A Survey on Secure Cloud-Based E-Health Systems
INTRODUCTION: The e-health (electronic health) system is one of many cloud services which uses computer or electronic systems and cloud technology as its main source of operations for storing and sharing patient’s medical data between healthcare service providers and patients. The health data record...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
European Alliance for Innovation (EAI)
2020-05-01
|
Series: | EAI Endorsed Transactions on Pervasive Health and Technology |
Subjects: | |
Online Access: | https://eudl.eu/pdf/10.4108/eai.13-7-2018.163308 |
id |
doaj-4a22d069117444f99b4fa732419ce623 |
---|---|
record_format |
Article |
spelling |
doaj-4a22d069117444f99b4fa732419ce6232020-11-25T03:26:25ZengEuropean Alliance for Innovation (EAI)EAI Endorsed Transactions on Pervasive Health and Technology2411-71452020-05-0152010.4108/eai.13-7-2018.163308A Survey on Secure Cloud-Based E-Health SystemsDilip Yadav0Sephali Behera1Professor & Head, Department of Computer Applications, National Institute of Technology Jamshedpur, IndiaM.Tech Scholar, Department of Computer Applications, National Institute of Technology Jamshedpur, IndiaINTRODUCTION: The e-health (electronic health) system is one of many cloud services which uses computer or electronic systems and cloud technology as its main source of operations for storing and sharing patient’s medical data between healthcare service providers and patients. The health data records are kept in a semi-trusted third-party supplier (i.e., cloud). Therefore, its security has become the main concern as the data should not be accessible to unauthorized person.OBJECTIVES: To provide a brief knowledge on the security aspects of cloud-based e-health systems for further improvement in the field of e-health system security.METHODS: This paper presents a literature survey on secure cloud-based e-health systems including ninety-four research papers related to secure cloud-based e-health systems collected from different sources till 2019.RESULTS: The security mechanisms used to secure cloud-based e-health systems are divided into three categories (i.e., crypto, non-crypto, and biometric-based). Also some health related security laws, security mechanisms, advantages and limitations of security mechanisms for all categories are presented.CONCLUSION: This paper will be helpful to do further researches in the research area of e-health system as it consists of the analysis of security mechanisms, security laws, advantages and limitations of the security mechanisms.https://eudl.eu/pdf/10.4108/eai.13-7-2018.163308cloude-healthsecuritybiometricscryptographystoragedata sharing |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Dilip Yadav Sephali Behera |
spellingShingle |
Dilip Yadav Sephali Behera A Survey on Secure Cloud-Based E-Health Systems EAI Endorsed Transactions on Pervasive Health and Technology cloud e-health security biometrics cryptography storage data sharing |
author_facet |
Dilip Yadav Sephali Behera |
author_sort |
Dilip Yadav |
title |
A Survey on Secure Cloud-Based E-Health Systems |
title_short |
A Survey on Secure Cloud-Based E-Health Systems |
title_full |
A Survey on Secure Cloud-Based E-Health Systems |
title_fullStr |
A Survey on Secure Cloud-Based E-Health Systems |
title_full_unstemmed |
A Survey on Secure Cloud-Based E-Health Systems |
title_sort |
survey on secure cloud-based e-health systems |
publisher |
European Alliance for Innovation (EAI) |
series |
EAI Endorsed Transactions on Pervasive Health and Technology |
issn |
2411-7145 |
publishDate |
2020-05-01 |
description |
INTRODUCTION: The e-health (electronic health) system is one of many cloud services which uses computer or electronic systems and cloud technology as its main source of operations for storing and sharing patient’s medical data between healthcare service providers and patients. The health data records are kept in a semi-trusted third-party supplier (i.e., cloud). Therefore, its security has become the main concern as the data should not be accessible to unauthorized person.OBJECTIVES: To provide a brief knowledge on the security aspects of cloud-based e-health systems for further improvement in the field of e-health system security.METHODS: This paper presents a literature survey on secure cloud-based e-health systems including ninety-four research papers related to secure cloud-based e-health systems collected from different sources till 2019.RESULTS: The security mechanisms used to secure cloud-based e-health systems are divided into three categories (i.e., crypto, non-crypto, and biometric-based). Also some health related security laws, security mechanisms, advantages and limitations of security mechanisms for all categories are presented.CONCLUSION: This paper will be helpful to do further researches in the research area of e-health system as it consists of the analysis of security mechanisms, security laws, advantages and limitations of the security mechanisms. |
topic |
cloud e-health security biometrics cryptography storage data sharing |
url |
https://eudl.eu/pdf/10.4108/eai.13-7-2018.163308 |
work_keys_str_mv |
AT dilipyadav asurveyonsecurecloudbasedehealthsystems AT sephalibehera asurveyonsecurecloudbasedehealthsystems AT dilipyadav surveyonsecurecloudbasedehealthsystems AT sephalibehera surveyonsecurecloudbasedehealthsystems |
_version_ |
1724593031185694720 |