Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions

International Journal of Information Management - Tập 36 - Trang 1161-1173 - 2016
Harsha S. Gardiyawasam Pussewalage1, Vladimir A. Oleshchuk1
1Department of Information and Communication Technology, University of Agder (UiA), N-4898 Grimstad, Norway

Tài liệu tham khảo

Alshehri, 2013, Secure access control for health information sharing systems, 277 Au, 2008, Consumer-centric and privacy-preserving identity management for distributed e-health systems, 234 Barua, 2011, ESPAC: Enabling security and patient-centric access control for e-health in cloud computing, International Journal of Network Security, 6, 67, 10.1504/IJSN.2011.043666 Barua, 2011, PEACE: An efficient and secure patient-centric access control scheme for e-health care system, 970 Barua, 2013, SPS: Secure personal health information sharing with patient-centric access control in cloud computing, 647 Bertino, 2008, An efficient time-bound hierarchical key management scheme for secure broadcasting, IEEE Transactions on Dependable and Secure Computing, 5, 65, 10.1109/TDSC.2007.70241 Bethencourt, 2007, Ciphertext-policy attribute-based encryption, 321 Bleikertz, 2010, Security audits of multi-tier virtual infrastructures in public infrastructure clouds, 93 Bobba, 2009, Attribute-sets: A practically motivated enhancement to attribute-based encryption, 587 Boneh, 2001, Identity-based encryption from the Weil pairing, 213 Carrión, 2011, Usable privacy and security in personal health records, 36 Chase, 2007, Multi-authority attribute based encryption, 515, 10.1007/978-3-540-70936-7_28 Chen, 2012, Secure dynamic access control scheme of PHR in cloud computing, Journal of Medical Systems, 36, 4005, 10.1007/s10916-012-9873-8 Chen, 2013, Privacy management in dynamic groups: Understanding information privacy in medical practices, 541 Chen, 2012, A secure EHR system based on hybrid clouds, Journal of Medical Systems, 36, 3375, 10.1007/s10916-012-9830-6 Cheong, 2009, Improving Korean service delivery system in health care: Focusing on national e-health system, 263 Coppolino, 2016, Cloud security: Emerging threats and current solutions, Computers & Electrical Engineering, 10.1016/j.compeleceng.2016.03.004 Danwei, 2014, Securing patient-centric personal health records sharing system in cloud computing, China Communications, 11, 121, 10.1109/CC.2014.7022535 Díaz-Palacios, 2013, Biometric access control for e-health records in pre-hospital care, 169 Dodis, 2004, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, 523 Dong, 2012, Challenges in e-health: From enabling to enforcing privacy, 195 Eskeland, 2008, Secure team-based EPR access acquisition in wireless networks, 943 Eskeland, 2007, EPR access authorization of medical teams based on patient consent, 11 Ferraiolo, 2001, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, 4, 224, 10.1145/501978.501980 Flores Zuniga, 2010, Biometrics for electronic health records, Journal of Medical Systems, 34, 975, 10.1007/s10916-009-9313-6 Ghazvini, 2013, Security challenges and success factors of electronic healthcare system, Procedia Technology, 11, 212, 10.1016/j.protcy.2013.12.183 Gondkar, 2014, Attribute based encryption for securing personal health record on cloud, 1 Gov.uk, 2011 Goyal, 2006, Attribute-based encryption for fine-grained access control of encrypted data, 89 Grobauer, 2011, Understanding cloud computing vulnerabilities, IEEE Security and Privacy, 9, 50, 10.1109/MSP.2010.115 Hansen, 2006, Location-based security framework for use of handheld devices in medical information systems, 565 HSCIC, 2015 Hu, 2010, A hybrid public key infrastructure solution for HIPAA privacy/security regulations, Computer Standards & Interfaces, 32, 274, 10.1016/j.csi.2009.04.005 Hu, 2014, Guide to attribute based access control (ABAC) definition and considerations, National Institute of Standards and Technology Special Publication, 162 Huang, 2011, Efficient key management for preserving HIPAA regulations, Journal of Systems and Software, 84, 113, 10.1016/j.jss.2010.08.056 Ibraimi, 2009, Secure management of personal health records by applying