Privacy Preservation of Electronic Health Records in the Modern Era: A Systematic Survey

被引:17
作者
Nowrozy, Raza [1 ]
Ahmed, Khandakar [1 ]
Kayes, A. S. M. [2 ]
Wang, Hua [1 ]
McIntosh, Timothy R. [3 ]
机构
[1] Victoria Univ, 295 Queen St, Melbourne, Vic 3000, Australia
[2] La Trobe Univ, 360 Plenty Rd & Kingsbury Dr, Bundoora, Vic 3086, Australia
[3] Cyberoo Pty Ltd, 81-83 Campbell St, Surry Hills, NSW 2010, Australia
关键词
Block chain; data sharing; confidentiality; electronic health records; privacy; security; CARE; BLOCKCHAIN; CYBERSECURITY; SECURITY; INTEROPERABILITY; CONFIDENTIALITY; ENCRYPTION; QUALITY; IOT;
D O I
10.1145/3653297
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Building a secure and privacy-preserving health data sharing framework is a topic of great interest in the healthcare sector, but its success is subject to ensuring the privacy of user data. We clarified the definitions of privacy, confidentiality and security (PCS) because these three terms have been used interchangeably in the literature. We found that researchers and developers must address the differences of these three terms when developing electronic health record (EHR) solutions. We surveyed 130 studies on EHRs, privacy-preserving techniques, and tools that were published between 2012 and 2022, aiming to preserve the privacy of EHRs. The observations and findings were summarized with the help of the identified studies framed along the survey questions addressed in the literature review. Our findings suggested that the usage of access control, blockchain, cloud-based, and cryptography techniques is common for EHR data sharing. We summarized the commonly used strategies for preserving privacy that are implemented by various EHR tools. Additionally, we collated a comprehensive list of differences and similarities between PCS. Finally, we summarized the findings in a tabular form for all EHR tools and techniques and proposed a fusion of techniques to better preserve the PCS of EHRs.
引用
收藏
页数:37
相关论文
共 155 条
  • [1] Using Machine Learning for Behavior-Based Access Control: Scalable Anomaly Detection on TCP Connections and HTTP Requests
    Adler, Aaron
    Mayhew, Michael J.
    Cleveland, Jeffrey
    Atighetchi, Michael
    Greenstadt, Rachel
    [J]. 2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013), 2013, : 1880 - 1887
  • [2] Agrawal R., 2002, Proceedings of the Twenty-eighth International Conference on Very Large Data Bases, P143
  • [3] Big data in digital healthcare: lessons learnt and recommendations for general practice
    Agrawal, Raag
    Prabakaran, Sudhakaran
    [J]. HEREDITY, 2020, 124 (04) : 525 - 534
  • [4] Ahmed M., 2020, Journal of Nursing and Health Science, V9, P53
  • [5] Ahram T, 2017, 2017 IEEE TECHNOLOGY & ENGINEERING MANAGEMENT SOCIETY CONFERENCE (TEMSCON), P137, DOI 10.1109/TEMSCON.2017.7998367
  • [6] Comprehensive Survey on Petya Ransomware Attack
    Aidan, Jagmeet Singh
    Verma, Harsh Kumar
    Awasthi, Lalit Kumar
    [J]. 2017 INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING AND INFORMATION SYSTEMS (ICNGCIS), 2017, : 122 - 125
  • [7] Ajagbe Sunday Adeola, 2019, International Journal of Scientific and Engineering Research, V10, P848
  • [8] Akarca D, 2019, PROCEEDINGS OF THE 2019 10TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT), P108, DOI [10.1109/dessert.2019.8770037, 10.1109/DESSERT.2019.8770037]
  • [9] Akhtar Mubeen., 2024, Cosmic Journal of Biology, V3, P184
  • [10] Copy-Pasting in Patients' Electronic Medical Records (EMRs): Use Judiciously and With Caution
    Al Bahrani, Bassim
    Medhi, Itrat
    [J]. CUREUS JOURNAL OF MEDICAL SCIENCE, 2023, 15 (06)