2013
DOI: 10.2196/jmir.2494
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the Security and Privacy Requirements of Cloud-Based Electronic Health Records Systems

Abstract: BackgroundThe Cloud Computing paradigm offers eHealth systems the opportunity to enhance the features and functionality that they offer. However, moving patients’ medical information to the Cloud implies several risks in terms of the security and privacy of sensitive health records. In this paper, the risks of hosting Electronic Health Records (EHRs) on the servers of third-party Cloud service providers are reviewed. To protect the confidentiality of patient information and facilitate the process, some suggest… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
112
0
3

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 162 publications
(115 citation statements)
references
References 22 publications
0
112
0
3
Order By: Relevance
“…In the process of migrating healthcare data to a cloud system, there are security precautions to be taken which include data encryption [8]. While data encryption seems be the most secure method for handling patients data, however not all EHR systems are compatible with standard encryption methods.…”
Section: Security and Privacy Of Healthcare Data With Cloud Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…In the process of migrating healthcare data to a cloud system, there are security precautions to be taken which include data encryption [8]. While data encryption seems be the most secure method for handling patients data, however not all EHR systems are compatible with standard encryption methods.…”
Section: Security and Privacy Of Healthcare Data With Cloud Computingmentioning
confidence: 99%
“…Cloud network security is a must for a secure transfer of data. Digital signature is another method that helps in the process of data security, in addition to having a backup server for the data saved in a cloud as a security measure in case the server is hacked or damaged [8].…”
Section: Security and Privacy Of Healthcare Data With Cloud Computingmentioning
confidence: 99%
“…In particular, we explore the adoption of location information provided by LCS as a second factor of web server authentication. This is motivated by the fact that security-critical online services (e.g., financial services [43,68], e-health services [59]) are often hosted at dedicated and physically-protected locations. The on-site protection makes it difficult or expensive for an adversary to infiltrate such data centers.…”
Section: Introductionmentioning
confidence: 99%
“…Namun, kondisi yang ada saat ini menunjukkan bahwa penyedia layanan kesehatan menyimpan EHR sendiri-sendiri. Hal ini berdampak pada sulitnya mekanisme integrasi dan pertukaran EHR antar penyedia layanan kesehatan [2].Cloud Computing telah menjadi paradigma yang menjanjikan serta mendapat perhatian yang lebih dari akademisi dan industri. Paradigma ini menggeser lokasi dari infrastruktur komputer ke pihak ketiga.…”
unclassified
“…Namun, kondisi yang ada saat ini menunjukkan bahwa penyedia layanan kesehatan menyimpan EHR sendiri-sendiri. Hal ini berdampak pada sulitnya mekanisme integrasi dan pertukaran EHR antar penyedia layanan kesehatan [2].…”
unclassified