2020
DOI: 10.11591/ijece.v10i1.pp455-466
|View full text |Cite
|
Sign up to set email alerts
|

Security framework for cloud based electronic health record (EHR) system

Abstract: Health records are an integral aspect of any Hospital Management System. With newer innovations in technology, there has been a shift in the way of recording health information. Medical records which used to be managed using various paper charts have now become easier to organize and maintain, thereby increasing the efficiency of medical staff. The Electronic Health Records (EHR) System is becoming a high-tech medical management technology developed for the economic or emerging economic countries like India. I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…Ganiga et al [24] elaborated a healthcare security framework for cloud-based systems, which addresses confidentiality and access control by employing attribute-based encryption. However, it is assumed that the cloud will behave honestly by following the permissions that a patient assigns for collaborators.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Ganiga et al [24] elaborated a healthcare security framework for cloud-based systems, which addresses confidentiality and access control by employing attribute-based encryption. However, it is assumed that the cloud will behave honestly by following the permissions that a patient assigns for collaborators.…”
Section: Related Workmentioning
confidence: 99%
“…Confidentiality and access control. Although some proposals adopt CP-ABE to fulfill confidentiality and access control (e.g., [24], [22], [26]), they use centralized servers to store health records and evaluate access permissions. We instead provide a two-layer security, wherein the first layer has a decentralized network, with no single points of failure, which stores records metadata encrypted with public keys, and the second consists of records encrypted with CP-ABE.…”
Section: A Analyzing and Comparing Sec-health With Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The reader is directed to Refs. [54][55][56], in which the current technologies and methods used for security measures on EMRs are reviewed.…”
Section: Emr Use In Clinical Trialsmentioning
confidence: 99%
“…Also, health records are crucial in any hospital system, but they are coming under increased attacks. These records contain private and sensitive patient information, and a breach in their confidentiality, integrity or privacy can lead to dire consequences on both the patients, caregivers, and the medical facilities, such as defamation, discrimination, lawsuits, and other stressful conditions [12]. If data is not stored securely in the cloud, it can be compromised, leading to severe consequences.…”
Section: Introductionmentioning
confidence: 99%