Healthcare data privacy measures to cure & care cloud uncertainties

Information technology has great potential to improve healthcare quality and efficiency, and thus, has been a major focus of recent healthcare reform efforts. Today, data are usually tackled by leveraging existing encryption cryptographic methods, such that only outsourced data are encrypted and is inaccessible by cloud servers that enables to protect the confidentiality of the data. In this paper, various healthcare data privacy measures are studied and analyzed. It divides the measures on the basis of three major platforms, i.e., Architectural Measures, Technique-based Measures and Algorithmic Measures. Here, a detailed view of wide variety of proposals are beaded together to help researchers to get the best out of all traditional and conventional healthcare data privacy preserving schemes. A comprehensive comparison of the privacy-preserving approaches from the angle of the privacy-preserving requirements' satisfaction is presented.

[1]  Jianqiang Li,et al.  A hybrid solution for privacy preserving medical data sharing in the cloud environment , 2015, Future Gener. Comput. Syst..

[2]  Jianfeng Ma,et al.  Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification , 2016, IEEE Journal of Biomedical and Health Informatics.

[3]  Woei-Jiunn Tsaur,et al.  Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection , 2015, IEEE Transactions on Reliability.

[4]  Gheith A. Abandah,et al.  Crypto-based algorithms for secured medical image transmission , 2015, IET Inf. Secur..

[5]  Hector Garcia-Molina,et al.  Data Leakage Detection , 2011, IEEE Transactions on Knowledge and Data Engineering.

[6]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.

[7]  Martin Hilbert,et al.  What Is the Content of the World's Technologically Mediated Information and Communication Capacity: How Much Text, Image, Audio, and Video? , 2014, Inf. Soc..

[8]  Yong Yu,et al.  Privacy preserving cloud data auditing with efficient key update , 2018, Future Gener. Comput. Syst..

[9]  Young-Sil Lee,et al.  Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system , 2014, The International Conference on Information Networking 2014 (ICOIN2014).

[10]  Costas Lambrinoudakis,et al.  Technical guidelines for enhancing privacy and data protection in modern electronic medical environments , 2005, IEEE Transactions on Information Technology in Biomedicine.

[11]  Tsan-sheng Hsu,et al.  Logic, Probability, and Privacy: A Framework for Specifying Privacy Requirements , 2012, Turing-100.

[12]  Xi He,et al.  Cloud Computing: a Perspective Study , 2010, New Generation Computing.

[13]  Simone Fischer-Hübner,et al.  IT-Security and Privacy , 2001, Lecture Notes in Computer Science.

[14]  R.T.Subhalakshmi,et al.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption , 2016 .

[15]  Pieter H. Hartel,et al.  Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application , 2009, WISA.