Page 84 - IJEEE-2022-Vol18-ISSUE-1
P. 84

80 | Hamed & Yassin

[6] T. Chakraborty, S. Jajodia, J. Katz, A. Picariello, G. Sperli,    advanced smart convergence, vol. 8, no. 2, pp. 204-210,
  and V. Subrahmanian, "FORGE: A fake online repository               2019.
  generation engine for cyber deception," IEEE Transactions         [22] I. Chiuchisan, D.-G. Balan, O. Geman, I. Chiuchisan, and
  on Dependable and Secure Computing, 2019.                           I. Gordin, "A security approach for health care information
                                                                      systems," in 2017 E-health and bioengineering conference
[7] D. He, N. Kumar, M. K. Khan, and J.-H. Lee, "Anonymous            (EHB), 2017: IEEE, pp. 721-724.
  two-factor authentication for consumer roaming service in         [23] B. Drohan, C. A. Roche, J. C. Cusack, and K. S. Hughes,
  global mobility networks," IEEE Transactions on Consumer            "Hereditary breast and ovarian cancer and other hereditary
  Electronics, vol. 59, no. 4, pp. 811-817, 2013.                     syndromes: using technology to identify carriers," Annals of
                                                                      surgical oncology, vol. 19, no. 6, pp. 1732-1737, 2012.
[8] R. Fazal, M. A. Shah, H. A. Khattak, H. T. Rauf, and F. Al-     [24] S. Shafqat, S. Kishwer, R. U. Rasool, J. Qadir, T. Amjad,
  Turjman, "Achieving data privacy for decision support               and H. F. Ahmad, "Big data analytics enhanced healthcare
  systems in times of massive data sharing," Cluster                  systems: a review," The Journal of Supercomputing, vol. 76,
  Computing, pp. 1-13, 2022.                                          no. 3, pp. 1754-1799, 2020.
                                                                    [25] F. Shafqat, M. N. A. Khan, and S. Shafqat, "SmartHealth:
[9] J. Kaur, R. A. Dara, C. Obimbo, F. Song, and K. Menard,           IoT-Enabled Context-Aware 5G Ambient Cloud Platform,"
  "A comprehensive keyword analysis of online privacy                 in IoT in Healthcare and Ambient Assisted Living: Springer,
  policies," Information Security Journal: A Global                   2021, pp. 43-67.
  Perspective, vol. 27, no. 5-6, pp. 260-275, 2018.                 [26] A. K. Das and A. Goswami, "A secure and efficient
                                                                      uniqueness-and-anonymity-preserving remote user
[10] S. K. Mukhiya and Y. Lamo, "An HL7 FHIR and GraphQL              authentication scheme for connected health care," Journal of
  approach for interoperability between heterogeneous                 medical systems, vol. 37, no. 3, pp. 1-16, 2013.
  Electronic Health Record systems," Health Informatics             [27] D. He, N. Kumar, J. Chen, C.-C. Lee, N. Chilamkurti, and
  Journal, vol. 27, no. 3, p. 14604582211043920, 2021.                S.-S. Yeo, "Robust anonymous authentication protocol for
                                                                      health-care applications using wireless medical sensor
[11] P. C. Paul, J. Loane, F. McCaffery, and G. Regan,                networks," Multimedia Systems, vol. 21, no. 1, pp. 49-60,
  "Towards Design and Development of a Data Security and              2015.
  Privacy Risk Management Framework for WBAN Based                  [28] R. Amin, S. H. Islam, G. Biswas, M. K. Khan, and N.
  Healthcare Applications," Applied System Innovation, vol. 4,        Kumar, "A robust and anonymous patient monitoring system
  no. 4, p. 76, 2021.                                                 using wireless medical sensor networks," Future Generation
                                                                      Computer Systems, vol. 80, pp. 483-495, 2018.
[12] S. T. Webb, "Hardening the Healthcare Industry Against         [29] L. Zhang, Y. Zhang, S. Tang, and H. Luo, "Privacy
  Ransomware Attacks," Utica College, 2021.                           protection for e-health systems by means of dynamic
                                                                      authentication and three-factor key agreement," IEEE
[13] L. Faulconer, "The Danger of Dealer's Choice: Why State-         Transactions on Industrial Electronics, vol. 65, no. 3, pp.
  by-State Regulation of Online Sports Betting Is Not                 2795-2805, 2017.
  Enough," NCJL & Tech., vol. 21, p. 137, 2019.                     [30] S. D. Kaul, V. K. Murty, and D. Hatzinakos, "Secure and
                                                                      privacy preserving biometric based user authentication with
[14] B. S. Dias, "Blip on The Radar: School Safety Synergy            data access control system in the healthcare environment," in
  Through Early Warning and Information Sharing," Naval               2020 International Conference on Cyberworlds (CW), 2020:
  Postgraduate School, 2020.                                          IEEE, pp. 249-256.
                                                                    [31] H. Liu, H. Ning, Y. Yue, Y. Wan, and L. T. Yang,
[15] S. R. Oh, Y. D. Seo, E. Lee, and Y. G. Kim, "A                   "Selective disclosure and yoking-proof based privacy-
  Comprehensive Survey on Security and Privacy for                    preserving authentication scheme for cloud assisted wearable
  Electronic Health Data," International Journal of                   devices," Future Generation Computer Systems, vol. 78, pp.
  Environmental Research and Public Health, vol. 18, no. 18,          976-986, 2018.
  p. 9668, 2021.                                                    [32] C. T. Li, C. C. Lee, and C. Y. Weng, "A secure cloud-
                                                                      assisted wireless body area network in mobile emergency
[16] Q. Dong, "Cloud-Connected Medical Devices for                    medical care system," Journal of medical systems, vol. 40,
  Personalized Medicine: An ECG Ring Sensor and a Home                no. 5, p. 117, 2016.
  Air Pollution Sensor," The George Washington University,          [33] X. Cheng, F. Chen, D. Xie, H. Sun, and C. Huang, "Design
  2021.                                                               of a secure medical data sharing scheme based on
                                                                      blockchain," Journal of medical systems, vol. 44, no. 2, pp.
[17] B. A. Mensah, "Implementing Blockchain Technology to             1-11, 2020.
  Develop a National Electronic Data Exchange System for            [34] M. H. Ibrahim, S. Kumari, A. K. Das, M. Wazid, and V.
  Medical Records," Colorado Technical University, 2021.              Odelu, "Secure anonymous mutual authentication for star

[18] J. Katz and Y. Lindell, Introduction to modern
  cryptography. CRC press, 2020.

[19] C. Thomas and R. T. Jose, "A comparative study on
  different hashing algorithms," International Journal of
  Innovative Research in Computer and Communication
  Engineering, vol. 3, no. 7, pp. 170-175, 2015.

[20] R. A. Muhajjar, "Use of genetic algorithm in the
  cryptanalysis of transposition ciphers," Basrah Journal of
  Scienec A, vol. 28, no. 1, pp. 49-57, 2010.

[21] G. Ganapathy and G. Kang, "An Efficient Multi-Layer
  Encryption Framework with Authentication for EHR in
  Mobile Crowd Computing," International journal of
   79   80   81   82   83   84   85   86   87   88   89