Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
survey

Privacy Preservation of Electronic Health Records in the Modern Era: A Systematic Survey

Published: 26 April 2024 Publication History
  • Get Citation Alerts
  • Abstract

    Building a secure and privacy-preserving health data sharing framework is a topic of great interest in the healthcare sector, but its success is subject to ensuring the privacy of user data. We clarified the definitions of privacy, confidentiality and security (PCS) because these three terms have been used interchangeably in the literature. We found that researchers and developers must address the differences of these three terms when developing electronic health record (EHR) solutions. We surveyed 130 studies on EHRs, privacy-preserving techniques, and tools that were published between 2012 and 2022, aiming to preserve the privacy of EHRs. The observations and findings were summarized with the help of the identified studies framed along the survey questions addressed in the literature review. Our findings suggested that the usage of access control, blockchain, cloud-based, and cryptography techniques is common for EHR data sharing. We summarized the commonly used strategies for preserving privacy that are implemented by various EHR tools. Additionally, we collated a comprehensive list of differences and similarities between PCS. Finally, we summarized the findings in a tabular form for all EHR tools and techniques and proposed a fusion of techniques to better preserve the PCS of EHRs.

    References

    [1]
    Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Alidou Mohamadou, and Abdelhak Mourad Gueroui. 2024. Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges. Applied Computing and Informatics 20, 1/2 (2024), 119–141.
    [2]
    Aaron Adler, Michael J. Mayhew, Jeffrey Cleveland, Michael Atighetchi, and Rachel Greenstadt. 2013. Using machine learning for behavior-based access control: Scalable anomaly detection on TCP connections and HTTP requests. In MILCOM 2013-2013 IEEE Military Communications Conference. IEEE, 1880–1887.
    [3]
    Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. 2002. Hippocratic databases. In VLDB’02: Proceedings of the 28th International Conference on Very Large Databases. Elsevier, 143–154.
    [4]
    Raag Agrawal and Sudhakaran Prabakaran. 2020. Big data in digital healthcare: Lessons learnt and recommendations for general practice. Heredity 124, 4 (2020), 525–534.
    [5]
    M. Ahmed, E. Elaziz, and N. Mohamed. 2020. Nurse’s knowledge, skills, and attitude toward electronic health records. Journal of Nursing and Health Science 9 (2020), 53–60.
    [6]
    Tareq Ahram, Arman Sargolzaei, Saman Sargolzaei, Jeff Daniels, and Ben Amaba. 2017. Blockchain technology innovations. In 2017 IEEE Technology & Engineering Management Conference (TEMSCON). IEEE, 137–141.
    [7]
    Jagmeet Singh Aidan, Harsh Kumar Verma, and Lalit Kumar Awasthi. 2017. Comprehensive survey on Petya ransomware attack. In 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS). IEEE, 122–125.
    [8]
    Sunday Adeola Ajagbe, A. O. Adesina, and J. B. Oladosu. 2019. Empirical evaluation of efficient asymmetric encryption algorithms for the protection of electronic medical records (EMR) on web application. International Journal of Scientific and Engineering Research 10, 5 (2019), 848–871.
    [9]
    D. Akarca, P. Y. Xiu, D. Ebbitt, B. Mustafa, H. Al-Ramadhani, and A. Albeyatti. 2019. Blockchain secured electronic health records: Patient rights, privacy and cybersecurity. In 2019 10th International Conference on Dependable Systems, Services and Technologies (DESSERT). IEEE, 108–111.
    [10]
    Mubeen Akhtar. 2024. Innovations in anesthesia delivery: Tailoring care to individual patient needs. Cosmic Journal of Biology 3, 1 (2024), 184–190.
    [11]
    Bassim Al Bahrani, Itrat Medhi, and Itrat Mehdi. 2023. Copy-pasting in patients’ electronic medical records (EMRs): Use judiciously and with caution. Cureus 15, 6 (2023).
    [12]
    Abdullah Al Omar, Md Zakirul Alam Bhuiyan, Anirban Basu, Shinsaku Kiyomoto, and Mohammad Shahriar Rahman. 2019. Privacy-friendly platform for healthcare data in cloud based on blockchain environment. Future Generation Computer Systems 95 (2019), 511–521.
    [13]
    Abdullah Al Omar, Mohammad Shahriar Rahman, Anirban Basu, and Shinsaku Kiyomoto. 2017. MediBchain: A blockchain based privacy preserving platform for healthcare data. In Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings 10. Springer, 534–543.
    [14]
    Hameed Hussain Almubarak, Mohamed Khairallah Khouja, and Ahmed Jedidi. 2022. Security and privacy recommendation of mobile app for Arabic speaking. International Journal of Electrical & Computer Engineering (2088-8708) 12, 5 (2022).
    [15]
    Mahyar Amini and Negar Jahanbakhsh Javid. 2023. A multi-perspective framework established on diffusion of innovation (DOI) theory and technology, organization and environment (TOE) framework toward supply chain management system based on cloud computing technology for small and medium enterprises. Organization and Environment (TOE) Framework Toward Supply Chain Management System Based on Cloud Computing Technology for Small and Medium Enterprises (January 2023). International Journal of Information Technology and Innovation Adoption 11 (2023), 1217–1234.
