Journal:Security and privacy in cloud-based eHealth systems
Full article title | Security and privacy in cloud-based eHealth systems |
---|---|
Journal | Symmetry |
Author(s) | Sivan, Remya; Zukarnain, Zuriati, A. |
Author affiliation(s) | University Putra Malaysia |
Primary contact | Email: gs59108 at student dot upm dot edu dot my |
Year published | 2021 |
Volume and issue | 13(5) |
Article # | 742 |
DOI | 10.3390/sym13050742 |
ISSN | 2073-8994 |
Distribution license | Creative Commons Attribution 4.0 International |
Website | https://www.mdpi.com/2073-8994/13/5/742/htm |
Download | https://www.mdpi.com/2073-8994/13/5/742/pdf (PDF) |
This article should be considered a work in progress and incomplete. Consider this article incomplete until this notice is removed. |
Abstract
Cloud-based healthcare computing has changed the face of healthcare in many ways. The main advantages of cloud computing in healthcare are scalability of the required service and the provision to upscale or downsize the data storge, particularly in conjunction with approaches to artificial intelligence (AI) and machine learning. This paper examines various research studies to explore the utilization of intelligent techniques in health systems and mainly focuses on the security and privacy issues in the current technologies. Despite the various benefits related to cloud computing applications for healthcare, there are different types of management, technology handling, security measures, and legal issues to be considered and addressed. The key focus of this paper is to address the increased demand for cloud computing and its definition, technologies widely used in healthcare, their problems and possibilities, and the way protection mechanisms are organized and prepared when the company chooses to implement the latest evolving service model. As such, we sought out current literature on different approaches and mechanisms used in eHealth to deal with security and privacy issues. Some of these approaches have strengths and weaknesses. After selecting original articles, a literature review was carried out, and we identified several models adopted in their solutions. We arrived at the reviewed articles after comparing the models used.
Keywords: eHealth, cloud computing, security, privacy in health systems
Introduction
References
Notes
This presentation is faithful to the original, with only a few minor changes to presentation. Some grammar and punctuation was cleaned up to improve readability. In some cases important information was missing from the references, and that information was added.