2017
DOI: 10.1016/j.future.2016.08.011
|View full text |Cite
|
Sign up to set email alerts
|

Research issues for privacy and security of electronic health services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
63
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 130 publications
(63 citation statements)
references
References 47 publications
0
63
0
Order By: Relevance
“…Reference [24] studies the identity exposure problem in cloud-based healthcare applications and proposes an anonymous authentication approach. However, cloud services are not fully trusted by users, due to the infrastructure security, data ownership, and vendor lock-in issues in cloud sourcing [7,25,26].…”
Section: Related Workmentioning
confidence: 99%
“…Reference [24] studies the identity exposure problem in cloud-based healthcare applications and proposes an anonymous authentication approach. However, cloud services are not fully trusted by users, due to the infrastructure security, data ownership, and vendor lock-in issues in cloud sourcing [7,25,26].…”
Section: Related Workmentioning
confidence: 99%
“…These solutions were helpful at some extent in offering various security requirements under desired healthcare scenarios. However, with the current advancement in healthcare technology, these approaches are not just sufficient because the patient has been exploited by various stakeholders through different means and without their consent [11], [12]. In this context, researchers are keen to find various secure solutions based on blockchain based healthcare approaches [13].…”
Section: Related Workmentioning
confidence: 99%
“…After the sequencing process, the produced reads are typically used either in a de novo assembly, or aligned to a reference genome. Besides the wide use of genomic data on diverse fields, privacy attacks [8], [22] and the use of clouds environments for biomedical data analysis [23], [24], [25], [26] have raised concerns about the data security on the alignment step. Melissa Gymrek et al [5] performed a re-identification attack identifying 131 of the anonymized genomes of the 1000 Genomes Project.…”
Section: Related Workmentioning
confidence: 99%