English
| 正體中文 |
简体中文
|
全文筆數/總筆數 : 46833/50693 (92%)
造訪人次 : 11846451 線上人數 : 568
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library IR team.
搜尋範圍
全部CCUR
理學院
理工學院
應數系
--期刊論文
查詢小技巧:
您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
進階搜尋
主頁
‧
登入
‧
上傳
‧
說明
‧
關於CCUR
‧
管理
文化大學機構典藏 CCUR
>
理工學院
>
理學院
>
應數系
>
期刊論文
>
Item 987654321/51887
資料載入中.....
書目資料匯出
Endnote RIS 格式資料匯出
Bibtex 格式資料匯出
引文資訊
資料載入中.....
資料載入中.....
請使用永久網址來引用或連結此文件:
https://irlib.pccu.edu.tw/handle/987654321/51887
題名:
A reliable authentication scheme of personal health records in cloud computing
作者:
Liu, Chia-Hui
Chen, Tzer-Long
Chang, Chien-Yun
Wu, Zhen-Yu
貢獻者:
應用數學系
關鍵詞:
Bilinear pairing
Cloud computing
ID authentication
Personal health records
Smart card
日期:
2021
上傳時間:
2023-04-13 09:33:04 (UTC+8)
摘要:
A patient-centered personal health records system has been actively promoted in recent years. Its purpose is to maintain long-term personal records and health improvement plans. It combines a cloud computing environment to build a personal health records system to quickly collect personal information and transfer it to the back end for storage for future access. However, in a cloud environment, the message transmission process is more open. Therefore, a lack of an authority security mechanism for the users of such an architecture will result in distrust and doubt by the users. This adversely affects the implementation and quality of long-term health plans. To protect the crucial privacy of the users from malicious attacks or theft, it is necessary to ensure that the users have different authority to access their personal health records under the cloud computing environment and manage the openness of their authority to other users. A secured identify authentication mechanism can ensure that only legitimate users can log in to the system and obtain system service resources through verification. For a personal health records system in the cloud computing environment, this study proposes a secure and reliable user authentication mechanism allowing relevant users access to the user’s PHR in the cloud based on their authority. The proposed authentication method uses a password combined with a smart card, allowing the owner and authorized users to log in to the system and access the relevant personal records. In this study, an authentication method based on bilinear pairing was used to verify the identity of users and to effectively prevent malicious intrusion and theft. © 2021, The Author(s).
關聯:
Wireless Networks 開放取用 2021
顯示於類別:
[應數系] 期刊論文
文件中的檔案:
檔案
描述
大小
格式
瀏覽次數
index.html
0Kb
HTML
142
檢視/開啟
檢視Licence
在CCUR中所有的資料項目都受到原著作權保護.
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library IR team
Copyright ©
-
回饋