Review Article
Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure
Table 15
Extracted Security Services from Proposed Techniques.
| Security Services | m-Healthcare | e-Healthcare | Health Data Management | Health Data Aggregation |
| Data Confidentiality | [41, 47, 48, 50, 55] | [44, 53] | [2] | | Fine-grained Access Control | [41, 47, 48] | [43, 51] | [2] | | Collusion Resistance | [41, 48] | [42, 43] | [2] | | Patient-centric Access Control | | [42] | | | Message integrity | [47, 50] | [42, 53] | [2] | | Denial of Service (Dos) Attack | | [42, 54] | | | Prevention of Ciphertext-only attack | | [42] | | | Patient Privacy | [50] | [42] | | [46] | Patient Control | | [43, 44, 53] | | | Source Authentication | [37] | [43, 44] | | | Dynamic Data operation | | [43] | | | Audit Control | | [43, 44] | | | Attribute revocation | [39] | [43] | | | Cloud Reciprocity Problem | | [43] | | | Availability | [47] | [53] | [2] | | Scalability | | | [2] | | Identity Privacy | | [42] | | [46] | Resistance to Forgery Attack | | | | [46] | Impersonation Attack | [55] | | | | Man-in-the middle Attack | [50, 55] | | | | Nonrepudiation | [55] | | | | Signature Unforgeability and Anonymity | [48] | | | | Replay Attack | [50, 55] | | | | Transmission Continuity | [50] | | | | Authorization | | [53] | | | Known-key Security | [55] | | | | Network Security | | [53] | | |
|
|