Asian Journal of Information Technology

Year: 2017
Volume: 16
Issue: 2
Page No. 274 - 281

Privacy and Security Challenges Towards Cloud Based Access Control in Electronic Health Records

Authors : Muhammad Ehsan Rana, Micheal Kubbo and Manoj Jayabalan

References

Appari, A. and M.E. Johnson, 2010. Information security and privacy in healthcare: Current state of research. Int. J. Internet Enterp. Manage., 6: 279-314.
Direct Link  |  

Balani, N. and S. Ruj, 2014. Temporal access control with user revocation for cloud data. Proceedings of the 2014 IEEE 13th International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), September 24-26, 2014, IEEE, Atlanta, Georgia, ISBN:978-1-4799-6514-4, pp: 336-343.

Bennani, A., M. Belalia and R. Oumlil, 2008. As a human factor, the attitude of healthcare practitioners is the primary step for the E-health: First outcome of an ongoing study in Morocco. Commun. IBIMA., 3: 28-34.
Direct Link  |  

Chen, Y.Y., J.C. Lu and J.K. Jan, 2012. A secure EHR system based on hybrid clouds. J. Med. Syst., 36: 3375-3384.
CrossRef  |  PubMed  |  Direct Link  |  

Dlamini, M.T., J.H. Eloff and M.M. Eloff, 2009. Information security: The moving target. Comput. Sec., 28: 189-198.
CrossRef  |  Direct Link  |  

Fernandez-Aleman, J.L., I.C. Senor, P.A.O. Lozoya and A. Toval, 2013. Security and privacy in electronic health records: A systematic literature review. J. Biomed. Inf., 46: 541-562.

Ferreira, A., C.R. Cruz and L. Antunes, 2011. Usability of authentication and access control: A case study in healthcare. Proceedings of the 2011 IEEE International Conference on Carnahan Security Technology (ICCST), October 18-21, 2011, IEEE, Porto, Portugal, ISBN:978-1-4577-0902-9, pp: 1-7.

Figueroa, K.G. and F.S. Pancho, 2014. An access control framework for semi-trusted storage using attribute-based encryption with short ciphertext and mediated revocation. Proceedings of the 2nd International Symposium on Computing and Networking (CANDAR) 2014, December 10-12, 2014, IEEE, Quezon City, Philippines, ISBN:978-1-4799-4151-3, pp: 507-513.

Fugkeaw, S. and H. Sato, 2015. An extended CP-ABE based access control model for data outsourced in the cloud. Proceedings of the IEEE 39th Annual Conference on Computer Software and Applications (COMPSAC) 2015, July 1-5 2015, IEEE, Tokyo, Japan, ISBN:978-1-4673-6564-2, pp: 73-78.

Hoerbst, A. and E. Ammenwerth, 2010. Electronic health records: A systematic review on quality requirements. Methods Inf. Med., 4: 1-16.

Hu, V.C., D.R. Kuhn and D.F. Ferraiolo, 2015. Attribute-based access control. Comput., 48: 85-88.
CrossRef  |  Direct Link  |  

Jacob, J. and V. Agrawal, 2010. Privacy in Electronic Health Record Systems Consumers Perspective. Stockholm University, Stockholm, Sweden,.

Kamoun, A. and S. Tazi, 2014. A semantic role-based access control for intra and inter-organization collaboration. Proceedings of the IEEE 23rd International Conference on WETICE 2014, June 23-25, 2014, IEEE, Toulouse, France, ISBN:978-1-4799-4248-0, pp: 86-91.

Kerr, L. and F.J. Alves, 2016. Combining mandatory and attribute-based access control. Proceedings of the 49th Hawaii International Conference on System Sciences (HICSS) 2016, January 5-8, 2016, IEEE, Moscow, Idaho, ISBN:978-0-7695-5670-3, pp: 2616-2623.

Lamar, M., 2011. EHRS in the cloud. J. Ahima, 82: 48-49.

