A Comprehensive Study on Security and Privacy of E-Health Cloud-Based System

被引:0
作者
Ali, Sadaquat [1 ]
机构
[1] Univ Warwick, WMG Cyber Secur Ctr, Coventry, W Midlands, England
来源
CYBERNETICS AND CONTROL THEORY IN SYSTEMS, VOL 2, CSOC 2024 | 2024年 / 1119卷
关键词
E-health; Security; Challenges; Cloud Computing; Health Information and Communication Technologies (HIT); BLOCKCHAIN;
D O I
10.1007/978-3-031-70300-3_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, a growing number of individuals and organisations are considering distributing resources in this manner, considering recent technological developments involving "the cloud". Due to the sensitive and critical nature of patient information, IT and networks have not been widely used in healthcare systems for a long period. E-health systems have recently benefited from the high levels of accessibility, ease of access, durability, efficiency, usefulness, and automation of the various cloud models. E-health refers to health services and information provided or improved on the Internet and other techniques. Health information and communication technology (HIT) can improve the delivery locally, regionally, and globally. In this paper, we review different studies based on the security and privacy concerns of electronic health records (EHRs). We also identified different security challenges for data storage in the cloud. Furthermore, in the end of the paper open challenges are discussed with the future predictions of an EHR system. #CSOC1120
引用
收藏
页码:1 / 31
页数:31
相关论文
共 29 条
[1]   A Security and Privacy Validation Methodology for e-Health Systems [J].
Amato, Flora ;
Casola, Valentina ;
Cozzolino, Giovanni ;
Benedictis, Alessandra De ;
Mazzocca, N. Icola ;
Moscato, Francesco .
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 17 (02)
[2]   Security and privacy issues in e-health cloud-based system: A comprehensive content analysis [J].
Azeez, Nureni Ayofe ;
Van der Vyver, Charles .
EGYPTIAN INFORMATICS JOURNAL, 2019, 20 (02) :97-108
[3]  
Chen HS., 2019, BIOMED J SCI TECH RE, V20, P15017, DOI [10.1016/10.26717/BJSTR.2019.20.003448, DOI 10.26717/BJSTR.2019.20.003448, 10.26717/bjstr.2019.20.003448]
[4]   Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing [J].
Chenthara, Shekha ;
Ahmed, Khandakar ;
Wang, Hua ;
Whittaker, Frank .
IEEE ACCESS, 2019, 7 :74361-74382
[5]  
Choudhari R., 2023, Patient Consent Management & Blockchain
[6]  
Dawoud M, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), P861, DOI 10.1109/UBMK.2017.8093549
[7]   Hybrid image encryption scheme for secure E-health systems [J].
Elamir, Mona M. ;
Al-atabany, Walid, I ;
Mabrouk, Mai S. .
NETWORK MODELING AND ANALYSIS IN HEALTH INFORMATICS AND BIOINFORMATICS, 2021, 10 (01)
[8]   Detection of Insider Attacks in Cloud based e-Healthcare Environment [J].
Garkoti, Gaurav ;
Peddoju, Sateesh K. ;
Balasubramanian, R. .
2014 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT), 2014, :195-200
[9]   Blockchain Application in Healthcare Systems: A Review [J].
Ghosh, Pranto Kumar ;
Chakraborty, Arindom ;
Hasan, Mehedi ;
Rashid, Khalid ;
Siddique, Abdul Hasib .
SYSTEMS, 2023, 11 (01)
[10]  
Giannopoulou A., 2021, Soc. Sci. Res. Netw.