attribute-based encryption, 71 Ibraimi, 2009, Efficient and provable secure ciphertext-policy attribute-based encryption schemes, 1 Indhumathi, 2015, On demand security for personal health record in cloud computing, 1 Jafari, 2011, A rights management approach to protection of privacy in a cloud of electronic health records, 23 Jin, 2011, Patient-centric authorization framework for electronic healthcare services, Computers & Security, 30, 116, 10.1016/j.cose.2010.09.001 Juels, 2006, A fuzzy vault scheme, Designs, Codes, and Cryptography, 38, 237, 10.1007/s10623-005-6343-z Khan, 2012, Context-aware access control for clinical information systems, 123 Khan, 2012, Toward a synergy among discretionary, role-based and context-aware access control models in healthcare information technology, 66 Lambrinoudakis, 2000, Managing medical and insurance information through a smart-card-based information system, Journal of Medical Systems, 24, 213, 10.1023/A:1005549330655 Lee, 2008, A cryptographic key management solution for HIPAA privacy/security regulations, IEEE Transactions on Information Technology in Biomedicine, 12, 34, 10.1109/TITB.2007.906101 Li, 2013, Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption, IEEE Transactions on Parallel and Distributed Systems, 24, 131, 10.1109/TPDS.2012.97 Li, 2011, A secure electronic medical record sharing mechanism in the cloud computing platform, 98 Martino, 2008, Multi-domain and privacy-aware role based access control in e-health, 131 Mirkovic, 2015, Security and privacy legislation guidelines for developing personal health records, 77 Motta, 2003, A contextual role-based access control authorization model for electronic patient record, IEEE Transactions on Information Technology in Biomedicine, 7, 202, 10.1109/TITB.2003.816562 Narayan, 2010, Privacy preserving EHR system using attribute-based infrastructure, 47 Ni, 2007, Privacy-aware role based access control, 41 O’Kane, 2013, Non-static nature of patient consent: Shifting privacy perspectives in health information sharing, 553 Par, 2012, Security standards for electronic health records, 815 Privacy Rights Clearinghouse, 2005 Ray, 2012, Design of RSA-CA based e-health system for supporting HIPAA privacy-security regulations, Procedia Technology, 6, 954, 10.1016/j.protcy.2012.10.116 Ray, 2014, A certificate authority (CA)-based cryptographic solution for HIPAA privacy/security regulations, Journal of King Saud University Computer and Information Sciences, 26, 170, 10.1016/j.jksuci.2013.10.001 Ruj, 2014, Attribute based access control in clouds: A survey, 1 Sahai, 2005, Fuzzy identity-based encryption, 457 Samydurai, 2015, Secured health care information exchange on cloud using attribute based encryption, 1 Scholl, 2008, vol. 1, 800 Shanthini, 2012, Genetic-based biometric security system for wireless sensor-based health care systems, 180 Sharma, 2014, A biometric based authentication and encryption framework for sensor health data in cloud, 49 Soceanu, 2015, Managing the privacy and security of e-health data, 439 Sui, 2009, An efficient time-bound access control scheme for dynamic access hierarchy, 279 Trojer, 2012, Considering privacy and effectiveness of authorization policies for shared electronic health records, 553 US Department of Health and Human Services, 2013, Standards for privacy of individually identifiable health information: Final rule, 78, 5566 US Department of Health and Human Services, 2015 Velciu, 2014, Bio-cryptographic authentication in cloud storage sharing, 165 Wang, 2011, Quantified risk-adaptive access control for patient privacy protection in health information systems, 406 Warren, 2014, Securing EHRs via CPMA attribute-based encryption on cloud systems, 20:1 WHO, 2006 Wu, 2012, Secure sharing of electronic health records in clouds, 711 Yang, 2006, Taiwan's perspective on electronic medical records’ security and privacy protection: Lessons learned from HIPAA, Computer Methods and Programs in Biomedicine, 82, 277, 10.1016/j.cmpb.2006.04.002 Yi, 2013, Multiparty privacy protection for electronic health records, 2730 Zhang, 2011, RBTBAC: Secure access and management of EHR data, 494