IDEAS home Printed from https://ideas.repec.org/a/eee/ininma/v36y2016i6p1161-1173.html
   My bibliography  Save this article

Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions

Author

Listed:
  • Gardiyawasam Pussewalage, Harsha S.
  • Oleshchuk, Vladimir A.

Abstract

In the last few decades, there have been significant efforts in integrating information and communication technologies (ICT) into healthcare practices. This new paradigm commonly identified as electronic healthcare (e-health) allows provisioning of healthcare services at an affordable price to its consumers. However, there have been questions raised about the security of the sensitive information such as health records as well as the privacy of involving parties raising doubts on the minds of the general public. Thus, it is important to understand the potential security challenges in e-health systems and successfully resolve them by taking adequate measures to ensure fair utilization of such systems. In this paper, we have carried out a systematic state-of-the-art review over privacy preserving mechanisms that have been utilized on e-health solutions to achieve the security and privacy requirements while investigating to what extent such mechanisms are compatible with the identified requirements. Finally, we have pointed out some future research directions which could potentially contribute to develop secure and efficient e-health solutions.

Suggested Citation

  • Gardiyawasam Pussewalage, Harsha S. & Oleshchuk, Vladimir A., 2016. "Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions," International Journal of Information Management, Elsevier, vol. 36(6), pages 1161-1173.
  • Handle: RePEc:eee:ininma:v:36:y:2016:i:6:p:1161-1173
    DOI: 10.1016/j.ijinfomgt.2016.07.006
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0268401216300706
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijinfomgt.2016.07.006?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Haqaf, Husam & Koyuncu, Murat, 2018. "Understanding key skills for information security managers," International Journal of Information Management, Elsevier, vol. 43(C), pages 165-172.
    2. Yiğit Kazançoğlu & Muhittin Sağnak & Çisem Lafcı & Sunil Luthra & Anil Kumar & Caner Taçoğlu, 2021. "Big Data-Enabled Solutions Framework to Overcoming the Barriers to Circular Economy Initiatives in Healthcare Sector," IJERPH, MDPI, vol. 18(14), pages 1-21, July.
    3. Ali, Omar & Shrestha, Anup & Soar, Jeffrey & Wamba, Samuel Fosso, 2018. "Cloud computing-enabled healthcare opportunities, issues, and applications: A systematic review," International Journal of Information Management, Elsevier, vol. 43(C), pages 146-158.
    4. Rahman, Mohammad Saidur & Khalil, Ibrahim & Yi, Xun, 2019. "A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems," International Journal of Information Management, Elsevier, vol. 45(C), pages 276-288.
    5. Kaw, Javaid A. & Loan, Nazir A. & Parah, Shabir A. & Muhammad, K. & Sheikh, Javaid A. & Bhat, G.M., 2019. "A reversible and secure patient information hiding system for IoT driven e-health," International Journal of Information Management, Elsevier, vol. 45(C), pages 262-275.
    6. García, Laura & Tomás, Jesús & Parra, Lorena & Lloret, Jaime, 2019. "An m-health application for cerebral stroke detection and monitoring using cloud services," International Journal of Information Management, Elsevier, vol. 45(C), pages 319-327.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ininma:v:36:y:2016:i:6:p:1161-1173. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-information-management .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.