Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks.
Imran KhanAnwar GhaniSyed Muhammd SaqlainMuhammad Usman AshrafAbdulrahman AlzahraniDoHyeun KimPublished in: IEEE Access (2023)
Keyphrases
- medical data
- unauthorized access
- computer networks
- intrusion detection system
- access control
- security policies
- medical images
- sensitive data
- clinical data
- privacy sensitive
- medical data mining
- medical information
- local area network
- distributed systems
- file system
- intrusion detection
- computer systems
- data mining
- patient data
- medical records
- network traffic
- peer to peer
- data sets
- mobile agents
- service providers
- anomaly detection