2011
DOI: 10.1260/2040-2295.2.4.487
|View full text |Cite
|
Sign up to set email alerts
|

Health Records and the Cloud Computing Paradigm from a Privacy Perspective

Abstract: With the advent of cloud computing, the realization of highly available electronic health records providing location-independent access seems to be very promising. However, cloud computing raises major security issues that need to be addressed particularly within the health care domain. The protection of the privacy of individuals often seems to be left on the sidelines. For instance, common protection against malicious insiders, i.e., non-disclosure agreements, is purely organizational. Clearly, such measures… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…Intrusion Detection and Prevention Systems (IDPS) is one such system (Acharya et al 2013;Mackenzie et al 2011;Sun et al 2011;Toh et al 2011). The EHR system should offer mechanisms to back-up patient data for authorised users to ensure patient privacy (Stingl & Slamanig 2011). …”
Section: Operations Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Intrusion Detection and Prevention Systems (IDPS) is one such system (Acharya et al 2013;Mackenzie et al 2011;Sun et al 2011;Toh et al 2011). The EHR system should offer mechanisms to back-up patient data for authorised users to ensure patient privacy (Stingl & Slamanig 2011). …”
Section: Operations Securitymentioning
confidence: 99%
“…The availability of patient data can be implemented with security technologies, such as digital clustering, RAID systems and back-up procedures(van der Haak et al 2003). Utility means the system usability based on security implementation, and privacy and security establishments(Aljarullah & El-Masri 2012;Chen, Lu & Jan 2012;Stingl & Slamanig 2011;Sun et al 2011;Tsai 2010;van der Haak et al 2003;Zhang & Liu 2010). Cloud computing designs can help provide a high level of availability and utility of EHR information(Aljarullah & El-Masri 2012;Hsieh & Chen 2012;Huang et al 2013;Li et al 2013;Singh et al 2013;Stingl & Slamanig 2011).…”
mentioning
confidence: 99%
“…For example: Use of encryption and decryption concepts such as character-based encryption, unique encryption, public and private key encryption, combination of private and public key encryption, symmetric, authentication, digital signature, etc. (13, 14, 16, 19-25, 27, 32, 35-37). …”
Section: Discussionmentioning
confidence: 99%
“…EHR is an electronic version of the patient medical record kept by physicians and hospitals [11]. EHR integrates patient health information from different healthcare centers, and it is shared between them [12]. While EHR is controlled and intended for use by medical providers, PHR is controlled by patient [11].…”
Section: Proposal/developed Systemsmentioning
confidence: 99%