Skip to main content

Advertisement

Log in

Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Electronic health records (EHRs) are increasingly employed to maintain, store and share varied types of patient data. The data can also be utilized for various research purposes, such as clinical trials or epidemic control strategies. With the increasing cost and scarcity of healthcare services, healthcare organizations feel at ease in outsourcing these services to cloud-based EHRs. That serves as pay-as-you-go (PAYG) “e-health cloud” models to aid the healthcare organizations handling with existing and imminent demands yet restricting their costs. Technologies can host some risks; hence the privacy of information in these systems is of utmost importance. Regardless of its increased effectiveness and growing eagerness in its adoption, not much care is being employed to the privacy issues that might arise. Privacy preservation need to be reviewed about the changing privacy rules and legislations regarding sensitive personal data. Our work aims at answering three major questions: firstly, how privacy models and privacy techniques correlate with each other, secondly, how we can fix the privacy-utility-trade off by using different combinations of privacy models and privacy techniques and lastly, what are the most relevant privacy techniques that can be adapted to achieve privacy of EHR on cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. We will use Privacy aware anonymity-based techniques, privacy techniques and anonymization techniques interchangeably throughout the article.

References

  1. AbuKhousa, E., Mohamed, N., Al-Jaroodi, J.: e-Health cloud: opportunities and challenges. Future Internet 4(3), 621–645 (2012)

    Article  Google Scholar 

  2. Lynda, K., Saliha, O.-K., Nadjia, B.: Data security and privacy in e-health cloud: comparative study. In: Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication. ACM (2015)

  3. Löhr, H., Sadeghi, A.-R., Winandy, M.: Securing the e-health cloud. In: Proceedings of the 1st ACM International Health Informatics Symposium. ACM (2010)

  4. Arshdeep, B., Madisetti, V.K.: A cloud-based approach for interoperable electronic health records (EHRs). IEEE J. Biomed. Health Inform. 17(5), 894–906 (2013)

    Article  Google Scholar 

  5. VistA Monograph. www.va.gov/vistamonograph (2012)

  6. OpenEHR. http://www.openehr.org (2012)

  7. http://www.athenahealth.com

  8. Achampong, E.K.: Electronic health record (EHR) and cloud security: the current issues. Int. J. Cloud Comput. Serv. Sci. 2(6), 417 (2013)

    Google Scholar 

  9. Heurix, J., et al.: A taxonomy for privacy enhancing technologies. Comput. Secur. 53, 1–17 (2015)

    Article  Google Scholar 

  10. Abbas, A., Khan, S.U.: e-Health cloud: privacy concerns and mitigation strategies. In: Medical Data Privacy Handbook, pp. 389–421. Springer, Berlin (2015)

  11. EU Commission Website. https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en. Accessed 28 May 2019

  12. Demotes-Mainard, J., et al.: How the new European data protection regulation affects clinical research and recommendations? Thérapie 74(1), 31–42 (2019)

    Google Scholar 

  13. Taneja, H., Singh, A.K.: Preserving privacy of patients based on re-identification risk. Procedia Comput. Sci. 70, 448–454 (2015)

    Article  Google Scholar 

  14. Gkoulalas-Divanis, A., Loukides, G., Sun, J.: Publishing data from electronic health records while preserving privacy: a survey of algorithms. J. Biomed. Inform. 50, 4–19 (2014)

    Article  Google Scholar 

  15. Wang, W., Chen, L., Zhang, Q.: Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation. Comput. Netw. 88, 136–148 (2015). ISSN 1389-1286. http://dx.doi.org/10.1016/j.comnet.2015.06.014

  16. Omnibus: Hipaa rule in the Federal Register. http://www.gpo.gov/fdsys/pkg/FR-2013-01-25/pdf/2013-01073.pdf (2013)

  17. Wang, W., Zhang, Q.: Towards long-term privacy preservation: a context aware perspective. IEEE Wirel. Commun. 22, 34–40 (2015)