    [16]
    Muhammad Anshari. 2019. Redefining electronic health records (EHR) and electronic medical records (EMR) to promote patient empowerment. IJID (International Journal on Informatics for Development) 8, 1 (2019), 35–39.
    [17]
    Guy Aridor, Yeon-Koo Che, and Tobias Salz. 2021. The effect of privacy regulation on the data industry: Empirical evidence from GDPR. In Proceedings of the 22nd ACM Conference on Economics and Computation. 93–94.
    [18]
    Asaph Azaria, Ariel Ekblaw, Thiago Vieira, and Andrew Lippman. 2016. MedRec: Using blockchain for medical data access and permission management. In 2016 2nd International Conference on Open and Big Data (OBD). IEEE, 25–30.
    [19]
    W. Bani Issa, I. Al Akour, A. Ibrahim, A. Almarzouqi, S. Abbas, F. Hisham, and J. Griffiths. 2020. Privacy, confidentiality, security and patient safety concerns about electronic health records. International Nursing Review 67, 2 (2020), 218–230.
    [20]
    Jacqueline Lorene Bender, Alaina B. Cyr, Luk Arbuckle, and Lorraine E. Ferris. 2017. Ethics and privacy implications of using the internet and social media to recruit participants for health research: A privacy-by-design framework for online recruitment. Journal of Medical Internet Research 19, 4 (2017), e7029.
    [21]
    Andrew R. Besmer, Jason Watson, and M. Shane Banks. 2020. Investigating user perceptions of mobile app privacy: An analysis of user-submitted app reviews. International Journal of Information Security and Privacy (IJISP) 14, 4 (2020), 74–91.
    [22]
    John Bethencourt, Amit Sahai, and Brent Waters. 2007. Ciphertext-policy attribute-based encryption. In 2007 IEEE Symposium on Security and Privacy (SP’07). IEEE, 321–334.
    [23]
    Lee A. Bygrave. 1990. The Privacy Act 1988 (Cth): A study in the protection of privacy and the protection of political power. Federal Law Review 19, 2 (1990), 128–153.
    [24]
    Aisling R. Caffrey and Austin R. Horn. 2021. Considerations for protecting research participants. In Pragmatic Randomized Clinical Trials. Elsevier, 273–292.
    [25]
    Roberto Cerchione, Piera Centobelli, Emanuela Riccio, Stefano Abbate, and Eugenio Oropallo. 2023. Blockchain’s coming to hospital to digitalize healthcare services: Designing a distributed electronic health record ecosystem. Technovation 120 (2023), 102480.
    [26]
    Mike Chapple and David Seidl. 2021. Cyberwarfare: Information Operations in a Connected World. Jones & Bartlett Learning.
    [27]
    Hsuan-Yu Chen, Zhen-Yu Wu, Tzer-Long Chen, Yao-Min Huang, and Chia-Hui Liu. 2021. Security privacy and policy for cryptographic based electronic medical information system. Sensors 21, 3 (2021), 713.
    [28]
    Lanxiang Chen, Wai-Kong Lee, Chin-Chen Chang, Kim-Kwang Raymond Choo, and Nan Zhang. 2019. Blockchain based searchable encryption for electronic health record sharing. Future Generation Computer Systems 95 (2019), 420–429.
    [29]
    Shekha Chenthara, Khandakar Ahmed, Hua Wang, Frank Whittaker, and Zhenxiang Chen. 2020. Healthchain: A novel framework on privacy preservation of electronic health records using blockchain technology. Plos One 15, 12 (2020), e0243043.
    [30]
    J. Randall Curtis, Seelwan Sathitratanacheewin, Helene Starks, Robert Y. Lee, Erin K. Kross, Lois Downey, James Sibley, William Lober, Elizabeth T. Loggers, James A. Fausto, et al. 2018. Using electronic health records for quality measurement and accountability in care of the seriously ill: Opportunities and challenges. Journal of Palliative Medicine 21, S2 (2018), S–52.
    [31]
    Marek A. Cyran. 2018. Blockchain as a foundation for sharing healthcare data. Blockchain in Healthcare Today (2018).
    [32]
    John D. Rummel, Margaret S. Race, and G. Horneck, the Princeton Workshop Participants. 2012. Ethical Considerations for Planetary Protection in Space Exploration: A Workshop. (2012).
    [33]
    Gaby G. Dagher, Jordan Mohler, Matea Milojkovic, and Praneeth Babu Marella. 2018. Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustainable Cities and Society 39 (2018), 283–297.
    [34]
    Erikson Júlio De Aguiar, Bruno S. Faiçal, Bhaskar Krishnamachari, and Jó Ueyama. 2020. A survey of blockchain-based strategies for healthcare. ACM Computing Surveys (CSUR) 53, 2 (2020), 1–27.
    [35]
    Jacqueline A. De Leeuw, Hetty Woltjer, and Rudolf B. Kool. 2020. Identification of factors influencing the adoption of health information technology by nurses who are digitally lagging: In-depth interview study. Journal of Medical Internet Research 22, 8 (2020), e15630.
    [36]
    B. D. Deebak and Fadi Al-Turjman. 2023. Secure-user sign-in authentication for IoT-based eHealth systems. Complex & Intelligent Systems 9, 3 (2023), 2629–2649.
    [37]
    Nilüfer Demirsoy and Nurdan Kirimlioglu. 2016. Protection of privacy and confidentiality as a patient right: Physicians’ and nurses’ viewpoints. Biomedical Research 27, 4 (2016), 1437–1448.
    [38]
    Michelle Finneran Dennedy, Jonathan Fox, and Thomas R. Finneran. 2014. Data and privacy governance concepts. In The Privacy Engineer’s Manifesto. Springer, 51–72.
