Review Article

Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure

Table 15

Extracted Security Services from Proposed Techniques.

Security Servicesm-Healthcaree-HealthcareHealth Data ManagementHealth Data Aggregation

Data Confidentiality[41, 47, 48, 50, 55][44, 53][2]
Fine-grained Access Control[41, 47, 48][43, 51][2]
Collusion Resistance[41, 48][42, 43][2]
Patient-centric Access Control[42]
Message integrity[47, 50][42, 53][2]
Denial of Service (Dos) Attack[42, 54]
Prevention of Ciphertext-only attack[42]
Patient Privacy[50][42][46]
Patient Control[43, 44, 53]
Source Authentication[37][43, 44]
Dynamic Data operation[43]
Audit Control[43, 44]
Attribute revocation[39][43]
Cloud Reciprocity Problem[43]
Availability[47][53][2]
Scalability[2]
Identity Privacy[42][46]
Resistance to Forgery Attack[46]
Impersonation Attack[55]
Man-in-the middle Attack[50, 55]
Nonrepudiation[55]
Signature Unforgeability and Anonymity[48]
Replay Attack[50, 55]
Transmission Continuity[50]
Authorization[53]
Known-key Security[55]
Network Security[53]