139
Views
1
CrossRef citations to date
0
Altmetric
Articles

Security and privacy issues of electronic healthcare system: A survey

&

References

  • “Health information privacy,” https://www.hhs.gov/hipaa/for-professionals/special-topics/hitech-act-enforcement-interim-finalrule/index.html, (accessed Dec, 2018).
  • “Certification commission for health information technology,” https://www.cchit.org/, (accessed Dec, 2018).
  • B. Yüksel, A. Küpçü, and Öznur Özkasap, “Research issues for privacy and security of electronic health services,” Future Generation Computer Systems, vol. 68, pp. 1 – 13, 2017. doi: 10.1016/j.future.2016.08.011
  • M. A. Sahi, H. Abbas, K. Saleem, X. Yang, A. Derhab, M. A. Orgun, W. Iqbal, I. Rashid, and A. Yaseen, “Privacy preservation in e-healthcare environments: State of the art and future directions,” IEEE Access, vol. 6, pp. 464-478, 2018. doi: 10.1109/ACCESS.2017.2767561
  • C.-T. Lin and M.-C. Tsai, “New hot spots of china’s hospital for capital inflow: investing risk perspective.” Journal of Information and Optimization Sciences, vol. 29, no. 5, pp. 931–945, 2008. [Online]. Available: https://doi.org/10.1080/02522667.2008.10699846
  • S. Al-Janabi, I. Al-Shourbaji, M. Shojafar, and S. Shamshirband, “Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications,” Egyptian Informatics Journal, vol. 18, no. 2, pp. 113 – 122, 2017. doi: 10.1016/j.eij.2016.11.001
  • P. Gope and T. Hwang, “Bsn-care: A secure iot-based modern healthcare system using body sensor network,” IEEE Sensors Journal, vol. 16, no. 5, pp. 1368–1376, March 2016. doi: 10.1109/JSEN.2015.2502401
  • A. Singh and K. Chatterjee, “Cloud security issues and challenges: A survey,” Journal of Network and Computer Applications, vol. 79, pp. 88 - 115, 2017. doi: 10.1016/j.jnca.2016.11.027
  • S. Zickau, M. Slawik, D. Thatmann, S. Uhlig, I. Denisow, and A. Küpper, TRESOR – Towards the Realization of a Trusted Cloud Ecosystem. Cham: Springer International Publishing, 2014, pp. 141 157.
  • Q. Huang, L. Ye, M. Yu, F. Wu, and R. Liang, “Medical information integration based cloud computing,” in 2011 International Conference on Network Computing and Information Security, vol. 1, May 2011, pp. 79–83.
  • J.-J. Yang, J.-Q. Li, and Y. Niu, “A hybrid solution for privacy preserving medical data sharing in the cloud environment,” Future Generation Computer Systems, vol. 43-44, pp. 74 – 86, 2015. doi: 10.1016/j.future.2014.06.004
  • R. Cattell, “Scalable sql and nosql data stores,” SIGMOD Rec., vol. 39, no. 4, pp. 12–27, May 2011. doi: 10.1145/1978915.1978919
  • W. Yan, U. Brahmakshatriya, Y. Xue, M. Gilder, and B. Wise, “p-pic: Parallel power iteration clustering for big data,” Journal of Parallel and Distributed Computing, vol. 73, no. 3, pp. 352 – 359, 2013, models and Algorithms for High-Performance Distributed Data Mining. doi: 10.1016/j.jpdc.2012.06.009
  • W.-B. Lee and C.-D. Lee, “A cryptographic key management solution for hipaa privacy/security regulations,” IEEE Transactions on Information Technology in Biomedicine, vol. 12, no. 1, pp. 34–41, 2008. doi: 10.1109/TITB.2007.906101
  • M. K. Kundalwal, K. Chatterjee, and A. Singh, “An improved privacy preservation technique in health-cloud,” ICT Express, 2018.
  • A. Waqar, A. Raza, H. Abbas, and M. K. Khan, “A framework for preservation of cloud users’ data privacy using dynamic reconstruction of metadata,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 235–248, 2013. doi: 10.1016/j.jnca.2012.09.001
  • M. A. Sahi, H. Abbas, K. Saleem, X. Yang, A. Derhab, M. Orgun, W. Iqbal, I. Rashid, and A. Yaseen, “Privacy preservation in e-healthcare environments: A review,” IEEE Access, vol. 6, pp. 464-478, 2018. doi: 10.1109/ACCESS.2017.2767561
