Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing

被引:121
|
作者
Chenthara, Shekha [1 ]
Ahmed, Khandakar [1 ]
Wang, Hua [1 ]
Whittaker, Frank [1 ]
机构
[1] Victoria Univ, Sch Engn & Sci, Melbourne, Vic 3011, Australia
关键词
e-health; electronic health record; EHR cryptographic and non-cryptographic; security and privacy; systematic review; PUBLIC-KEY ENCRYPTION; ACCESS-CONTROL MODEL; PROXY RE-ENCRYPTION; STORAGE; SCHEME; MANAGEMENT; EFFICIENT; SYSTEM;
D O I
10.1109/ACCESS.2019.2919982
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A systematic and comprehensive review of security and privacy-preserving challenges in e-health solutions indicates various privacy preserving approaches to ensure privacy and security of electronic health records (EHRs) in the cloud. This paper highlights the research challenges and directions concerning cyber security to build a comprehensive security model for EHR. We carry an intensive study in the IEEE, Science Direct, Google Scholar, PubMed, and ACM for papers on EHR approach published between 2000 and 2018 and summarized them in terms of the architecture types as well as evaluation strategies. We surveyed, investigated, and reviewed various aspects of several articles and identified the following tasks: 1) EHR security and privacy; 2) security and privacy requirements of e-health data in the cloud; 3) EHR cloud architecture, and; 4) diverse EHR cryptographic and non-cryptographic approaches. We also discuss some crucial issues and the ample opportunities for advanced research related to security and privacy of EHRs. Since big data provide a great mine of information and knowledge in e-Health applications, serious privacy and security challenges that require immediate attention exist. Studies must focus on efficient comprehensive security mechanisms for EHR and also explore techniques to maintain the integrity and confidentiality of patients' information.
引用
收藏
页码:74361 / 74382
页数:22
相关论文
共 50 条
  • [21] Privacy-Preserving Data Sharing in Cloud Computing
    王慧
    [J]. Journal of Computer Science & Technology, 2010, 25 (03) : 401 - 414
  • [22] Privacy-preserving outsourced classification in cloud computing
    Ping Li
    Jin Li
    Zhengan Huang
    Chong-Zhi Gao
    Wen-Bin Chen
    Kai Chen
    [J]. Cluster Computing, 2018, 21 : 277 - 286
  • [23] A Privacy-preserving Data Transmission Protocol with Constant Interactions in E-health
    Yang, Huijie
    Shen, Jian
    Obaidat, Mahammad
    Vijayakumar, Pandi
    Hsiao, Kuei-Fang
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2248 - 2253
  • [24] Security and Privacy in Cloud-Based E-Health System
    Sivan, Remya
    Zukarnain, Zuriati Ahmad
    [J]. SYMMETRY-BASEL, 2021, 13 (05):
  • [25] Cloud Data Security Access with Privacy-Preserving
    Wang, Jingyu
    Gu, Ruichun
    [J]. 2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 268 - 271
  • [26] Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
    Domingo-Ferrer, Josep
    Farras, Oriol
    Ribes-Gonzalez, Jordi
    Sanchez, David
    [J]. COMPUTER COMMUNICATIONS, 2019, 140 : 38 - 60
  • [27] Security and Privacy Challenges in Cloud Computing
    Abdullah, Salasiah
    Abu Bakar, Khairul Azmi
    [J]. PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC), 2018,
  • [28] Preserving data privacy in e-health
    Conti, Riccardo
    Lunardelli, Alessio
    Matteucci, Ilaria
    Mori, Paolo
    Petrocchi, Marinella
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8431 : 366 - 392
  • [29] Preserving data privacy in e-Health
    [J]. 1600, Springer Verlag (8431):
  • [30] Privacy-preserving aware data transmission for IoT-based e-health
    Boussada, Rihab
    Hamdane, Balkis
    Elhdhili, Mohamed Elhoucine
    Saidane, Leila Azouz
    [J]. COMPUTER NETWORKS, 2019, 162