2020
DOI: 10.1007/978-981-15-3284-9_3
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving and Security Management in Cloud-Based Electronic Health Records—A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…Different techniques and methods have been practiced and implemented by the experts and the researchers to secure the electronic health record processing. Both cryptographic, as well as non-cryptographic techniques, have been applied in different environments to achieve confidentiality and privacy in healthcare data [11,12]. But there are very few studies that implement machine learning approaches to improve the confidentiality and privacy of healthcare data [13].…”
Section: Introductionmentioning
confidence: 99%
“…Different techniques and methods have been practiced and implemented by the experts and the researchers to secure the electronic health record processing. Both cryptographic, as well as non-cryptographic techniques, have been applied in different environments to achieve confidentiality and privacy in healthcare data [11,12]. But there are very few studies that implement machine learning approaches to improve the confidentiality and privacy of healthcare data [13].…”
Section: Introductionmentioning
confidence: 99%
“…Currently, systems at various clinics are fragmented and disconnected from each other [ 34 ]. At some clinics, the exchange of patients’ data between dental care providers is made through a manufacturer portal based on the local or global server storage, hence the dental company has access and control of the data [ 35 , 36 ]. This approach of data exchange is limited to homogeneous organizations that operate the same EDR software system, and this approach is not interoperable between various dental care organizations [ 37 , 38 ].…”
Section: Resultsmentioning
confidence: 99%
“…Figure 3 represents the general architecture for existing EDR systems where the data stored on the central or local storage. Clinics that have the same vendor software and access rights can retrieve from and upload the dental data into global storage [ 36 , 41 , 42 ]. However, in case of the local storage architecture, each clinic has its own storage which cannot be directly shared with other dental providers.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this case, the third party (trusted one) could manage the client's files on his behalf and allow clients to monitor [27]. A Blacklisted users authorized and trusted list of users, intrusion detection notifications could be utilized to enhance privacy [14,28].…”
Section: Sticky Policy and Blockchainmentioning
confidence: 99%