  • B. J. Lichtenstein, D. B. Reuben, A. S. Karlamangla, W. Han, C. P. Roth, and N. S. Wenger, “Effect of physician delegation to other healthcare providers on the quality of care for geriatric conditions,” Journal of the American Geriatrics Society, vol. 63, no. 10, pp. 2164–2170, 2015. doi: 10.1111/jgs.13654
  • J.-K. Moon, Y.-J. Song, and J.-M. Kim, “A delegation model of healthcare system based of ab-pre in fog computing environment,” Advanced Science Letters, vol. 22, no. 11, pp. 3432–3436, 2016. doi: 10.1166/asl.2016.7922
  • J. Birkhäuer, J. Gaab, J. Kossowsky, S. Hasler, P. Krummenacher, C. Werner, and H. Gerger, “Trust in the health care professional and health outcome: A meta-analysis,” PloS one, vol. 12, no. 2, p. e0170988, 2017. doi: 10.1371/journal.pone.0170988
  • G. Lin, D. Wang, Y. Bie, and M. Lei, “Mtbac: A mutual trust based access control model in cloud computing,” China Communications, vol. 11, no. 4, pp. 154–162, April 2014.
  • A. Singh and K. Chatterjee, “A mutual trust based access control framework for securing electronic healthcare system,” in 2017 14th IEEE India Council International Conference (INDICON), Dec 2017, pp. 1-6.
  • X. Li, F. Zhou, and X. Yang, “A multi-dimensional trust evaluation model for large-scale p2p computing,” Journal of Parallel and Distributed Computing, vol. 71, no. 6, pp. 837–847, 2011. doi: 10.1016/j.jpdc.2011.01.007
  • F. D. Schoorman, R. C. Mayer, and J. H. Davis, “Perspective: Empowerment in veterinary clinics: the role of trust in delegation,” Journal of Trust Research, vol. 6, no. 1, pp. 91–95, 2016. doi: 10.1080/21515581.2016.1161887
  • S. Baek, S.-H. Seo, and S. Kim, “Preserving patient’s anonymity for mobile healthcare system in iot environment,” International Journal of Distributed Sensor Networks, vol. 12, no. 7, p. 2171642, 2016. doi: 10.1177/155014772171642
  • R. Amin, S. H. Islam, G. Biswas, M. K. Khan, and N. Kumar, “A robust and anonymous patient monitoring system using wireless medical sensor networks,” Future Generation Computer Systems, vol. 80, pp. 483-495, 2018. doi: 10.1016/j.future.2016.05.032
  • K. T. Win, “A review of security of electronic health records,” Health Information Management, vol. 34, no. 1, pp. 13–18, 2005. doi: 10.1177/183335830503400105
  • P. S. Rose, J. Visumathi, and H. Haripriya, “Research paper on privacy preservation by data anonymization in public cloud for hospital management on big data,” International Journal of Advanced Computer Technology (IJACT), 2016.
  • S. Kim, M. K. Sung, and Y. D. Chung, “A framework to preserve the privacy of electronic health data streams,” Journal of Biomedical Informatics, vol. 50, pp. 95 – 106, 2014, special Issue on Informatics Methods in Medical Privacy. doi: 10.1016/j.jbi.2014.03.015
  • S. V. Senese, “A study of access control for electronic health records.” 2015.
  • R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, “Role based access control models,” Computer, vol. 29, no. 2, pp. 38–47, 1996. doi: 10.1109/2.485845
  • H. A. Maw, “A trust-based adaptive access control model for wireless sensor networks,” 2016.
  • D. Servos and S. L. Osborn, “Current research and open problems in attribute-based access control,” ACM Computing Surveys (CSUR), vol. 49, no. 4, p. 65, 2017. doi: 10.1145/3007204
  • M. Abomhara and H. Yang, “Collaborative and secure sharing of healthcare records using attribute-based authenticated access,” Int J Adv Secur, vol. 9, no. 3, 2016.
  • V. C. Hu, D. R. Kuhn, D. F. Ferraiolo, and J. Voas, “Attribute-based access control,” Computer, vol. 48, no. 2, pp. 85–88, 2015. doi: 10.1109/MC.2015.33
