“…Privacy preservation record linkage, trust based mechanism, Multifactor authentication, dynamic programming, role based multitenancy access control, ant colony optimization [16], [17], [18], [19], [20], [21], [22], [23] [24], [25], [27], [31], [33], [35], [36], [38], [39], [44], [46], [58], [59], [60]. [21], [22], [26], [27], [36], [37], [38], [40], [42], [43], [44], [45] Vendor Lock-In Lack of Interoperability, technical incompatibilities, cost, complexity, lack of portability, Legal Constraints Standardization of API , Fragmentation., horizontal and vertical integration.…”