Emerging Architectures and Security Mechanisms for Patient- Centric Cloud-Based Electronic Health Record Systems.
Abstract
This survey paper explores the secure management of cloud-based electronic health records (EHRs) through centralized models, focusing on data security, access control mechanisms and algorithmic performance. It examines various encryption techniques and access strategies designed to protect sensitive health data against unauthorized access and breaches. The study also evaluates the efficiency and reliability of current security algorithms within cloud environments. This work focuses on developing robust and secure cloud solutions to effectively manage healthcare records. It addresses key challenges and outlines future research directions aimed at enhancing privacy, compliance, and performance within cloud-based healthcare systems.
References
Smith et al., 2023. Cloud Computing in Healthcare: Benefits and Challenges. Journal of Medical Systems.
Johnson & Lee, 2024. Interoperability Challenges in Cloud Health Records. Health Informatics Review.
Wang et al., 2022. Centralized Models for Cloud-Based Health Systems. IEEE Transactions on Cloud Computing.
Chen & Kumar, 2023. Security Risks in Centralized Cloud Architectures. Journal of Cybersecurity.
Patel et al., 2023. Regulatory Requirements for Cloud Health Data Security. International Journal of Medical Informatics.
Zhao & Singh, 2024. Access Control Mechanisms in Cloud Healthcare. ACM Computing Surveys.
Almeida & Fernandez, 2023. Algorithm Performance for Secure Cloud Health Applications. Journal of Parallel and Distributed Computing.
Rashid, A., & Rahman, M. (2021). Cloud computing for healthcare: Benefits and risks. Healthcare Informatics Research, 27(2), 123-130.
Almalki, A., AlZain, M., & Almarashdeh, I. (2022). Data privacy and security approaches in cloud computing for healthcare: A comprehensive review. Journal of Medical Systems, 46(4), 32.
Kumar, R., Singh, P., & Gupta, S. (2023). Advanced encryption and authentication techniques for securing health records in cloud environments. Information Security Journal, 32(1), 40-55
Refbacks
- There are currently no refbacks.