Lu, C., Z. Qing, F.H. Gao and L.Z. Qiang, 2014. A trust-role based context aware access control model. Proceedings of the 10th International Conference on Computational Intelligence and Security (CIS) 2014, November 15-16, 2014, IEEE, Wuhan, China, ISBN:978-1-4799-7435-1, pp: 371-376.

Lv, Z., J. Chi, M. Zhang and D. Feng, 2014. Efficiently attribute-based access control for mobile cloud storage system. Proceedings of the IEEE 13th International Conference on Trust Security and Privacy in Computing and Communications (TrustCom) 2014, September 24-26, 2014, IEEE, Beijing, China, ISBN:978-1-4799-6514-4, pp: 292-299.

Maslin, M. and R. Ailar, 2015. Cloud computing adoption in healthcare sector: A SWOT analysis. Can. Center Sci. Educ., 11: 12-18.

Ozair, F.F., N. Jamshed, A. Sharma and P. Aggarwal, 2015. Ethical issues in electronic health records: A general overview. Perspect. Clin. Res., 6: 73-76.
CrossRef  |  Direct Link  |  

Papoutsi, C., J.E. Reed, C. Marston, R. Lewis and A. Majeed et al., 2015. Patient and public views about the security and privacy of Electronic Health Records (EHRs) in the UK: Results from a mixed methods study. BMC. Med. Inf. Decis. Making, 15: 1-15.
CrossRef  |  PubMed  |  Direct Link  |  

Riad, K., Z. Yan, H. Hu and G.J. Ahn, 2015. AR-ABAC: A new attribute based access control model supporting attribute-rules for cloud computing. Proceedings of the IEEE Conference on Collaboration and Internet Computing (CIC) 2015, October 27-30, 2015, IEEE, Beijing, China, ISBN:978-1-5090-0090-6, pp: 28-35.

Samarati, P. and S. de Capitani di Vimercati, 2001. Access Control: Policies, Models and Mechanisms. Springer-Verlag, Berlin, Heidelberg, pp: 1-56.

Sandhu, R.S., E.J. Coyne, H.L. Feinstein and C.E. Youman, 1996. Role-based access control models. IEEE Comput., 29: 38-47.
Direct Link  |  

Sharma, N.K. and A. Joshi, 2016. Representing attribute based access control policies in Owl. Proceedings of the IEEE 10th International Conference on Semantic Computing (ICSC) 2016, February 4-6, 2016, IEEE, Delhi, India, ISBN:978-1-5090-0662-5, pp: 333-336.

Sicuranza, M. and M. Ciampi, 2014. A semantic access control for easy management of the privacy for EHR systems. Proceedings of the 9th International Conference on P2P Parallel Grid Cloud and Internet Computing (3PGCIC) 2014, November 8-10, 2014, IEEE, Naples, Italy, ISBN:978-1-4799-7872-4, pp: 400-405.

Sicuranza, M., A. Esposito and M. Ciampi, 2014. A patient privacy centric access control model for EHR systems. Int. J. Internet Technol. Secured Trans., 5: 163-189.
CrossRef  |  Direct Link  |  

Sicuranza, M., A. Esposito and M. Ciampi, 2015. An access control model to minimize the data exchange in the information retrieval. J. Ambient Intell. Hum. Comput., 6: 741-752.
CrossRef  |  Direct Link  |  

Stausberg, J., D. Koch, J. Ingenerf and M. Betzler, 2003. Comparing paper-based with electronic patient records: Lessons learned during a study on diagnosis and procedure codes. J. Am. Med. Inf. Assoc., 10: 470-477.
PubMed  |  Direct Link  |  

Younis, Y.A., K. Kifayat and M. Merabti, 2014. An access control model for cloud computing. J. Inf. Secur. Appl., 19: 45-60.
Direct Link  |  

Yue, Q.F. and S.Z. Yong, 2015. Trusted access control model based on role and task in cloud computing. Proceedings of the 7th International Conference on Information Technology in Medicine and Education (ITME) 2015, November 13-15, 2015, IEEE, Jinan, China, ISBN:978-1-4673-8302-8, pp: 710-713.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved