Privacy Preserving Requirements for Sharing Health Data in Cloud

  • Insaf BoumezbeurEmail author
  • Karim Zarour
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 111)


Cloud Computing (CC) has become an integral part of the operation of health. This technology plays an important role in healthcare domain, particularly in the sharing of health data. However, moving and sharing sensitive health data to the cloud still implies severe privacy risks. Various research results have proposed different solutions in order to preserve the privacy of health data in cloud environment. This paper focuses on privacy preserving requirements solutions related to sharing health data in cloud. These solutions have been compared together according to the privacy-preserving requirements, strengths and weaknesses.


Sharing health data Privacy Access control Encryption 


  1. 1.
    US Department of Health and Human Services: The National Alliance for Health Information Technology report to the Office of the National Coordinator for Health Information Technology on defining key health information technology terms (2008)Google Scholar
  2. 2.
    Ermakova, T., Fabian B.: Secret sharing for health data in multi-provider clouds. In: Business Informatics (CBI), pp. 93–100. IEEE (2013)Google Scholar
  3. 3.
    Li, Z., Chang, E., Huang, K., Lai, F.: A secure electronic medical record sharing mechanism in the cloud computing platform. In: Consumer Electronics (ISCE), pp. 98–103. IEEE (2011)Google Scholar
  4. 4.
    Sharon, R.S., Manoj, R.J.: E-health care data sharing into the cloud based on deduplication and file hierarchical encryption. In: Information Communication and Embedded Systems (ICICES), pp. 1–6. IEEE (2017)Google Scholar
  5. 5.
    Abbas, A., Khan, S.U.: E-Health cloud: privacy concerns and mitigation strategies. In: Medical Data Privacy Handbook, pp. 389–421. Springer, Cham (2015)CrossRefGoogle Scholar
  6. 6.
    US Department of Health and Human Services: 45 Code of Federal Regulations, pp. 5566–5702 (2013)Google Scholar
  7. 7.
    Zhang, R., Liu, L.: Security models and requirements for healthcare application clouds. In: Cloud Computing (CLOUD), pp. 268—278. IEEE (2010)Google Scholar
  8. 8.
    AbuKhousa, E., Mohamed, N., Al-Jaroodi, J.: E-Health cloud: opportunities and challenges. Future Internet 4(3), 621–645 (2012)CrossRefGoogle Scholar
  9. 9.
    Abbas, A., Khan, S.U.: A review on the state-of-the-art privacy-preserving approaches in the E-Health clouds. IEEE J. Biomed. Health Inform. 18(4), 1431–1441 (2014)CrossRefGoogle Scholar
  10. 10.
    Chen, Y., Lu, J., Jan, J.: A secure EHR system based on hybrid clouds. J. Med. Syst. 36(5), 3375–3384 (2012)CrossRefGoogle Scholar
  11. 11.
    Kulkarni, K.P., Dixit, A.M.: Privacy preserving health record system in cloud computing using attribute based encryption. Int. J. Comput. Appl. 122(18), 6–11 (2015)Google Scholar
  12. 12.
    Pussewalage, H.S.G., Oleshchuk, V.A.: Privacy preserving mechanisms for enforcing security and privacy requirements in E-Health solutions. Int. J. Inf. Manage. 36(6), 1161–1173 (2016)CrossRefGoogle Scholar
  13. 13.
    Seol, K., Kim, Y., Lee, E., Seo, Y., Baik, D.: Privacy-preserving attribute-based access control model for XML-based electronic health record system. IEEE Access. 6, 9114–9128 (2018)CrossRefGoogle Scholar
  14. 14.
    Manoj, R., et al.: Hybrid secure and scalable electronic health record sharing in hybrid cloud. In: Mobile Cloud Computing, Services, and Engineering (MobileCloud), pp. 185–190. IEEE (2017)Google Scholar
  15. 15.
    Michalas, A.: Sharing in the rain: secure and efficient data sharing for the cloud. In: Internet Technology and Secured Transactions (ICITST), pp. 182–187. IEEE (2016)Google Scholar
  16. 16.
    Fu, J., Huang, Q., Yang, Y.: Secure personal data sharing in cloud computing using attribute-based broadcast encryption. J. China Univ. Posts Telecommun. 21(6), 45–77 (2014)CrossRefGoogle Scholar
  17. 17.
    Mohandas, A.: Privacy preserving content disclosure for enabling sharing of electronic health records in cloud computing. In: Proceedings of the 7th ACM India Computing Conference. ACM (2014)Google Scholar
  18. 18.
    Alshehri, S., Stanislaw, P.R., Raj, K.R.: Secure access for healthcare data in the cloud using ciphertext-policy attribute-based encryption. In: Data Engineering Workshops (ICDEW), pp. 143–146. IEEE (2012)Google Scholar
  19. 19.
    Shrestha, N.M., Alsadoon, A., Prasad, P.W.C., Hourany, L., Elchouemi, A.: Enhanced e-health framework for security and privacy in healthcare system. In: Digital Information Processing and Communications (ICDIPC), pp. 75–79. IEEE (2016)Google Scholar
  20. 20.
    Fan, L., Buchanan, W., Thummler, C., Lo, O., Khedim, A., Uthmani, O., Lawson, A., Bell, D.: DACAR platform for eHealth services cloud. In: Cloud Computing (CLOUD), pp. 219–226. IEEE (2011)Google Scholar
  21. 21.
    Reddy, R.D., Kiran, P.R.: An efficient data sharing technique in the cloud: an EDST. Int. J. Recent. Innov. Trends Comput. Commun. 2(6), 1718–1720 (2014)Google Scholar
  22. 22.
    Musale, P., Tanuja, S.: Health care data security in cloud. Int. J. Innov. Eng. Technol. (IJIET) 8(3), 254–259 (2017)Google Scholar
  23. 23.
    Alamri, F.S., Lee, K.D.: Secure sharing of health data over cloud. In: Information Technology: Towards New Smart World (NSITNSW), pp. 1–5. IEEE (2015)Google Scholar
  24. 24.
    Thilakanathan, D., Chen, S., Nepal, S., Calvo, R., Alem, L.: A platform for secure monitoring and sharing of generic health data in the Cloud. Futur. Gener. Comput. Syst. 35, 102–113 (2014)CrossRefGoogle Scholar
  25. 25.
    Radwan, A.S., Abdel-Hamid, A., Hanafy, Y.: Cloud-based service for secure electronic medical record exchange. In: Computer Theory and Applications (ICCTA), pp. 94–103. IEEE (2012)Google Scholar
  26. 26.
    Nagaty, K.A.: Mobile health care on a secured hybrid cloud. J. Sel. Areas Health Inform. 4(2), 1–9 (2014)Google Scholar
  27. 27.
    Tong, Y., Sun, J., Chow, S.S.M., Li, P.: Cloud-assisted mobile-access of health data with privacy and auditability. IEEE J. Biomed. Health Inform. 18(2), 419–429 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.LIRE Laboratory, Department of Software Technology and Information SystemsUniversity Constantine 2 - Abdelhamid MehriConstantineAlgeria

Personalised recommendations