skip to main content
10.1145/2816839.2816930acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciipConference Proceedingsconference-collections
research-article

Data security and privacy in E-health Cloud: Comparative study

Published: 23 November 2015 Publication History

Abstract

The use of cloud computing in the medical sector has many advantages such as: reducing costs, sharing and exchanging information between medical institutions, data availability ... However, the centralization of sensitive health data in the Cloud Computing raises numerous problems concerning security and data privacy. Since the importance and sensitive nature of health data, medical institutions are reluctant to move those data's patients in the Cloud. This paper analysis the issues of security and privacy raised by the use of cloud in e-health. We will describe the architectures of the eHealth cloud, the problems of security and privacy related to these architectures and some of the different approaches proposed to address these issues.

References

[1]
Abbas, A. and U-Khan, S. 2014. A Review on the State-of-the-art Privacy-Preserving Approaches in e-health Clouds. IEEE Journal of Biomedical and Health Informatics.
[2]
AbuKhousa, E., Mohamed, N. and Al-Jaroodi, J. 2012. EHealth Cloud-Opportunities and Challenge. Journal Future Internet.
[3]
Chen, D., and Zhao, H. 2012. Data Security and Privacy Protection Issues in CC. IEEE International Conference on Computer Science and Electronics Engineering (ICCSEE).
[4]
Chen, P. C., Freg, C. P., Hou, T. W., and Teng, W. G. 2010. Implementing RAID-3 on Cloud Storage for EMR System. IEEE International Computer Symposium (ICS).
[5]
Chen, Y. Y., Lu, J. C., and Jan, J. K. 2012. A secure EHR system based on hybrid Clouds. Springer Journal of Medical Systems, LLC.
[6]
Dong, N., Jonker, H., and Pang, J. 2012. Challenges in e-Health: from enabling to enforcing privacy. Springer 1st International Symposium.
[7]
Duquenoy, P., Mekawie, N. M., and Springett, M. 2013. Patients, Trust and Ethics in Information Privacy in eHealth. Springer Berlin Heidelberg.
[8]
Goce, G., and Trajkovik, V. 2013. Security and Privacy Issues and Requirements for healthcare CC. Springer Advances in Intelligent Systems and Computing.
[9]
Huang, X., and Du, X. 2013. Efficiently Secure Data Privacy on Hybrid Cloud. IEEE International Conference on Communications (ICC).
[10]
Huda, N., Sonehara, N., and Yamada, S. 2009. A privacy Management Architecture For Patient-controlled Personal Health Record System. Journal of Engineering Science and Technology.
[11]
Ikuomola, A. J., and Oluremi, O. A. 2014. Securing Patient Privacy in E-Health Cloud Using Homomorphic. International Journal of Computer Networks and Communications Securit (CNCS).
[12]
Li, Z. R., Chang, E. C., Huang, K. H., and Lai, F. 2011. A Secure Electronic Medical Record Sharing Mechanism in the CC platform. 15th International Symposium on Consumer Electronics IEEE.
[13]
Liu, F., Rijnboutt, E., and Routsis, D. 2013. What challenges have to be faced when using the Cloud for the e-health service. IEEE 15th International Conference on e-Health Networking, Applications and services.
[14]
Löhr, H., Sadeghi, A. R., and Winandy, M. 2010. Securing the E-Health Cloud. ACM 1st International Health Informatics Symposium.
[15]
Pearson, S. 2009. Taking Account of Privacy when Designing Cloud Computing Services. HP Laboratories.
[16]
Ruj, S., Stojmenovic, M., Nayak, A. 2012. Privacy Preserving Access Control with Authentication for securing data in the Clouds. IEEE/ACM 12th International Symposium on Cluster, Cloud and Grid Computing (CCGrid).
[17]
Tang, Z., Wang, X., Li, J., Zhang, X., and Man, W. 2012. Study on Data Security of Cloud Computing. IEEE Spring Congress on Engineering and Technology (S-CET).

Cited By

View all
  • (2022)Cybersecurity Enterprises Policies: A Comparative StudySensors10.3390/s2202053822:2(538)Online publication date: 11-Jan-2022
  • (2020)Fuzzy Keywords-Driven Public Sports Resource Allocation Strategies Retrieval With Privacy-PreservationIEEE Access10.1109/ACCESS.2020.30335518(195980-195988)Online publication date: 2020
  • (2020)Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunitiesCluster Computing10.1007/s10586-020-03106-1Online publication date: 22-Apr-2020

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
IPAC '15: Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication
November 2015
495 pages
ISBN:9781450334587
DOI:10.1145/2816839
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 November 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cloud Computing
  2. EHR
  3. PHR
  4. e-health cloud

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

IPAC '15

Acceptance Rates

Overall Acceptance Rate 87 of 367 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Cybersecurity Enterprises Policies: A Comparative StudySensors10.3390/s2202053822:2(538)Online publication date: 11-Jan-2022
  • (2020)Fuzzy Keywords-Driven Public Sports Resource Allocation Strategies Retrieval With Privacy-PreservationIEEE Access10.1109/ACCESS.2020.30335518(195980-195988)Online publication date: 2020
  • (2020)Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunitiesCluster Computing10.1007/s10586-020-03106-1Online publication date: 22-Apr-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media