Security and privacy in electronic health records: A systematic literature review
Citations
532 citations
415 citations
Additional excerpts
...An SLR is a research technique that gathers all empirical evidence in a specific field of study [28]....
[...]
310 citations
249 citations
Cites background from "Security and privacy in electronic ..."
...However, when users store EHR data on the cloud server, the data will suffer a variety of security threats [2], involving the privacy of the data, the integrity of the data, and the authentication of the data....
[...]
246 citations
Cites background or methods from "Security and privacy in electronic ..."
...According to [7], the most widely used regulations are the Health Insurance Portability and Accountability Act (HIPAA) and the European Data Protection Directive 95/46/EC....
[...]
...Through the application of the general privacy technologies in the healthcare domain, many researches on privacy protection of healthcare data are reported [7]....
[...]
References
25,711 citations
"Security and privacy in electronic ..." refers methods in this paper
...This systematic review has followed the quality reporting guidelines set by the Preferred Reporting Items for Systematic reviews and Meta-Analysis (PRISMA) group [26]....
[...]
14,340 citations
"Security and privacy in electronic ..." refers background in this paper
...[54–56] propose the possibility of sharing pseudonyms based on the threshold scheme of Shamir [59], and provide a mechanism with which to recover lost or destroyed keys....
[...]
7,925 citations
"Security and privacy in electronic ..." refers background in this paper
...There is a growing body of literature investigating the risks of person re-identification through data mining and probabilistic techniques [93] and a similarly expanding set of algorithmic techniques have been proposed for the profiling and monitoring of serial queries and result sets to detect attempts to triangulate towards unique person characteristics [94,95]....
[...]
4,364 citations
Additional excerpts
...[35] propose the use of ciphertext-policy attribute-based encryption (cp-ABE) [72] to ensure that the Cloud provider cannot see (or copy) EHR data....
[...]