----------------------------- ----------------------------
Volume 5, Issue 2 (Autumn and Winter 2019)                   JMIS 2019, 5(2): 68-78 | Back to browse issues page

XML Persian Abstract Print

Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

mohammadi M, Sheikhtaheri A, Kermani F. Comparison of patient-centric algorithms for health information security in health social networks and cloud environments. JMIS. 2019; 5 (2) :68-78
URL: http://jmis.hums.ac.ir/article-1-195-en.html
Department of Health Information Management, School of Health Management and Information Sciences, Iran University of Medical Sciences.
Abstract:   (1825 Views)
Aim: Electronic health enables patients share their own medical information and this sharing poses security risks. The purpose of this research is to review, and compare algorithms and methods for solving patient information security, from different aspects, including user revocation, and access control capabilities. The strengths and weaknesses of these algorithms are identified.
Information sources or data: This review conducted using online databases including PubMed, Web of Science, and Science Direct.
Selection methods for study: Keywords including health information systems, computer security, access to information, cloud computing and social networking was used to search. Articles published in 2009 to 2019 were selected. 29 articles related to solving the problem of user revocation and 7 articles related to solving the problem of access control were selected. Related articles were reviewed, then the access control and user revocation solutions were compared.
Combine content and results: To protect the confidentiality of patient information, a cryptographic method is suggested before data sharing. This solution has the problem of revocation of the users. To solve this problem, various methods have been proposed. In this paper, these solutions are compared in different respects. The features of these methods have been compared in terms of instant revocation, key update, cloud free, encrypted text updates, and short revocation. Finally, methods for access control by the patients were also compared.
Conclusion: Security issues associated with health data make patients hesitant to post sensitive health information and share it with health providers. In this paper, algorithms and health information security methods were compared. Most of the solutions to revocation of users need re-encryption methods, also, access control solutions do not have the required flexibility. In the future, better methods should be presented.
Full-Text [PDF 894 kb]   (452 Downloads)    
Type of Study: Review | Subject: Special
Received: 2019/08/1 | Accepted: 2020/09/16 | Published: 2020/02/29

Add your comments about this article : Your username or Email:

Send email to the article author

Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2021 CC BY-NC 4.0 | Journal of Modern Medical Information Sciences

Designed & Developed by : Yektaweb