    [39]
    Alevtina Dubovitskaya, Zhigang Xu, Samuel Ryu, Michael Schumacher, and Fusheng Wang. 2017. Secure and trustable electronic medical records sharing using blockchain. In AMIA Annual Symposium Proceedings, Vol. 2017. American Medical Informatics Association, 650.
    [40]
    Sasidhar Duggineni. 2023. Impact of controls on data integrity and information systems. Science and Technology 13, 2 (2023), 29–35.
    [41]
    e estonia. 2019. (2019). https://e-estonia.com/solutions/healthcare/(Accessed 4 July 2019).
    [42]
    Ariel Ekblaw, Asaph Azaria, John D. Halamka, and Andrew Lippman. 2016. A case study for blockchain in healthcare: “MedRec” prototype for electronic health records and medical research data. In Proceedings of IEEE Open & Big Data Conference, Vol. 13. 13.
    [43]
    Perihan Elif Ekmekci and Berna Arda. 2017. Interculturalism and informed consent: Respecting cultural differences without breaching human rights. Cultura 14, 2 (2017), 159–172.
    [44]
    Guy Fagherazzi, Catherine Goetzinger, Mohammed Ally Rashid, Gloria A. Aguayo, and Laetitia Huiart. 2020. Digital health strategies to fight COVID-19 worldwide: Challenges, recommendations, and a call for papers. Journal of Medical Internet Research 22, 6 (2020), e19284.
    [45]
    Mahdi Fahmideh, John Grundy, Aakash Ahmad, Jun Shen, Jun Yan, Davoud Mougouei, Peng Wang, Aditya Ghose, Anuradha Gunawardana, Uwe Aickelin, and others. 2022. Engineering blockchain based software systems: Foundations, survey, and future directions. Comput. Surveys (2022).
    [46]
    Maryam Farhadi, Hisham Haddad, and Hossain Shahriar. 2018. Static analysis of HIPPA security requirements in electronic health record applications. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Vol. 2. IEEE, 474–479.
    [47]
    Orna Fennelly, Dearbhla Moroney, Michelle Doyle, Jessica Eustace-Cook, and Mary Hughes. 2024. Key interoperability factors for patient portals and electronic health records: A scoping review. International Journal of Medical Informatics (2024), 105335.
    [48]
    José Luis Fernández-Alemán, Inmaculada Carrión Señor, Pedro Ángel Oliver Lozoya, and Ambrosio Toval. 2013. Security and privacy in electronic health records: A systematic literature review. Journal of Biomedical Informatics 46, 3 (2013), 541–562.
    [49]
    Enrico M. Ferrazzi, Luigi Frigerio, Irene Cetin, Patrizia Vergani, Arsenio Spinillo, Federico Prefumo, Edda Pellegrini, and Gianluigi Gargantini. 2020. COVID-19 obstetrics task force, Lombardy, Italy: Executive management summary and short report of outcome. International Journal of Gynecology & Obstetrics 149, 3 (2020), 377–378.
    [50]
    Craig Fink. 2012. Privacy and confidentiality in the virtual classroom: Instructor perceptions, knowledge, and strategies. MPA thesis, University of Victoria, June 26, 2012. Prepared for Distance Education Services, University of Victoria.
    [51]
    Yong-Feng Ge, Elisa Bertino, Hua Wang, Jinli Cao, and Yanchun Zhang. 2023. Distributed cooperative coevolution of data publishing privacy and transparency. ACM Transactions on Knowledge Discovery from Data 18, 1 (2023), 1–23.
    [52]
    Eugenijus Gefenas, J. Lekstutiene, V. Lukaseviciene, M. Hartlev, M. Mourby, and K. Ó Cathaoir. 2022. Controversies between regulations of research ethics and protection of personal data: Informed consent at a cross-road. Medicine, Health Care and Philosophy 25, 1 (2022), 23–30.
    [53]
    Tasha Glenn and Scott Monteith. 2014. Privacy in the digital world: Medical and health data outside of HIPAA protections. Current Psychiatry Reports 16, 11 (2014), 1–11.
    [54]
    Thore Graepel, Kristin Lauter, and Michael Naehrig. 2012. ML confidential: Machine learning on encrypted data. In International Conference on Information Security and Cryptology. Springer, 1–21.
    [56]
    Jian Guo and Ron Steinfeld. 2024. Advances in Cryptology–ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part I. Vol. 14438. Springer Nature.
    [57]
    Amanda M. Gutierrez, Jacob D. Hofstetter, Emma L. Dishner, Elizabeth Chiao, Dilreet Rai, and Amy L. McGuire. 2020. A right to privacy and confidentiality: Ethical medical care for patients in United States immigration detention. Journal of Law, Medicine & Ethics 48, 1 (2020), 161–168.
    [58]
    John D. Halamka, Andrew Lippman, and Ariel Ekblaw. 2017. The potential for blockchain to transform electronic health records. Harvard Business Review 3, 3 (2017), 2–5.
    [59]
    Jalal Halwani and Doris Mouawad. 2021. Implementation of e-health innovative technologies in North Lebanon hospitals. Eastern Mediterranean Health Journal 27, 9 (2021), 892–898.
    [60]
    Nancy D. Harada, Laural Traylor, Kathryn Wirtz Rugen, Judith L. Bowen, C. Scott Smith, Bradford Felker, Deborah Ludke, Ivy Tonnu-Mihara, Joshua L. Ruberg, Jayson Adler, and others. 2023. Interprofessional transformation of clinical education: The first six years of the Veterans Affairs Centers of Excellence in primary care education. Journal of Interprofessional Care 37, Sup1 (2023), S86–S94.
    [61]
