Table 3.
Attack scenarios and threats considered by the proposed system.
| Types and attack scenario | Threats | |
| External threats | ||
|
|
Eavesdropping | Private data leakage (eg, electronic medical record and personal information) |
|
|
Denial of service | Service unavailable |
| Internal threats | ||
|
|
Abnormal access | Private data leakage |
|
|
Data forgery | Unexpected output |