DOI QR코드

DOI QR Code

A Review of Security and Privacy of Cloud Based E-Healthcare Systems

  • Faiza Nawaz (Faculty of Computer Science & IT, University of Lahore, Gujrat Campus) ;
  • Jawwad Ibrahim (Faculty of Computer Science & IT, University of Lahore, Gujrat Campus) ;
  • Maida Junaid (Faculty of Computer Science & IT, University of Lahore, Gujrat Campus)
  • Received : 2024.06.05
  • Published : 2024.06.30

Abstract

Information technology plays an important role in healthcare. The cloud has several applications in the fields of education, social media and medicine. But the advantage of the cloud for medical reasons is very appropriate, especially given the large volume of data generated by healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Cloud computing has many advantages, such as "flexibility, cost and energy savings, resource sharing and rapid deployment". However, despite the significant benefits of using the cloud computing for health IT, data security, privacy, reliability, integration and portability are some of the main challenges and obstacles for its implementation. Health data are highly confidential records that should not be made available to unauthorized persons to protect the security of patient information. In this paper, we discuss the privacy and security requirement of EHS as well as privacy and security issues of EHS and also focus on a comprehensive review of the current and existing literature on Electronic health that uses a variety of approaches and procedures to handle security and privacy issues. The strengths and weaknesses of some of these methods were mentioned. The significance of security issues in the cloud computing environment is a challenge.