    Omar Hasan, Lionel Brunie, and Elisa Bertino. 2022. Privacy-preserving reputation systems based on blockchain and other cryptographic building blocks: A survey. ACM Computing Surveys (CSUR) 55, 2 (2022), 1–37.
    [62]
    Bahar Houtan, Abdelhakim Senhaji Hafid, and Dimitrios Makrakis. 2020. A survey on blockchain-based self-sovereign patient identity in healthcare. IEEE Access 8 (2020), 90478–90494.
    [63]
    Jingwei Huang, David M. Nicol, Rakesh Bobba, and Jun Ho Huh. 2012. A framework integrating attribute-based policies into role-based access control. In Proceedings of the 17th ACM symposium on Access Control Models and Technologies. 187–196.
    [64]
    Rachel Hulkower, Matthew Penn, and Cason Schmit. 2020. Privacy and confidentiality of public health information. Public Health Informatics and Information Systems (2020), 147–166.
    [65]
    Mohammad Shahid Husain, Muhamad Hariz Bin Muhamad Adnan, Mohammad Zunnun Khan, Saurabh Shukla, and Fahad U. Khan. 2021. Pervasive Healthcare: A Compendium of Critical Factors for Success. Springer.
    [66]
    Hyowon Im, Ki-Hyung Kim, and Jai-Hoon Kim. 2020. Privacy and ledger size analysis for healthcare blockchain. In 2020 International Conference on Information Networking (ICOIN). IEEE, 825–829.
    [67]
    Maithilee Joshi, Karuna Joshi, and Tim Finin. 2018. Attribute based encryption for secure access to cloud based EHR systems. In 2018 IEEE 11th International Conference on Cloud Computing (CLOUD). IEEE, 932–935.
    [68]
    Tehsin Kanwal, Adeel Anjum, and Abid Khan. 2021. Privacy preservation in e-health cloud: Taxonomy, privacy requirements, feasibility analysis, and opportunities. Cluster Computing 24, 1 (2021), 293–317.
    [69]
    Suchitra Kataria and Vinod Ravindran. 2020. Electronic health records: A critical appraisal of strengths and limitations. Journal of the Royal College of Physicians of Edinburgh 50, 3 (2020), 262–268.
    [70]
    Gurleen Kaur and David D. Berg. 2024. The changing epidemiology of the cardiac intensive care unit. Critical Care Clinics 40, 1 (2024), 1–13.
    [71]
    Grant Kelly, Bruce McKenzie, and others. 2002. Security, privacy, and confidentiality issues on the Internet. Journal of Medical Internet Research 4, 2 (2002), e861.
    [72]
    Ismail Keshta and Ammar Odeh. 2021. Security and privacy of electronic health records: Concerns and challenges. Egyptian Informatics Journal 22, 2 (2021), 177–183.
    [73]
    Ji Yeon Kim. 2018. A comparative study of block chain: Bitcoin· Namecoin· MediBloc. Journal of Science and Technology Studies 18, 3 (2018), 217–255.
    [74]
    Barbara Kitchenham. 2004. Procedures for performing systematic reviews. Keele, UK, Keele University 33, 2004 (2004), 1–26.
    [75]
    Johannes Knitza, Rachel Knevel, Karim Raza, Tor Bruce, Ekaterina Eimer, Isabel Gehring, Linda Mathsson-Alm, Maryam Poorafshar, Axel J. Hueber, Georg Schett, and others. 2020. Toward earlier diagnosis using combined eHealth tools in rheumatology: The joint pain assessment scoring tool (JPAST) project. JMIR mHealth and uHealth 8, 5 (2020), e17507.
    [76]
    Sreelakshmi Krishnamoorthy, Amit Dua, and Shashank Gupta. 2023. Role of emerging technologies in future IoT-driven Healthcare 4.0 technologies: A survey, current challenges and future directions. Journal of Ambient Intelligence and Humanized Computing 14, 1 (2023), 361–407.
    [77]
    Clemens Scott Kruse, Benjamin Frederick, Taylor Jacobson, and D. Kyle Monticone. 2017. Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care 25, 1 (2017), 1–10.
    [78]
    Clemens Scott Kruse, Brenna Smith, Hannah Vanderlinden, and Alexandra Nealand. 2017. Security techniques for the electronic health records. Journal of Medical Systems 41, 8 (2017), 1–9.
    [79]
    Nir Kshetri. 2017. Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications Policy 41, 10 (2017), 1027–1038.
    [80]
    Adrienne C. Lahti, Dai Wang, Huiling Pei, Susan Baker, and Vaibhav A. Narayan. 2021. Clinical utility of wearable sensors and patient-reported surveys in patients with schizophrenia: Noninterventional, observational study. JMIR Mental Health 8, 8 (2021), e26234.
    [81]
    Jinhyung Lee, Hyeyeong Kim, and Sung J. Choi. 2024. Do hospital data breaches affect health information technology investment? Digital Health 10 (2024), 20552076231224164.
    [82]
    Gabriela Kato Lettieri, Aline Hung Tai, Aline Rodrigues Hütter, André Luiz Torres Raszl, Mariana Moura, and Raquel Barbosa Cintra. 2022. Medical confidentiality in the digital era: An analysis of physician-patient relations. Revista Bioetica 29 (2022), 814–824.
    [83]
    Tian Li, Huaqun Wang, Debiao He, and Jia Yu. 2022. Blockchain-based privacy-preserving and rewarding private data sharing for IoT. IEEE Internet of Things Journal (2022).
    [84]
    Qinyong Lin, Xiaorong Li, Ken Cai, Mohan Prakash, and D. Paulraj. 2024. Secure internet of medical things (IoMT) based on ECMQV-MAC authentication protocol and EKMC-SCP blockchain networking. Information Sciences 654 (2024), 119783.
    [85]
    Yongsen Ma, Gang Zhou, and Shuangquan Wang. 2019. WiFi sensing with channel state information: A survey. ACM Computing Surveys (CSUR) 52, 3 (2019), 1–36.
    [86]
