Skip to main content

Advertisement

Log in

Confidentiality Protection of Digital Health Records in Cloud Computing

  • Mobile Systems
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Electronic medical records containing confidential information were uploaded to the cloud. The cloud allows medical crews to access and manage the data and integration of medical records easily. This data system provides relevant information to medical personnel and facilitates and improve electronic medical record management and data transmission. A structure of cloud-based and patient-centered personal health record (PHR) is proposed in this study. This technique helps patients to manage their health information, such as appointment date with doctor, health reports, and a completed understanding of their own health conditions. It will create patients a positive attitudes to maintain the health. The patients make decision on their own for thoese whom has access to their records over a specific span of time specified by the patients. Storing data in the cloud environment can reduce costs and enhance the share of information, but the potential threat of information security should be taken into consideration. This study is proposing the cloud-based secure transmission mechanism is suitable for multiple users (like nurse aides, patients, and family members).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Kohn, L., Corrigan, J., and Donaldson, M., Committee on Quality of Health Care in America IoM. Crossing the quality chasm. National Academy Press, Washington, DC, 2001.

    Google Scholar 

  2. Markle Foundation, Connecting for health: a public private collaborative. New York, The personal health working group final report, 2003.

  3. Pagliari, C., Detmer, D., and Singleton, P., Potential of electronic personal health records. Br. Med. J. 335(7615):330–333, 2007.

    Article  Google Scholar 

  4. Computer Science and Telecommunications Board, National Research Council, Networking health: prescriptions for the internet. National Academy Press, Washington, DC, 2000.

    Google Scholar 

  5. The American Health Information Management Association and The American Medical Informatics Association, The value of personal health records: a joint position statement for consumers of health care. J. AHIMA 78(4):22–24, 2007.

    Google Scholar 

  6. Tang, P. C., Ash, J. S., Bates, D. W., Overhage, J. M., and Sands, D. Z., Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption. J. Am. Med. Inform. Assoc. 13(2):121–126, 2006.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  7. AHIMA e-HIM Personal Health Record Work Group, Defining the personal health record. J. Am. Health Inf. Manag. Assoc. 76(6):24–25, 2005.

    Google Scholar 

  8. Pratt, W., Unruh, K., Civan, A., and Skeels, M. M., Personal health information management. Commun. ACM 49(1):51–55, 2006.

    Article  Google Scholar 

  9. Li, M., Yu, S, Ren, K., Lou, W., Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings, 6th Iternational ICST Conference, Vol. 50, pp. 89–106, 2010.

  10. Sittig, D. F., Personal health records on the internet: a snapshot of the pioneers at the end of the 20th Century. Int. J. Med. Inform. 65(1):1–6, 2002.

    Article  PubMed  Google Scholar 

  11. Waegemann, C. P., Closer to reality: personal health records represent a step in the right direction for interoperability of healthcare IT systems and accessibility of patient data. Health Manag. Technol. 26(5):16–18, 2005.

    PubMed  Google Scholar 

  12. Tang, P. C., and Newcomb, C., Informing patients: a guide for providing patient health information. J. Am. Med. Inform. Assoc. 5(6):563–570, 1998.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  13. Markle Foundation, The personal health working group final report. Connecting for health: a public-private collaborative. Markle Foundation, 2003.

  14. Google Health, https://www.ROORle.com/health

  15. Microsoft Health Vault, http://www.healthvault.com

  16. Kaelber, D. C., Jha, A. K., Johnston, D., Middleton, B., and Bates, D. W., A research agenda for personal health records. J. Am. Med. Inform. Assoc. 15(6):729–736, 2008.

    Article  PubMed  PubMed Central  Google Scholar 

  17. Sunyaev, A., Chornyi, D., Mauro, C., and Kremar, H., Evaluation framework for personal health records: Microsoft HealthVault v.s. Google Health. IEEE Conference on System Sciences, System Sciences (HICSS), pp. 1–10, 2010.

  18. Kim, M. I., and Johnson, K. B., Personal health records: evaluation of functionality and utility. J. Am. Med. Inform. Assoc. 9:171–180, 2002.

