Skip to main content
Top

2023 | OriginalPaper | Chapter

A Novel Approach to Privacy Preservation on E-Healthcare Data in a Cloud Environment

Authors : Kirtirajsinh Zala, Madhu Shukla

Published in: Smart Trends in Computing and Communications

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud environment enables healthcare professionals to work together. Despite its many benefits, it faces several difficulties: technical, legal, and managerial. Cloud computing can enhance healthcare facilities by utilizing its skills to assist information transfer within the health monitoring system, and without any geographical limitations, users such as patients, physicians, pharmacists, and health insurance agents can obtain health-associated information at any moment. With the widespread use of healthcare information and communication technology (ICT), creating a stable and sustainable data sharing scenario has attracted increasing interest in both academic research and the healthcare sector. This paper evaluates and compare the present situation with the security criteria for cloud-based medical e-health record. In addition, this paper outlines proposed cloud model and comparison of our proposed cloud model with different frameworks listed in different research papers are discussed through which how we can safeguard patient e-healthcare record over cloud environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference M. Marwan, A. Kartit, and H. Ouahmane, “A Cloud Based Solution for Collaborative and Secure Sharing of Medical Data,” Cloud Security, pp. 1528– 1547, 2019. M. Marwan, A. Kartit, and H. Ouahmane, “A Cloud Based Solution for Collaborative and Secure Sharing of Medical Data,” Cloud Security, pp. 1528– 1547, 2019.
2.
go back to reference H. Elmogazy and O. Bamasak, “Towards healthcare data security in cloud computing,” 2013 IEEE Third International Conference on Information Scienceand Technology (ICIST), 2013. H. Elmogazy and O. Bamasak, “Towards healthcare data security in cloud computing,” 2013 IEEE Third International Conference on Information Scienceand Technology (ICIST), 2013.
3.
go back to reference D. R. Matos, M. L. Pardal, P. Adão, A. R. Silva, and M. Correia, “Securing Electronic Health Records in the Cloud,”Proceedings of the 1st Workshop onPrivacy by Design in Distributed Systems - W-P2DS18, Apr. 2018. D. R. Matos, M. L. Pardal, P. Adão, A. R. Silva, and M. Correia, “Securing Electronic Health Records in the Cloud,”Proceedings of the 1st Workshop onPrivacy by Design in Distributed Systems - W-P2DS18, Apr. 2018.
4.
go back to reference F. Rezaeibagha, Y. Mu, Distributed clinical data sharing via dynamic access-control policy transformation. Int. J. Med. Informatics 89, 25–31 (2016)CrossRef F. Rezaeibagha, Y. Mu, Distributed clinical data sharing via dynamic access-control policy transformation. Int. J. Med. Informatics 89, 25–31 (2016)CrossRef
5.
go back to reference Randike Gajanayake,Renato lannella,Tony Sahema,” Privacy Oriented Access Control for Electronic Health Records,” InData Usage Management on the WebWorkshop at the Worldwide Web Conference, ACM, Lyon Convention Centre,Lyon, France2012. Randike Gajanayake,Renato lannella,Tony Sahema,” Privacy Oriented Access Control for Electronic Health Records,” InData Usage Management on the WebWorkshop at the Worldwide Web Conference, ACM, Lyon Convention Centre,Lyon, France2012.
6.
go back to reference N.A. Azeez, C.V.D. Vyver, Security and privacy issues in e-health cloud-based system: A comprehensive content analysis. Egyptian Informatics Journal 20(2), 97–108 (2019)CrossRef N.A. Azeez, C.V.D. Vyver, Security and privacy issues in e-health cloud-based system: A comprehensive content analysis. Egyptian Informatics Journal 20(2), 97–108 (2019)CrossRef
7.
go back to reference H. Vaghashia and A. Ganatra, “Applications, vol. 119, no. 4, pp. 20–26, .A Survey: Privacy Preservation Techniques in Data Mining,”International Journal of Computer-2015. H. Vaghashia and A. Ganatra, “Applications, vol. 119, no. 4, pp. 20–26, .A Survey: Privacy Preservation Techniques in Data Mining,”International Journal of Computer-2015.
8.
go back to reference M. Marwan, A. Kartit, and H. Ouahmane, “Using cloud solution for medical image processing: Issues and implementation efforts,” 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech), 2017. M. Marwan, A. Kartit, and H. Ouahmane, “Using cloud solution for medical image processing: Issues and implementation efforts,” 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech), 2017.
10.
