Privacy Risk Management Framework for WBAN Based [28] R. Amin, S. H. Islam, G. Biswas, M. K. Khan, and N.
Healthcare Applications," Applied System Innovation, vol. 4, Kumar, "A robust and anonymous patient monitoring system
no. 4, p. 76, 2021. using wireless medical sensor networks," Future Generation
Computer Systems, vol. 80, pp. 483-495, 2018.
[12] S. T. Webb, "Hardening the Healthcare Industry Against [29] L. Zhang, Y. Zhang, S. Tang, and H. Luo, "Privacy
Ransomware Attacks," Utica College, 2021. protection for e-health systems by means of dynamic
authentication and three-factor key agreement," IEEE
[13] L. Faulconer, "The Danger of Dealer's Choice: Why State- Transactions on Industrial Electronics, vol. 65, no. 3, pp.
by-State Regulation of Online Sports Betting Is Not 2795-2805, 2017.
Enough," NCJL & Tech., vol. 21, p. 137, 2019. [30] S. D. Kaul, V. K. Murty, and D. Hatzinakos, "Secure and
privacy preserving biometric based user authentication with
[14] B. S. Dias, "Blip on The Radar: School Safety Synergy data access control system in the healthcare environment," in
Through Early Warning and Information Sharing," Naval 2020 International Conference on Cyberworlds (CW), 2020:
Postgraduate School, 2020. IEEE, pp. 249-256.
[31] H. Liu, H. Ning, Y. Yue, Y. Wan, and L. T. Yang,
[15] S. R. Oh, Y. D. Seo, E. Lee, and Y. G. Kim, "A "Selective disclosure and yoking-proof based privacy-
Comprehensive Survey on Security and Privacy for preserving authentication scheme for cloud assisted wearable
Electronic Health Data," International Journal of devices," Future Generation Computer Systems, vol. 78, pp.
Environmental Research and Public Health, vol. 18, no. 18, 976-986, 2018.
p. 9668, 2021. [32] C. T. Li, C. C. Lee, and C. Y. Weng, "A secure cloud-
assisted wireless body area network in mobile emergency
[16] Q. Dong, "Cloud-Connected Medical Devices for medical care system," Journal of medical systems, vol. 40,
Personalized Medicine: An ECG Ring Sensor and a Home no. 5, p. 117, 2016.
Air Pollution Sensor," The George Washington University, [33] X. Cheng, F. Chen, D. Xie, H. Sun, and C. Huang, "Design
2021. of a secure medical data sharing scheme based on
blockchain," Journal of medical systems, vol. 44, no. 2, pp.
[17] B. A. Mensah, "Implementing Blockchain Technology to 1-11, 2020.
Develop a National Electronic Data Exchange System for [34] M. H. Ibrahim, S. Kumari, A. K. Das, M. Wazid, and V.
Medical Records," Colorado Technical University, 2021. Odelu, "Secure anonymous mutual authentication for star
[18] J. Katz and Y. Lindell, Introduction to modern
cryptography. CRC press, 2020.
[19] C. Thomas and R. T. Jose, "A comparative study on
different hashing algorithms," International Journal of
Innovative Research in Computer and Communication
Engineering, vol. 3, no. 7, pp. 170-175, 2015.
[20] R. A. Muhajjar, "Use of genetic algorithm in the
cryptanalysis of transposition ciphers," Basrah Journal of
Scienec A, vol. 28, no. 1, pp. 49-57, 2010.
[21] G. Ganapathy and G. Kang, "An Efficient Multi-Layer
Encryption Framework with Authentication for EHR in
Mobile Crowd Computing," International journal of