    Imran Makhdoom, Mehran Abolhasan, Haider Abbas, and Wei Ni. 2019. Blockchain’s adoption in IoT: The challenges, and a way forward. Journal of Network and Computer Applications 125 (2019), 251–279.
    [87]
    Daisuke Mashima. 2012. Safeguarding Health Data with Enhanced Accountability and Patient Awareness. Georgia Institute of Technology.
    [88]
    Isma Masood, Ali Daud, Yongli Wang, Ameen Banjar, and Riad Alharbey. 2024. A blockchain-based system for patient data privacy and security. Multimedia Tools and Applications (2024), 1–25.
    [89]
    Isma Masood, Yongli Wang, Ali Daud, Naif Radi Aljohani, and Hassan Dawood. 2018. Towards smart healthcare: Patient data privacy and security in sensor-cloud infrastructure. Wireless Communications and Mobile Computing 2018 (2018).
    [90]
    André Henrique Mayer, Cristiano André da Costa, and Rodrigo da Rosa Righi. 2020. Electronic health records in a Blockchain: A systematic review. Health Informatics Journal 26, 2 (2020), 1273–1288.
    [91]
    Timothy McIntosh, A. S. M. Kayes, Yi-Ping Phoebe Chen, Alex Ng, and Paul Watters. 2021. Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions. ACM Computing Surveys (CSUR) 54, 9 (2021), 1–36.
    [92]
    Lin-Chieh Meng, Shih-Tsung Huang, Ho-Min Chen, Ardeshir Z. Hashmi, Fei-Yuan Hsiao, and Liang-Kung Chen. 2023. Health care utilization and potentially preventable adverse outcomes of high-need, high-cost middle-aged and older adults: Needs for integrated care models with life-course approach. Archives of Gerontology and Geriatrics 109 (2023), 104956.
    [93]
    R. C. Mesquita and I. de Edwards. 2020. Systematic literature review of my health record system. Asia-Pac. J. Health Manag. 15 (2020), 14–25.
    [94]
    Data team M. H. M. 2019. (2019). http://www.myhealthmydata.eu/(Accessed 1 July 2019).
    [96]
    MHMD. 2018. Shaping our Future, Newsletter 01. (2018). www.myhealthmydata.eu/wp-content/uploads/2017/10/MHMD_newsletter_01_DEF_WEB_pag_doppie_110718.pdf(Accessed 1 July 2019).
    [97]
    Kaelan A.M. Moat, Mikayla Wicks, and Michael G. Wilson. 2016. Citizen Brief: Integrating data across sectors for public service improvement in ontario. Hamilton, Canada: McMaster Health Forum, 5 March 2016.
    [98]
    Mohammad Mohammadi, Bagher Larijani, Seyed Hassan Emami Razavi, Akbar Fotouhi, Ahmad Ghaderi, Seyed Javad Madani, and Mohammad Naser Shafiee. 2018. Do patients know that physicians should be confidential? Study on patients’ awareness of privacy and confidentiality. Journal of Medical Ethics and History of Medicine 11 (2018).
    [99]
    Anastassia Negrouk, Denis Horgan, Alessandra Gorini, Ilaria Cutica, Lada Leyens, Sebastian Schee genannt Halfmann, and Gabriella Pravettoni. 2015. Clinical trials, data protection and patient empowerment in the era of the new EU regulations. Public Health Genomics 18, 6 (2015), 386–395.
    [100]
    Raza Nowrozy and Khandakar Ahmed. 2023. Enhancing health information systems security: An ontology model approach. In International Conference on Health Information Science. Springer, 91–100.
    [101]
    Raza Nowrozy, Khandakar Ahmed, Hua Wang, and Timothy Mcintosh. 2023. Towards a universal privacy model for electronic health record systems: An ontology and machine learning approach. In Informatics, Vol. 10. MDPI, 60.
    [102]
    Phillip Olla, Joseph Tan, Lauren Elliott, and Mustafa Abumeeiz. 2022. Security and privacy issues. Digital Health Care: Perspectives, Applications, and Cases (2022), 105.
    [103]
    Md. Mehedi Hassan Onik, Satyabrata Aich, Jinhong Yang, Chul-Soo Kim, and Hee-Cheol Kim. 2019. Blockchain in healthcare: Challenges and solutions. In Big Data Analytics for Intelligent Healthcare Management. Elsevier, 197–226.
    [104]
    J. Marc Overhage and David McCallie Jr. 2020. Physician time spent using the electronic health record during outpatient encounters: A descriptive study. Annals of Internal Medicine 172, 3 (2020), 169–174.
    [105]
    Sandeep Kumar Panda, Ajay Kumar Jena, Santosh Kumar Swain, and Suresh Chandra Satapathy. 2021. Blockchain Technology: Applications and Challenges. Springer.
    [106]
    Dharmaraj R. Patil and Tareek M. Pattewar. 2022. Majority voting and feature selection based network intrusion detection system. EAI Endorsed Transactions on Scalable Information Systems 9, 6 (2022), e6–e6.
    [107]
    David Peloquin, Michael DiMaio, Barbara Bierer, and Mark Barnes. 2020. Disruptive and avoidable: GDPR challenges to secondary research uses of data. European Journal of Human Genetics 28, 6 (2020), 697–705.
    [108]
    Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Brent Waters. 2006. Secure attribute-based systems. In Proceedings of the 13th ACM Conference on Computer and Communications Security. 99–112.
    [109]
    Argyro Pountoukidou, Maria Potamiti-Komi, Vrisiis Sarri, Michail Papapanou, Eleni Routsi, Anna Maria Tsiatsiani, Nikolaos Vlahos, and Charalampos Siristatidis. 2021. Management and prevention of COVID-19 in pregnancy and pandemic obstetric care: A review of current practices. In Healthcare, Vol. 9. MDPI, 467.
    [110]
    Sarah Qahtan, Khaironi Yatim, Hazura Zulzalil, Mohd Hafeez Osman, A. A. Zaidan, and H. A. Alsattar. 2023. Review of healthcare industry 4.0 application-based blockchain in terms of security and privacy development attributes: Comprehensive taxonomy, open issues and challenges and recommended solution. Journal of Network and Computer Applications 209 (2023), 103529.
