A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds

被引:192
作者
Abbas, Assad [1 ]
Khan, Samee U. [1 ]
机构
[1] N Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58108 USA
关键词
Access control; e-Health cloud; privacy preserving; security; ENCRYPTION; SECURITY; RECORDS;
D O I
10.1109/JBHI.2014.2300846
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is emerging as a new computing paradigm in the healthcare sector besides other business domains. Large numbers of health organizations have started shifting the electronic health information to the cloud environment. Introducing the cloud services in the health sector not only facilitates the exchange of electronic medical records among the hospitals and clinics, but also enables the cloud to act as a medical record storage center. Moreover, shifting to the cloud environment relieves the healthcare organizations of the tedious tasks of infrastructure management and also minimizes development and maintenance costs. Nonetheless, storing the patient health data in the third-party servers also entails serious threats to data privacy. Because of probable disclosure of medical records stored and exchanged in the cloud, the patients' privacy concerns should essentially be considered when designing the security and privacy mechanisms. Various approaches have been used to preserve the privacy of the health information in the cloud environment. This survey aims to encompass the state-of-the-art privacy-preserving approaches employed in the e-Health clouds. Moreover, the privacy-preserving approaches are classified into cryptographic and noncryptographic approaches and taxonomy of the approaches is also presented. Furthermore, the strengths and weaknesses of the presented approaches are reported and some open issues are highlighted.
引用
收藏
页码:1431 / 1441
页数:11
相关论文
共 93 条
[21]  
Changji Wang, 2013, International Journal of Intelligent Information and Database Systems, V7, P389
[22]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[23]   Secure Dynamic Access Control Scheme of PHR in Cloud Computing [J].
Chen, Tzer-Shyong ;
Liu, Chia-Hui ;
Chen, Tzer-Long ;
Chen, Chin-Sheng ;
Bau, Jian-Guo ;
Lin, Tzu-Ching .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) :4005-4020
[24]   A Secure EHR System Based on Hybrid Clouds [J].
Chen, Yu-Yi ;
Lu, Jun-Chao ;
Jan, Jinn-Ke .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (05) :3375-3384
[25]  
Cheong HJ, 2009, INTERNATIONAL CONFERENCE ON EHEALTH, TELEMEDICINE, AND SOCIAL MEDICINE: ETELEMED 2009, PROCEEDINGS, P263, DOI 10.1109/eTELEMED.2009.51
[26]  
Chow R., 2009, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, P85, DOI DOI 10.1145/1655008.1655020
[27]   Bridging the IT adoption gap for small physician practices: An action research study on electronic health records [J].
Davidson, Elizabeth ;
Heslinga, Dan .
INFORMATION SYSTEMS MANAGEMENT, 2007, 24 (01) :15-28
[28]  
Dzenowagis J., 2005, CONNECTING HLTH GLOB, P1
[29]  
Fan L., 2011, P 4 INT C CLOUD COMP, P219
[30]  
Fujisaki E., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P260