go back to reference Monica Adriana Dag¸ Emil Ioan ¸Razvan Dobre,” Data Hiding Using Steganography”IEEE 12th International Symposium on Parallel and DistributedComputing, 2013. Monica Adriana Dag¸ Emil Ioan ¸Razvan Dobre,” Data Hiding Using Steganography”IEEE 12th International Symposium on Parallel and DistributedComputing, 2013.
11.
go back to reference M. Gomathisankaran, X. Yuan, and P. Kamongi, “Ensure privacy and security in the process of medical image analysis,”IEEE International Conference on GranularComputing (GrC), 2013. M. Gomathisankaran, X. Yuan, and P. Kamongi, “Ensure privacy and security in the process of medical image analysis,”IEEE International Conference on GranularComputing (GrC), 2013.
12.
go back to reference Dalia Sobhy, Yasser El-Sonbaty and Mohamad Abou Elnasr,” MedCloud: Healthcare Cloud Computing System,” The 7th International Conference forInternet Technology and Secured Transactions (ICITST-2012). Dalia Sobhy, Yasser El-Sonbaty and Mohamad Abou Elnasr,” MedCloud: Healthcare Cloud Computing System,” The 7th International Conference forInternet Technology and Secured Transactions (ICITST-2012).
13.
go back to reference X.A. Wang, J. Ma, F. Xhafa, M. Zhang, X. Luo, Cost-effective secure E-health cloud system using identity based cryptographic techniques. FutureGeneration Computer Systems 67, 242–254 (2017) X.A. Wang, J. Ma, F. Xhafa, M. Zhang, X. Luo, Cost-effective secure E-health cloud system using identity based cryptographic techniques. FutureGeneration Computer Systems 67, 242–254 (2017)
14.
go back to reference Farheen Pathan, Prof. Jadhav H. B.,” Patient Privacy Control for Health Care in Cloud Computing System,” International Research Journal of Engineering andTechnology (IRJET),vol.04,issue 07,july-2017. Farheen Pathan, Prof. Jadhav H. B.,” Patient Privacy Control for Health Care in Cloud Computing System,” International Research Journal of Engineering andTechnology (IRJET),vol.04,issue 07,july-2017.
15.
go back to reference M. A. Usman and M. R. Usman, “Using image steganography for providing enhanced medical data security,” 2018 15th IEEE Annual ConsumerCommunications & Networking Conference (CCNC), 2018. M. A. Usman and M. R. Usman, “Using image steganography for providing enhanced medical data security,” 2018 15th IEEE Annual ConsumerCommunications & Networking Conference (CCNC), 2018.
16.
go back to reference Y. Guo, M.-H. Kuo, and T. Sahama, “Cloud computing for healthcare research information sharing,” 4th IEEE International Conference on Cloud ComputingTechnology and Science Proceedings, 2012. Y. Guo, M.-H. Kuo, and T. Sahama, “Cloud computing for healthcare research information sharing,” 4th IEEE International Conference on Cloud ComputingTechnology and Science Proceedings, 2012.
17.
go back to reference I. Masood, Y. Wang, A. Daud, N.R. Aljohani, H. Dawood, Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure. Wirel. Commun. Mob. Comput. 2018, 1–23 (2018)CrossRef I. Masood, Y. Wang, A. Daud, N.R. Aljohani, H. Dawood, Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure. Wirel. Commun. Mob. Comput. 2018, 1–23 (2018)CrossRef
18.
go back to reference H. Ko, L. Mesicek, J. Choi, J. Choi, S. Hwang, A Study on Secure Contents Strategies for Applications With DRM on Cloud Computing. InternationalJournal of Cloud Applications and Computing 8(1), 143–153 (2018)CrossRef H. Ko, L. Mesicek, J. Choi, J. Choi, S. Hwang, A Study on Secure Contents Strategies for Applications With DRM on Cloud Computing. InternationalJournal of Cloud Applications and Computing 8(1), 143–153 (2018)CrossRef
19.
go back to reference S. Shenai and M. Aramudhan, “Cloud computing framework to securely share health & medical records among federations of healthcare information systems,” Biomedical Research, Jun.2017. S. Shenai and M. Aramudhan, “Cloud computing framework to securely share health & medical records among federations of healthcare information systems,” Biomedical Research, Jun.2017.
21.
go back to reference P. Humane, J. Varshapriya, Simulation of cloud infrastructure using CloudSim simulator: a practical approach for researchers, in International Conference on SmartTechnologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), pp. 207–211, May 2015 P. Humane, J. Varshapriya, Simulation of cloud infrastructure using CloudSim simulator: a practical approach for researchers, in International Conference on SmartTechnologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), pp. 207–211, May 2015
Metadata
Title
A Novel Approach to Privacy Preservation on E-Healthcare Data in a Cloud Environment
Authors
Kirtirajsinh Zala
Madhu Shukla
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-9967-2_15

Premium Partner