    [111]
    Bipin Kumar Rai. 2023. PcBEHR: Patient-controlled blockchain enabled electronic health records for healthcare 4.0. Health Services and Outcomes Research Methodology 23, 1 (2023), 80–102.
    [112]
    Swamynathan Ramakrishnan, S. Jijitha, and T. Amudha. 2024. Roadmap of AI and IoMT in smart healthcare: Current applications and future perspectives. Internet of Medical Things in Smart Healthcare (2024), 137–161.
    [113]
    Protection Regulation. 2016. Regulation (EU) 2016/679 of the European Parliament and of the Council. Regulation (EU) 679 (2016), 2016.
    [114]
    Fatemeh Rezaeibagha, Yi Mu, Willy Susilo, and Khin Than Win. 2016. Multi-authority security framework for scalable EHR systems. International Journal of Medical Engineering and Informatics 8, 4 (2016), 390–408.
    [115]
    Fatemeh Rezaeibagha, Khin Than Win, and Willy Susilo. 2015. A systematic literature review on security and privacy of electronic health record systems: Technical perspectives. Health Information Management Journal 44, 3 (2015), 23–38.
    [116]
    Alex Roehrs, Cristiano André da Costa, Rodrigo da Rosa Righi, Sandro José Rigo, and Matheus Henrique Wichman. 2018. Toward a model for personal health record interoperability. IEEE Journal of Biomedical and Health Informatics 23, 2 (2018), 867–873.
    [117]
    Naiyana Sahavechaphan, U. Suriya, Nattapon Harnsamut, Jessada Phengsuwan, Kamron Aroonrua, and others. 2012. An efficient technique for aspect-based EHR access policy administration on ABAC. In 2011 Ninth International Conference on ICT and Knowledge Engineering. IEEE, 27–33.
    [118]
    K. Selvakumar and S. Lokesh. 2024. A cryptographic method to have a secure communication of health care digital data into the cloud. Automatika 65, 1 (2024), 373–386.
    [119]
    Muhammad Shafay, Raja Wasim Ahmad, Khaled Salah, Ibrar Yaqoob, Raja Jayaraman, and Mohammed Omar. 2023. Blockchain for deep learning: Review and open challenges. Cluster Computing 26, 1 (2023), 197–221.
    [120]
    Leila Shahmoradi, Alireza Darrudi, Goli Arji, and Ahmadreza Farzaneh Nejad. 2017. Electronic health record implementation: A SWOT analysis. Acta Medica Iranica (2017), 642–649.
    [121]
    Xinghua Shi and Xintao Wu. 2017. An overview of human genetic privacy. Annals of the New York Academy of Sciences 1387, 1 (2017), 61–72.
    [122]
    Alexis Shore, Anisha Reddy, and Carrie Klein. 2022. A student-centered privacy model for responsible technology use. Higher Education Implications for Teaching and Learning During COVID-19 (2022), 81.
    [123]
    Asad Ali Siyal, Aisha Zahid Junejo, Muhammad Zawish, Kainat Ahmed, Aiman Khalil, and Georgia Soursou. 2019. Applications of blockchain technology in medicine and healthcare: Challenges and future perspectives. Cryptography 3, 1 (2019), 3.
    [124]
    Daniel J. Solove and Woodrow Hartzog. 2022. Unifying privacy and data security. In Breached! Why Data Security Law Fails and How to Improve It. New York: Oxford University Press.
    [125]
    Julio Souza, Diana Pimenta, Ismael Caballero, and Alberto Freitas. 2020. Measuring data credibility and medical coding: A case study using a nationwide Portuguese inpatient database. Software Quality Journal 28, 3 (2020), 1043–1061.
    [126]
    Mesala M. Sravani and S. Ananiah Durai. 2021. Attacks on cryptosystems implemented via VLSI: A review. Journal of Information Security and Applications 60 (2021), 102861.
    [127]
    Vivek Subbiah. 2023. The next generation of evidence-based medicine. Nature Medicine 29, 1 (2023), 49–58.
    [128]
    Chang Sun, Lianne Ippel, Johan Van Soest, Birgit Wouters, Alexander Malic, Onaopepo Adekunle, Bob van den Berg, Ole Mussmann, Annemarie Koster, Carla van der Kallen, and others. 2019. A privacy-preserving infrastructure for analyzing personal health data in a vertically partitioned scenario. MedInfo 264 (2019), 373–377.
    [129]
    Joshua D. Symons, Hutan Ashrafian, Rachel Dunscombe, and Ara Darzi. 2019. From EHR to PHR: Let’s get the record straight. BMJ Open 9, 9 (2019), e029582.
    [130]
    Sudeep Tanwar, Karan Parekh, and Richard Evans. 2020. Blockchain-based electronic healthcare record system for healthcare 4.0 applications. Journal of Information Security and Applications 50 (2020), 102407.
    [131]
    Gurvirender P. S. Tejay and Zareef A. Mohammed. 2023. Cultivating security culture for information security success: A mixed-methods study based on anthropological perspective. Information & Management 60, 3 (2023), 103751.
    [132]
    Joan M. Teno, Rebecca Anhang Price, and Lena K. Makaroun. 2017. Challenges of measuring quality of community-based programs for seriously ill individuals and their families. Health Aff. (Millwood) 36, 7 (2017), 1227–1233. DOI:
    [133]
    Thein Than Thwin and Sangsuree Vasupongayya. 2018. Blockchain based secret-data sharing model for personal health record system. In 2018 5th International Conference on Advanced Informatics: Concept Theory and Applications (ICAICTA). IEEE, 196–201.
    [134]
