1000/1000
Hot
Most Recent
Health information systems (HISs) have immense value for healthcare institutions, as they provide secure storage, efficient retrieval, insightful analysis, seamless exchange, and collaborative sharing of patient health information. HISs are implemented to meet patient needs, as well as to ensure the security and privacy of medical data, including confidentiality, integrity, and availability, which are necessary to achieve high-quality healthcare services.
Health Information System | Security Technologies |
Privacy Technologies |
Advantages | Disadvantages |
---|---|---|---|---|
Electronic Health Records (EHRs) | Encryption, Access Control, Auditing | Data Masking, Patient Consent Mechanisms | Improved data integrity, Efficient access control | Complex implementation, High initial setup costs, Privacy concerns, Concerns over data breaches |
Health Information Exchange (HIE) | Secure Data Transmission Protocols, Identity Management | Anonymization Techniques, Consent Management Systems | Enhanced interoperability and data sharing | Concerns over data breaches during exchange, Consent management challenges |
Clinical Trial Management Systems | Secure Data Storage, Blockchain for Auditing | De-identification Methods, Informed Consent Platforms | Enhanced traceability, Immutable data records | Limited scalability, Ethical concerns related to consent |
Reference | Technology Name | Security and Privacy Features |
Primary Functions | Advantages |
---|---|---|---|---|
[29] | Multi-agent-based systems (user interface agent, authentication agent, connection establishment agent, and connection management agent) | Security Privacy |
These intelligent agents make ease of use and effective communication between patients/users and the e-service providers. | Simple and efficient access control mechanism based on the agents’ functionalities, Provides effective and secure e-health security services |
[30] | Log of round value-based elliptic curve cryptography (LR-ECC) Herding genetic algorithm-based deep learning neural network (EHGA-DLNN) |
Security Privacy |
Enhance the security level during data transfer after the initial authentication phase | High security and accuracy |
[31] | Hash-based BBS (HBBS) | Security | For integrity purposes, the hash value is generated using secure hash algorithm SHA-256 and is hidden in the least significant bit (LSB) of the extracted pseudo-random bits for the purpose of generating multiple keystreams. | Has high security and good efficiency |
[32] | Decentralized federated learning-based convolutional neural network | Security Privacy |
Presents a privacy-friendly and secure EHR scheme for medical cyber-physical systems. | Securing valuable hospital biomedical data useful for clinical research organizations, Suitable for promoting a secure and privacy-friendly environment for sharing data with clinical research centers for biomedical research |
[33] | Ordered binary decision diagram (OBDD) |
Security | Achieves immediate attribute/user revocation, collusion resistance, forward security, backward security, efficiency, and expressiveness | The efficiency of the scheme can be attributed to the use of prime-order groups, minimized hashing operations, and reduced amount of exponentiation operations. |
[34] | Elliptic curve cryptography (ECC) operations Physically unclonable function (PUF) |
Security | Improve security and efficiency at the same time, Strict formal security proof is provided to demonstrate the proposed scheme meets the security and reliability requirements |
Meets more security and usability requirements and takes less computational and communication costs than related protocols proposed recently |
[35] | Lightweight encryption scheme Message authentication code (MAC) generation scheme |
Security Privacy |
Secures the communication between medical sensors and data servers | Achieves data confidentiality, authenticity, and integrity between each medical sensor and each data server |
[36] | Subprotocols as building blocks, such as PPC, PPCC, PPSS, and PPSU protocols | Privacy | It first designs secure and privacy-preserving several subprotocols to ensure privacy in the e-healthcare system, then it adopts the greedy algorithm in a secure manner to perform the query and the min-heap technology to improve efficiency. | Practical and efficient in terms of computational cost and communication overhead |
[37] | Near-field communication (NFC) authentication mechanism | Privacy | To generate a trustworthy source of visit records, the article uses a system that supplies concrete evidence that healthcare personnel visited a patient’s residence. | Using the NFC tag enhances the workflow of users and integrates it into a seamless access control process. It helps improve user interaction by eliminating user input tasks. |
[38] | Spring Framework services for sensitive data (TSD) Hypertext Transfer Protocol (HTTP (H)) |
Security | Providing secure hosting and operation of application services, collection, storage, processing, and provisioning of data | A key element of Spring is application-level infrastructure support. It effectively protects the application programming interface (API) and personal health data. |
[20] | Edge cloud blockchain |
Security | The edge cloud performs context-aware health situation identification and utilizes a blockchain-based secure data sharing mechanism to facilitate secure uploading and sharing of health data. | It identifies the health situation based on a similarity measure in the edge cloud. A blockchain-based securing data sharing mechanism is used to achieve secure sharing of health data among patients and health service providers. |