    Article  PubMed  PubMed Central  Google Scholar 

  19. Working Group on Policies for Electronic Information Sharing between Doctors and Patients, Connecting Americans to their healthcare: final report. Markle Foundation, 2004.

  20. Cohen, J. T., HIPAA, The HITECH Act, and How Google May Still Be Able to Distribute, and Profit From, Your Personal Health Info. Health Reform Watch, 2009.

  21. Vaquero, L. M., Rodero-Merino, L., Caceres, J., and Lindner, M., A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput. Commun. Rev. 39(1):50–55, 2009.

    Article  Google Scholar 

  22. Mell, P., and Grance, T., The NIST definition of cloud computing. National Institute of Standards and Technology, 2011.

  23. Zissis, D., and Lekkas, D., Securing e-Government and e-Voting with an open cloud computing architecture. Gov. Inf. Q. 28(2):239–251, 2011.

    Article  Google Scholar 

  24. Yoo, C. S., Cloud computing: architectural and policy implications. Rev. Ind. Organ. 38(4):405–421, 2011.

    Article  Google Scholar 

  25. Vaquero, L. M., Rodero-Merino, L., and Morán, D., Locking the sky: a survey on IaaS cloud Security. Computing 91(1):93–118, 2011.

    Article  Google Scholar 

  26. Kandukuri, B. R., Paturi V. R., Rakshit A., “Cloud Security Issues,” 2009 I.E. International Conference on Services Computing, pp. 517–520, 2009.

  27. Parakh, A., and Kak, S., Online data storage using implicit security. Inf. Sci. 179(19):3323–3331, 2009.

    Article  Google Scholar 

  28. Crescenzo, G. D., Malkin, T., Ostrovsky, R., Single database private information retrieval implies oblivious transfer. Advances in Cryptology – EUROCRYPT 2000, Bruges, Belgium. Vol. 1807, pp. 122–138, 2000.

  29. Gara, J. A., and MacKenzie, P. D., Concurrent oblivious transfer. Proceedings of 41st Symposium on Foundations of Computer Science, Redondo Beach, California, USA, pp. 314–324, 2000.

  30. Kilian, J., Founding cryptography on oblivious transfer. Proceedings of 20th ACM Symposium on Theory of Computing, Chicago, USA, pp. 20–31, 1988.

  31. Rabin, M. O., How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Lab, Harvard University, 1981.

  32. Even, S., Goldreich, O., and Lempel, A., A randomized protocol for signing contracts. Commun. ACM 28(6):637–647, 1985.

    Article  Google Scholar 

  33. Brassard, G., and Cre’peau, C., Oblivious transfer and privacy amplification. EUROCRYPT’97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques, pp. 334–347, 1997.

  34. Huang, H. F., Chang, C. C., and Yeh, J. S., Enhancement of non-interactive oblivious transfer scheme. Proceedings of Fourth International Conference on Information and Management Sciences, pp. 196–199, 2005.

  35. Mu, Y., Zhang, J., Varadharajan, V., and Lin, Y. X., Robust non-interactive oblivious transfer. IEEE Commun. Lett. 7(4):153–155, 2003.

    Article  Google Scholar 

  36. Lee, N. Y., and Wang, C. C., Verifiable oblivious transfer protocol. IEICE Trans. Inf. Syst. E88-D(12):2890–2892, 2005.

    Article  Google Scholar 

  37. Chang, C. C., and Lee, J. S., Robust t-out-of-n oblivious transfer mechanism based on CRT. J. Netw. Comput. Appl. 32(1):226–235, 2008.

    Article  Google Scholar 

  38. Zhang, J., and Wang, Y, Two provably secure k-out-of-n oblivious transfer schemes. Appl. Math. Comput. 169, 2005.

  39. Chu, C.-K., and Tzeng, W.-G., Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries, PKC 2005 LNCS, pp. 172–183, 2005.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tzer-Shyong Chen.

Additional information

This article is part of the Topical Collection on Mobile Systems

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, SW., Chiang, D.L., Liu, CH. et al. Confidentiality Protection of Digital Health Records in Cloud Computing. J Med Syst 40, 124 (2016). https://doi.org/10.1007/s10916-016-0484-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-016-0484-7

Keywords

Navigation