    Zhouyu Tian, Lening Qiu, and Litao Wang. 2024. Drivers and influencers of blockchain and cloud-based business sustainability accounting in China: Enhancing practices and promoting adoption. Plos One 19, 1 (2024), e0295802.
    [135]
    Mueen Uddin. 2021. Blockchain medledger: Hyperledger fabric enabled drug traceability system for counterfeit drugs in pharmaceutical industry. International Journal of Pharmaceutics 597 (2021), 120235.
    [136]
    Shubhangi V. Urkude, Himanshu Sharma, Seethamsetty Uday Kumar, and Vijaykumar R. Urkude. 2021. Anatomy of blockchain implementation in healthcare. In Blockchain Technology: Applications and Challenges. Springer, 51–76.
    [137]
    N. Venkateswaran and S. Prabaharan Prabaharan. 2022. An efficient neuro deep learning intrusion detection system for mobile adhoc networks. EAI Endorsed Transactions on Scalable Information Systems 9, 6 (2022), e7–e7.
    [138]
    Garima Verma. 2024. Blockchain-based privacy preservation framework for healthcare data in cloud environment. Journal of Experimental & Theoretical Artificial Intelligence 36, 1 (2024), 147–160.
    [139]
    Edgar R. Dulce Villarreal, Jose García-Alonso, Enrique Moguel, and Julio Ariel Hurtado Alegría. 2023. Blockchain for healthcare management systems: A survey on interoperability and security. IEEE Access 11 (2023), 5629–5652.
    [140]
    Pasupathy Vimalachandran, Yanchun Zhang, Jinli Cao, Lili Sun, and Jianming Yong. 2018. Preserving data privacy and security in Australian my health record system: A quality health care implication. In International Conference on Web Information Systems Engineering. Springer, 111–120.
    [141]
    Louisa Walsh, Sophie Hill, Meredith Allan, Susan Balandin, Andrew Georgiou, Isabel Higgins, Ben Kraal, Shaun McCarthy, and Bronwyn Hemsley. 2018. A content analysis of the consumer-facing online information about My Health Record: Implications for increasing knowledge and awareness to facilitate uptake and use. Health Information Management Journal 47, 3 (2018), 106–115.
    [142]
    Hao Wang and Yujiao Song. 2018. Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. Journal of Medical Systems 42, 8 (2018), 1–9.
    [143]
    Yong Wang, Aiqing Zhang, Peiyun Zhang, and Huaqun Wang. 2019. Cloud-assisted EHR sharing with security and privacy preservation via consortium blockchain. IEEE Access 7 (2019), 136704–136719.
    [144]
    Vinden Wylde, Nisha Rawindaran, John Lawrence, Rushil Balasubramanian, Edmond Prakash, Ambikesh Jayal, Imtiaz Khan, Chaminda Hewage, and Jon Platts. 2022. Cybersecurity, data privacy and blockchain: A review. SN Computer Science 3, 2 (2022), 1–12.
    [145]
    Qi Xia, Emmanuel Boateng Sifah, Kwame Omono Asamoah, Jianbin Gao, Xiaojiang Du, and Mohsen Guizani. 2017. MeDShare: Trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5 (2017), 14757–14767.
    [146]
    Ashok Kumar Yadav, Karan Singh, Ali H. Amin, Laila Almutairi, Theyab R. Alsenani, and Ali Ahmadian. 2023. A comparative study on consensus mechanism with security threats and future scopes: Blockchain. Computer Communications 201 (2023), 102–115.
    [147]
    Xu Yang, Xuechao Yang, Junwei Luo, Xun Yi, Ibrahim Kahlil, Shangqi Lai, Wei Wu, and Albert Y. Zomaya. 2023. Towards sustainable trust: A practical SGX aided anonymous reputation system. IEEE Transactions on Sustainable Computing (2023).
    [148]
    Jiao Yin, MingJian Tang, Jinli Cao, Mingshan You, Hua Wang, and Mamoun Alazab. 2022. Knowledge-driven cybersecurity intelligence: Software vulnerability coexploitation behavior discovery. IEEE Transactions on Industrial Informatics 19, 4 (2022), 5593–5601.
    [149]
    Ehab Zaghloul, Tongtong Li, and Jian Ren. 2019. Security and privacy of electronic health records: Decentralized and hierarchical data sharing using smart contracts. In 2019 International Conference on Computing, Networking and Communications (ICNC). IEEE, 375–379.
    [150]
    Li Zhang, Jianbo Xu, Pandi Vijayakumar, Pradip Kumar Sharma, and Uttam Ghosh. 2022. Homomorphic encryption-based privacy-preserving federated learning in IoT-enabled healthcare system. IEEE Transactions on Network Science and Engineering (2022).
    [151]
    Rui Zhang, Rui Xue, and Ling Liu. 2019. Security and privacy on blockchain. ACM Computing Surveys (CSUR) 52, 3 (2019), 1–34.
    [152]
    Xiaoshuai Zhang and Stefan Poslad. 2018. Blockchain support for flexible queries with granular access control to electronic medical records (EMR). In 2018 IEEE International Conference on Communications (ICC). IEEE, 1–6.
    [153]
    Jun Zhao, Kai Zhang, Junqing Gong, and Haifeng Qian. 2024. Lavida: Large-universe, verifiable and dynamic fine-grained access control for e-health cloud. IEEE Transactions on Information Forensics and Security (2024).
    [154]
    Yifeng Zheng, Menglun Zhou, Songlei Wang, Hejiao Huang, Xiaohua Jia, Xun Yi, and Cong Wang. 2023. SecDR: Enabling secure, efficient, and accurate data recovery for mobile crowdsensing. IEEE Transactions on Dependable and Secure Computing (2023).
    [155]
    Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Xinyi Huang, and Feihong Xu. 2023. A security-enhanced certificateless conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems (2023).