Keywords

References

  1. Altowaijri, S. M. (2020). An Architecture to Improve the Security of Cloud Computing in the Healthcare Sector. In Smart Infrastructure and Applications (pp. 249-266). Springer, Cham.
  2. Raju, G. D., Chandrakala, A., Kumar, A. P., & Reddy, M. P. R. R. (2017). END TO END ENCRYPTION BASED PRIVACY FOR MENTAL HEALTH CARE DATA TRANSACTION IN THE CLOUD. International Journal of Engineering, Science and, 6, 1029-1034.
  3. Stantchev, V., Barnawi, A., Ghulam, S., Schubert, J., & Tamm, G. (2015). Smart items, fog and cloud computing as enablers of servitization in healthcare. Sensors & Transducers, 185(2), 121.
  4. Youssef, A. E. (2014). A framework for secure healthcare systems based on big data analytics in mobile cloud computing environments. Int J Ambient Syst Appl, 2(2), 1-11. https://doi.org/10.5121/ijasa.2014.2201
  5. Mahalakshmi, M. V., & Shrivakshan, G. T. (2017). An Efficient Cloud Computing Security in Healthcare Management System. International Journal of Advanced Research in Computer Science and Software Engineering, 7(8), 185-192.
  6. Kumar, B. V., Ramaswami, M., & Swathika, P. (2017). Data security on patient monitoring for future healthcare application. International Journal of Computer Applications, 163(6), 20-23.
  7. Abbas, A., & Khan, S. U. (2015). E-Health cloud: privacy concerns and mitigation strategies. In Medical Data Privacy Handbook (pp. 389-421). Springer, Cham.
  8. Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592. https://doi.org/10.1016/j.future.2010.12.006
  9. Meena, S., & Gayathri, V. (2017). AN APPROACH TO SECURE MENTAL HEALTH DATA IN THE CLOUD USING END-TO-END ENCRYPTION TECHNIQUE. Journal of Computer Engineering & Technology, 8(5), 87-98.
  10. Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2012). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems, 24(1), 131-143.
  11. Azeez, N. A., & Van der Vyver, C. (2019). Security and privacy issues in e-health cloud-based system: A comprehensive content analysis. Egyptian Informatics Journal, 20(2), 97-108. https://doi.org/10.1016/j.eij.2018.12.001
  12. Mahalakshmi, M. V., & Shrivakshan, G. T. (2017). An Efficient Cloud Computing Security in Healthcare Management System. International Journal of Advanced Research in Computer Science and Software Engineering, 7(8), 185-192.
  13. Chenthara, S., Ahmed, K., Wang, H., & Whittaker, F. (2019). Security and privacy-preserving challenges of e-Health solutions in cloud computing. IEEE access, 7, 74361-74382. https://doi.org/10.1109/ACCESS.2019.2919982
  14. Coppolino, L., D'Antonio, S., Mazzeo, G., & Romano, L. (2017). Cloud security: Emerging threats and current solutions. Computers & Electrical Engineering, 59, 126-140. https://doi.org/10.1016/j.compeleceng.2016.03.004
  15. Yang, J. J., Li, J. Q., & Niu, Y. (2015). A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation computer systems, 43, 74-86. https://doi.org/10.1016/j.future.2014.06.004
  16. Moon, J. K., Song, Y. J., & Kim, J. M. (2016). A Delegation Model of Healthcare System Based of AB-PRE in Fog Computing Environment. Advanced Science Letters, 22(11), 3432-3436.
  17. Birkhauer, J., Gaab, J., Kossowsky, J., Hasler, S., Krummenacher, P., Werner, C., & Gerger, H. (2017). Trust in the health care professional and health outcome: a meta-analysis. PloS one, 12(2).
  18. Baek, S., Seo, S. H., & Kim, S. (2016). Preserving Patient's Anonymity for Mobile Healthcare System in IoT Environment. International Journal of Distributed Sensor Networks, 12(7), 2171642.
  19. Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., & Kumar, N. (2018). A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Generation Computer Systems, 80, 483-495. https://doi.org/10.1016/j.future.2016.05.032
  20. Servos, D., & Osborn, S. L. (2017). Current research and open problems in attribute-based access control. ACM Computing Surveys (CSUR), 49(4), 1-45. https://doi.org/10.1145/3007204
  21. Singh, A., & Chatterjee, K. (2019). Security and privacy issues of electronic healthcare system: A survey. Journal of Information and Optimization Sciences, 40(8), 1709-1729. https://doi.org/10.1080/02522667.2019.1703265
  22. Berbee, R. G., Gemmel, P., Droesbeke, B., Casteleyn, H., & Vandaele, D. (2009). Evaluation of hospital service level agreements. International journal of health care quality assurance.
  23. Wei, J., Liu, W., & Hu, X. (2016). Secure data sharing in cloud computing using revocable-storage identity-based encryption. IEEE Transactions on Cloud Computing, 6(4), 1136-1148.
  24. Zhu, L., Zhang, C., Xu, C., Liu, X., & Huang, C. (2018). An efficient and privacy-preserving biometric identification scheme in cloud computing. IEEE Access, 6, 19025-19033.
  25. Xue, K., Xue, Y., Hong, J., Li, W., Yue, H., Wei, D. S., & Hong, P. (2017). RAAC: Robust and auditable access control with multiple attribute authorities for public cloud storage. IEEE Transactions on Information Forensics and Security, 12(4), 953-967. https://doi.org/10.1109/TIFS.2016.2647222
  26. Cui, H., Deng, R. H., & Li, Y. (2018). Attribute-based cloud storage with secure provenance over encrypted data. Future Generation Computer Systems, 79, 461-472. https://doi.org/10.1016/j.future.2017.10.010
  27. Kundalwal, M. K., Chatterjee, K., & Singh, A. (2019). An improved privacy preservation technique in health-cloud. ICT Express, 5(3), 167-172. https://doi.org/10.1016/j.icte.2018.10.002
  28. Bhattasali, T., Chaki, R., Chaki, N., & Saeed, K. (2018). An adaptation of context and trust aware workflow oriented access control for remote healthcare. International Journal of Software Engineering and Knowledge Engineering, 28(06), 781-810. https://doi.org/10.1142/S0218194018500225
  29. Raju, G. D., Chandrakala, A., Kumar, A. P., & Reddy, M. P. R. R. (2017). END TO END ENCRYPTION BASED PRIVACY FOR MENTAL HEALTH CARE DATA TRANSACTION IN THE CLOUD. International Journal of Engineering, Science and, 6, 1029-1034.
  30. Kundalwal, M. K., Singh, A., & Chatterjee, K. (2018, October). A Privacy Framework in Cloud Computing for Healthcare Data. In 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN) (pp. 58-63). IEEE.
  31. Wang, Q., Zhou, D., Yang, S., Li, P., Wang, C., & Guan, Q. (2019, July). Privacy Preserving Computations over Healthcare Data. In 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 635-640). IEEE.
  32. Zhang, C., Zhu, L., Xu, C., & Lu, R. (2018). PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system. Future Generation Computer Systems, 79, 16-25. https://doi.org/10.1016/j.future.2017.09.002