  • P. K. Behera and P. M. Khilar, “A novel trust based access control model for cloud environment,” in Proceedings of the International Conference on Signal, Networks, Computing, and Systems. Springer, 2017, pp. 285–295.
  • R. Zhang, L. Liu, and R. Xue, “Role-based and time-bound access and management of ehr data,” Security and Communication Networks, vol. 7, no. 6, pp. 994–1015. doi: 10.1002/sec.817
  • S. M. Chandran and J. B. Joshi, “Lot-rbac: a location and time-based rbac model,” in International Conference on Web Information Systems Engineering. Springer, 2005, pp. 361–375.
  • F. Hosseinpour, A. S. Siddiqui, J. Plosila, and H. Tenhunen, “A security framework for fog networks based on role-based access control and trust models,” in Research and Practical Issues of Enterprise Information Systems, A. M. Tjoa, L.-R. Zheng, Z. Zou, M. Raffai, L. D. Xu, and N. M. Novak, Eds. Cham: Springer International Publishing, 2018, pp. 168–180.
  • T. Bhattasali, R. Chaki, N. Chaki, and K. Saeed, “An adaptation of context and trust aware workflow oriented access control for remote healthcare,” International Journal of Software Engineering and Knowledge Engineering, vol. 28, no. 06, pp. 781-810, 2018. doi: 10.1142/S0218194018500225
  • X. H. Le, T. Doll, M. Barbosu, A. Luque, and D. Wang, “An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow,” Journal of Biomedical Informatics, vol. 45, no. 6, pp. 1084 - 1107, 2012. doi: 10.1016/j.jbi.2012.06.001
  • A. G. Dinker, V. Sharma, Mansi, and N. Singh, “Multilevel authentication scheme for security critical networks,” Journal of Information and Optimization Sciences, vol. 39, no. 1, pp. 357–367, 2018. [Online]. Available: https://doi.org/10.1080/02522667.2017.1374745
  • “Lightweight directory access protocol,” https://1dap.com/, (accessed Dec, 2018).
  • “Microsoft active directory,” https://docs.microsoft.com/enus/windows/desktop/ad/active-directory-domain-services, (accessed Dec, 2018).
  • “Healthcare single sign on,” https://www.imprivata.com/healthcare_single_sign_on, (accessed Dec, 2018).
  • “Single sign-on benefits workflow, security for healthcare organizations,” https://healthtechmagazine.net/article/2017/05/single-signbenefits-workflow-security-healthcare-organizations, (accessed Dec, 2018).
  • “Structured information standards,” https://www.oasis-open.org/, (acces sed Dec, 2018).
  • R. G. Berbée, P. Gemmel, B. Droesbeke, H. Casteleyn, and D. Vandaele, “Evaluation of hospital service level agreements,” International journal of health care quality assurance, vol. 22, no. 5, pp. 483-497, 2009. doi: 10.1108/09526860910975599
  • “How to meet slas in healthcare it,” https://blog.ipswitch.com/meet-slas health-care, (accessed Dec, 2018).
  • Y. Y. L. Helgesson, “Integrating slas into it risk management in p service organizations,” in Services Computing Conference, 2009. APSCC 2009. IEEE Asia-Pacific. IEEE, 2009, pp. 119–125.
  • A. Mohamed, A. H. Mohammed, and M. N. Abdullah, “Service level agreements: Governance in outsourcing facility management,” Jurnal Teknologi, vol. 73, no. 5, pp. 11-15, 2015. doi: 10.11113/jt.v73.4313
  • A. Singh and K. Chatterjee, “Trust based access control model for securing electronic healthcare system,” Journal of Ambient Intelligence and Humanized Computing, Nov 2018.
  • L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A. V. Vasilakos, “Security and privacy for storage and computation in cloud computing,” Information Sciences, vol. 258, pp. 371 – 386, 2014. doi: 10.1016/j.ins.2013.04.028

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.