    Cited By

    View all
    • (2024)Cross-Sectional Analysis of Australian Dental Practitioners’ Perceptions of TeledentistryICST Transactions on Scalable Information Systems10.4108/eetsis.536611Online publication date: 16-Jul-2024
    • (2024)Integrating Patient-Reported Outcomes in the Evaluation of Breast Implant Satisfaction and Quality of LifeInternational Journal of Innovative Science and Research Technology (IJISRT)10.38124/ijisrt/IJISRT24JUN1948(1735-1743)Online publication date: 4-Jul-2024
    • (2024)Generation of Face Privacy-Protected Images Based on the Diffusion ModelEntropy10.3390/e2606047926:6(479)Online publication date: 31-May-2024
    • Show More Cited By

    Index Terms

    1. Privacy Preservation of Electronic Health Records in the Modern Era: A Systematic Survey

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Computing Surveys
        ACM Computing Surveys  Volume 56, Issue 8
        August 2024
        963 pages
        ISSN:0360-0300
        EISSN:1557-7341
        DOI:10.1145/3613627
        • Editors:
        • David Atienza,
        • Michela Milano
        Issue’s Table of Contents

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 26 April 2024
        Online AM: 19 March 2024
        Accepted: 07 March 2024
        Revised: 18 January 2024
        Received: 28 March 2023
        Published in CSUR Volume 56, Issue 8

        Check for updates

        Author Tags

        1. Block chain
        2. data sharing
        3. confidentiality
        4. electronic health records
        5. privacy
        6. security

        Qualifiers

        • Survey

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)1,009
        • Downloads (Last 6 weeks)188
        Reflects downloads up to 26 Jul 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Cross-Sectional Analysis of Australian Dental Practitioners’ Perceptions of TeledentistryICST Transactions on Scalable Information Systems10.4108/eetsis.536611Online publication date: 16-Jul-2024
        • (2024)Integrating Patient-Reported Outcomes in the Evaluation of Breast Implant Satisfaction and Quality of LifeInternational Journal of Innovative Science and Research Technology (IJISRT)10.38124/ijisrt/IJISRT24JUN1948(1735-1743)Online publication date: 4-Jul-2024
        • (2024)Generation of Face Privacy-Protected Images Based on the Diffusion ModelEntropy10.3390/e2606047926:6(479)Online publication date: 31-May-2024
        • (2024)Blockchain enabled secured, smart healthcare system for smart cities: a systematic review on architecture, technology, and service managementCluster Computing10.1007/s10586-024-04661-7Online publication date: 20-Jul-2024

        View Options

        Get Access

        Login options

        Full Access

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        Full Text

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media