Abstract
Collaborative eHealth that enables the collection and sharing of patients' data is eliminating the location and accessibility barriers in healthcare service delivery. With advances in technology, patients' data can be collected from anywhere, at any time, stored in a central location, and shared across multiple service providers to improve the quality of healthcare service delivery. Maintaining patients' data privacy during the storage and sharing process is critical for collaborative eHealth success. The attribute-based encryption, which has shown potential in data privacy protection in the cloud, has the necessary ingredients to be used in guarding against privacy violations in collaborative eHealth. In this paper, we survey the different attribute-based encryption schemes for usage in collaborative eHealth. We discuss some challenges associated with the use of attribute-based encryption schemes in collaborative eHealth and point out some future research directions. Also, we perform a comparative analysis of the surveyed schemes in terms of security, revocation ability, and efficiency.
Highlights
Technological developments in the last few decades have led to significant improvements in healthcare digitization
This digitization has paved the way for sharing and use of electronic health records (EHR), enabling patients to be collaboratively treated by different healthcare institutions and professionals
AN INTUITIVE USE-CASE EXAMPLE To elaborate on the necessity of a suitable access control mechanism in collaborative eHealth, we present an intuitive example scenario as follows
Summary
Technological developments in the last few decades have led to significant improvements in healthcare digitization. Several technological techniques are being used to achieve privacy provision in EHR sharing in the cloud, ranging from conventional cryptographic techniques like advanced encryption standard (AES) [6], elliptic curve cryptography (ECC) [7], [8], elliptic curve diffie-hellman key exchange [9] and elliptic curve integrated encryption scheme (ECIES) [10] to more recent techniques like attribute-based encryption (ABE) [11], [12] and homomorphic encryption (HE) [13] These methods provide data collection, storage, sharing, and computation privacy to EHRs through encryption. 6) we present future directions that require further investigation
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.