A systematic literature review of attribute based encryption in health services

被引:9
作者
Imam, Raza [1 ]
Kumar, Kaushal [1 ]
Raza, Syed Mehran [1 ]
Sadaf, Rumi [1 ]
Anwer, Faisal [1 ]
Fatima, Noor [1 ]
Nadeem, Mohammad [1 ]
Abbas, Mohamed [2 ,4 ]
Rahman, Obaidur [3 ]
机构
[1] Aligarh Muslim Univ, Dept Comp Sci, Aligarh 202002, Uttar Pradesh, India
[2] King Khalid Univ, Coll Engn, Elect Engn Dept, Abha 61413, Asir, Saudi Arabia
[3] Jamia Millia Islamia, Dept Elect Engn, New Delhi, India
[4] Delta Univ Sci & Technol, Coll Engn, Comp & Commun Dept, Gamasa 35712, Egypt
关键词
Attribute Based Encryption; Healthcare; E-Health; Access control; Systematic review; GRAINED ACCESS-CONTROL; KEYWORD SEARCH; CP-ABE; SECURE; CLOUD; POLICY; PRIVACY; RECORDS; EHRS;
D O I
10.1016/j.jksuci.2022.06.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread adoption of cloud technology in the healthcare industry has achieved effective outcomes in sharing health records and sensitive data. In recent years, many organizations have prioritized EHealth as their primary goal for advancement in health services. As a result, Attribute Based Encryption (ABE) has emerged as a reliable model for health information exchange across cloud settings. Eventually, it leads to provide acceptable solutions for challenging scenarios like fine-grained access control. Despite ABE significance and its breadth of applications, no systematic and comprehensive survey exists in the literature that covers every variation of ABE in healthcare, highlighting its past and present status. This paper presents a systematic and comprehensive study of ABE works concerning E-Health as the authors rigorously investigate healthcare-focused ABE frameworks and examine them based on various descriptive criteria, along with categorizing them systematically in 10 distinct domains and subdomains, ultimately offering observations and potential recommendations. The descriptive research design, significant findings along with the suggested future works will help future research in ABE to secure the existing E-Health data sharing more effectively. The present study will also facilitate researchers and practitioners to comprehend the past trends and current state of ABE architectures in secure health data-sharing scenarios, as well as the prospect of ABE deployment in most recent technological evolutions. (c) 2022 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
引用
收藏
页码:6743 / 6774
页数:32
相关论文
共 110 条
  • [1] Ahsan T., 2022, WATER AIR SOIL POLL, V2022, P1
  • [2] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    [J]. SENSORS, 2019, 19 (07)
  • [3] Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications
    Ali, Usman
    Idris, Mohd Yamani Idna
    Frnda, Jaroslav
    Bin Ayub, Mohamad Nizam
    Alroobaea, Roobaea
    Almansour, Fahad
    Shagari, Nura Modi
    Ullah, Insaf
    Ali, Ihsan
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (02): : 2515 - 2532
  • [4] Alshehri S., 2012, Proceedings of the 2012 IEEE International Conference on Data Engineering Workshops (ICDEW 2012), P143, DOI 10.1109/ICDEW.2012.68
  • [5] Anas M., 2022, 2022 12th International Conference on Cloud Computing, Data Science Engineering (Confluence), P112
  • [6] [Anonymous], 2014, SCI WORLD J
  • [7] [Anonymous], J SUPERCOMPUT, V71, P1607, DOI [10.1007/s11227-014-1253-3, DOI 10.1007/S11227-014-1253-3]
  • [8] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [9] Brossard David, 2016, STACKOVERFLOW
  • [10] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515