|
[1] R. L. Rivest, “Cryptography,” in Handbook of Theoretical Computer Science (Vol. A), pp. 717–755, 1990. [2] P. Mell and T. Grance, “On-demand self-service.,” Nist, vol. 15, pp. 10–15, 2009. [3] A. S. Horvath and R. Agrawal, “Trust in cloud computing: A user’s perspective,” Conference Proceedings - IEEE SOUTHEASTCON, vol. 2015-June, no. June, pp. 1–8, 2015. [4] S. Nakamoto, “Bitcoin: a peer-to-peer electronic cash system.” \url{https://bitcoin.org/bitcoin.pdf}. [5] A. Back, “Hashcash - A Denial of Service Counter-Measure,” [6] J. Chase, R. Kaewpuang, W. Yonggang, and D. Niyato, “Joint virtual machine and bandwidth allocation in software defined network (SDN) and cloud computing environments,” 2014 IEEE International Conference on Communications, ICC 2014, pp. 2969–2974, 2014. [7] M. Lakshmi Neelima and M. Padma, “a Study on Cloud Storage,” International Journal of Computer Science and Mobile Computing, vol. 35, no. 5, pp. 966–971, 2014. [8] A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption,” pp. 457–473, 2004. [9] A. Shamir, “Identity-based cryptosystems and signature schemes,” In Proceedings of CRYPTO 84 on Advances in cryptology, pp. 47–53, 1985. [10] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” p. 89, 2007. [11] J. Bethencourt and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” 2007. [12] F. Guo, Y. Mu, W. Susilo, D. S. Wong, and V. Varadharajan, “CP-ABE with constant-size keys for lightweight devices,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 5, pp. 763–771, 2014. [13] X. Zheng, R. R. Mukkamala, R. Vatrapu, and J. Ordieres-Mere, “Blockchain-based personal health data sharing system using cloud storage,” 2018 IEEE 20th International Conference on e-Health Networking, Applications and Services, Healthcom 2018, 2018. [14] A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, “MedRec: Using blockchain for medical data access and permission management,” Proceedings - 2016 2nd International Conference on Open and Big Data, OBD 2016, pp. 25–30, 2016. [15] Q. Xia, E. B. Sifah, K. O. Asamoah, J. Gao, X. Du, and M. Guizani, “MeDShare: Trust-Less Medical Data Sharing among Cloud Service Providers via Blockchain,” IEEE Access, vol. 5, pp. 14757–14767, 2017. [16] J. L. Raisaro, J. Troncoso-Pastoriza, M. Misbach, J. Sa Sousa, S. Pradervand, E. Missiaglia, O. Michielin, B. Ford, and J. P. Hubaux, “MedCo: Enabling Secure and Privacy-Preserving Exploration of Distributed Clinical and Genomic Data,” IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol. 5963, no. c, pp. 1–14, 2018. [17] U.S. Department of Health & Human Services, “The health insurance portability and accountability act (hipaa).” https://www.hhs.gov/hipaa/index.html. [Online; accessed 25-July-2019]. [18] EU Parlament, “The EU General Data Protection Regulation (GDPR).” https://www.hhs.gov/hipaa/index.html. [Online; accessed 25-July-2019]. |