Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing

被引:148
作者
Chenthara, Shekha [1 ]
Ahmed, Khandakar [1 ]
Wang, Hua [1 ]
Whittaker, Frank [1 ]
机构
[1] Victoria Univ, Sch Engn & Sci, Melbourne, Vic 3011, Australia
关键词
e-health; electronic health record; EHR cryptographic and non-cryptographic; security and privacy; systematic review; PUBLIC-KEY ENCRYPTION; ACCESS-CONTROL MODEL; PROXY RE-ENCRYPTION; STORAGE; SCHEME; MANAGEMENT; EFFICIENT; SYSTEM;
D O I
10.1109/ACCESS.2019.2919982
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A systematic and comprehensive review of security and privacy-preserving challenges in e-health solutions indicates various privacy preserving approaches to ensure privacy and security of electronic health records (EHRs) in the cloud. This paper highlights the research challenges and directions concerning cyber security to build a comprehensive security model for EHR. We carry an intensive study in the IEEE, Science Direct, Google Scholar, PubMed, and ACM for papers on EHR approach published between 2000 and 2018 and summarized them in terms of the architecture types as well as evaluation strategies. We surveyed, investigated, and reviewed various aspects of several articles and identified the following tasks: 1) EHR security and privacy; 2) security and privacy requirements of e-health data in the cloud; 3) EHR cloud architecture, and; 4) diverse EHR cryptographic and non-cryptographic approaches. We also discuss some crucial issues and the ample opportunities for advanced research related to security and privacy of EHRs. Since big data provide a great mine of information and knowledge in e-Health applications, serious privacy and security challenges that require immediate attention exist. Studies must focus on efficient comprehensive security mechanisms for EHR and also explore techniques to maintain the integrity and confidentiality of patients' information.
引用
收藏
页码:74361 / 74382
页数:22
相关论文
共 102 条
[1]   A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds [J].
Abbas, Assad ;
Khan, Samee U. .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (04) :1431-1441
[2]   e-Health Cloud: Opportunities and Challenges [J].
AbuKhousa, Eman ;
Mohamed, Nader ;
Al-Jaroodi, Jameela .
FUTURE INTERNET, 2012, 4 (03) :621-645
[3]  
Ahmed M., 2017, P AUSTR C DAT MIN, P192
[4]   Secure Access Control for Health Information Sharing Systems [J].
Alshehri, Suhair ;
Raj, Rajendra K. .
2013 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI 2013), 2013, :277-286
[5]  
[Anonymous], 2011, PROC INT C INF SYST
[6]  
[Anonymous], CYBERCRIME OTHER THR
[7]  
[Anonymous], INT J APPL INFORM SY
[8]  
[Anonymous], IEEE T CLOUD COMPUT
[9]  
[Anonymous], HEALTHCARE UNABLE KE
[10]  
[Anonymous], 2006, Assessment of Access Control Systems