2021
DOI: 10.1109/access.2021.3098708
|View full text |Cite
|
Sign up to set email alerts
|

A Review of the State of the Art in Privacy and Security in the eHealth Cloud

Abstract: The proliferation and usefulness of cloud computing in eHealth demands high levels of security and privacy for health records. However, eHealth clouds pose serious security and privacy concerns for sensitive health data. Therefore, practical and effective methods for security and privacy management are essential to preserve the privacy and security of the data. To review the current research directions in security and privacy in eHealth clouds, this study analysed and summarized the state of the art technologi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 126 publications
0
6
0
Order By: Relevance
“…HIPPA compliant high-value eHealth platforms that allow for the transfer of wearable data to the EMR or health dashboard is essential for the expansion of telerehabilitation in the pediatric populations (75). A cost effective collaboration with experts in the technical space to develop and maintain secure a system would provide the resource needed for a secure platform, due to the complexity and constantly changing nature of the digital and online threats (130). These limitations are not small obstacles and need to be addressed in order for technology to truly help expand the reach of health care providers to the pediatric cardiac rehabilitation population.…”
Section: Considerations For Equity and Accessibilitymentioning
confidence: 99%
“…HIPPA compliant high-value eHealth platforms that allow for the transfer of wearable data to the EMR or health dashboard is essential for the expansion of telerehabilitation in the pediatric populations (75). A cost effective collaboration with experts in the technical space to develop and maintain secure a system would provide the resource needed for a secure platform, due to the complexity and constantly changing nature of the digital and online threats (130). These limitations are not small obstacles and need to be addressed in order for technology to truly help expand the reach of health care providers to the pediatric cardiac rehabilitation population.…”
Section: Considerations For Equity and Accessibilitymentioning
confidence: 99%
“…Security measures can be categorized into preventive, detective, and reactive strategies. 11 Preventive mechanisms aim to prevent or mitigate the system vulnerabilities. For instance, an effective access control scheme ensures clients' security within the cloud environment and prevents unauthorized access.…”
Section: Centralized (Cloud-based) Architecturesmentioning
confidence: 99%
“…To establish a robust security framework, it is imperative to examine and identify potential threats and attacks that could emerge throughout the management lifecycle. Security measures can be categorized into preventive, detective, and reactive strategies 11 . Preventive mechanisms aim to prevent or mitigate the system vulnerabilities.…”
Section: Recent Work On Security and Privacy Provision In Ehealthmentioning
confidence: 99%
“…According to (Shrivastava et al, 2020), encryption is mixed-up data that only an authorised person can understand. The process of encryption is converting plain text into ciphertext (Sahi et al, 2021). The process is changing the legible data into an output that consists of random words.…”
Section: Previous Studymentioning
confidence: 99%