Abstract

Collaborative eHealth that enables the collection and sharing of patients' data is eliminating the location and accessibility barriers in healthcare service delivery. With advances in technology, patients' data can be collected from anywhere, at any time, stored in a central location, and shared across multiple service providers to improve the quality of healthcare service delivery. Maintaining patients' data privacy during the storage and sharing process is critical for collaborative eHealth success. The attribute-based encryption, which has shown potential in data privacy protection in the cloud, has the necessary ingredients to be used in guarding against privacy violations in collaborative eHealth. In this paper, we survey the different attribute-based encryption schemes for usage in collaborative eHealth. We discuss some challenges associated with the use of attribute-based encryption schemes in collaborative eHealth and point out some future research directions. Also, we perform a comparative analysis of the surveyed schemes in terms of security, revocation ability, and efficiency.

Highlights

  • Technological developments in the last few decades have led to significant improvements in healthcare digitization

  • This digitization has paved the way for sharing and use of electronic health records (EHR), enabling patients to be collaboratively treated by different healthcare institutions and professionals

  • AN INTUITIVE USE-CASE EXAMPLE To elaborate on the necessity of a suitable access control mechanism in collaborative eHealth, we present an intuitive example scenario as follows

Read more

Summary

INTRODUCTION

Technological developments in the last few decades have led to significant improvements in healthcare digitization. Several technological techniques are being used to achieve privacy provision in EHR sharing in the cloud, ranging from conventional cryptographic techniques like advanced encryption standard (AES) [6], elliptic curve cryptography (ECC) [7], [8], elliptic curve diffie-hellman key exchange [9] and elliptic curve integrated encryption scheme (ECIES) [10] to more recent techniques like attribute-based encryption (ABE) [11], [12] and homomorphic encryption (HE) [13] These methods provide data collection, storage, sharing, and computation privacy to EHRs through encryption. 6) we present future directions that require further investigation

PAPER ORGANIZATION We organize the rest of the paper as follows
RELATED WORK
CHALLENGES ASSOCIATED WITH ABE USAGE IN COLLABORATIVE EHEALTH
COMPARISONS
VIII. CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.