    Article  Google Scholar 

  18. Pandilakshmi, K.R., Rashitha Banu, G.: An advanced bottom up generalization approach for big data on cloud. Int. J. Commun. Netw. Syst. 3, 1054–1059 (2014)

    Google Scholar 

  19. Sedayao, J.: Enhancing cloud security using data anonymization. White Paper, Intel Coporation (2012)

  20. Sinha, T., et al.: Trends and research directions for privacy preserving approaches on the cloud. In: Proceedings of the 6th ACM India Computing Convention. ACM (2013)

  21. Rodrigues, J.J.P.C., et al.: Analysis of the security and privacy requirements of cloud-based electronic health records systems. J. Med. Internet Res. 15(8), e186 (2013)

    Article  Google Scholar 

  22. Abbas, A., Khan, S.U.: A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J. Biomed. Health Inform. 18(4), 1431–1441 (2014)

    Article  Google Scholar 

  23. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology–EUROCRYPT 2005, pp. 457–473. Springer, Berlin (2005)

  24. Goyal, V., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security. ACM (2006)

  25. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, 2007. SP’07. IEEE (2007)

  26. Chase, M., Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM (2009)

  27. Danwei, C., et al.: Securing patient-centric personal health records sharing system in cloud computing. China Commun. 11(13), 121–127 (2014)

    Article  Google Scholar 

  28. Song, D.X., Wagner, D, Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, 2000. S&P 2000. Proceedings. IEEE (2000)

  29. Narayan, S., Gagné, M., Safavi-Naini, R.: Privacy preserving EHR system using attribute-based infrastructure. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop. ACM (2010)

  30. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology. Springer, Berlin (1984)

  31. Benaloh, J., et al.: Patient controlled encryption: ensuring privacy of electronic medical records. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security. ACM (2009)

  32. Gentry, C. Fully homomorphic encryption using ideal lattices.In: STOC. vol. 9 (2009)

  33. Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud computing Security Workshop. ACM (2011)

  34. Lin, H., et al.: CAM: cloud-assisted privacy preserving mobile health monitoring. IEEE Trans. Inf. Forensics Secur. 8(6), 985–997 (2013)

    Article  Google Scholar 

  35. Chen, Yu-Yi, Jun-Chao, Lu, Jan, Jinn-Ke: A secure EHR system based on hybrid clouds. J. Med. Syst. 36(5), 3375–3384 (2012)

    Article  Google Scholar 

  36. Li, Z.-R., et al.: A secure electronic medical record sharing mechanism in the cloud computing platform. In: 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE). IEEE (2011)

  37. Kumar, N., Mathuria, A., Das, M.L.: Achieving forward secrecy and unlinkability in cloud-based personal health record system. In: 2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1. IEEE (2015)

  38. Zhang, R., Liu, L.: Security models and requirements for healthcare application clouds. In: 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD). IEEE (2010)

  39. Alshehri, S., Radziszowski, S., Raj, R.K.: Designing a secure cloud-based ehr system using ciphertext-policy attribute-based encryption. In: Proceedings of the Data Management in the Cloud Workshop, Washington, DC, USA (2012)

  40. Barua, M., et al.: ESPAC: enabling security and patient-centric access control for ehealth in cloud computing. Int. J. Secur. Netw. 6(2–3), 67–76 (2011)

    Article  Google Scholar 

  41. Takabi, H.: Privacy aware access control for data sharing in cloud computing environments. In: Proceedings of the 2nd International Workshop on Security in Cloud Computing. ACM (2014)

  42. Peleg, M., et al.: Situation-based access control: privacy management via modelling of patient data access scenarios. J. Biomed. Inform. 41(6), 1028–1040 (2008)

    Article  Google Scholar 

  43. Yang, J.-J., Li, J.-Q., Niu, Y.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener. Comput. Syst. 43, 74–86 (2015)

    Article  Google Scholar 

  44. Sun, X., Sun, L., Wang, H.: Extended k-anonymity models against sensitive attribute disclosure. Comput. Commun. 34(4), 526–535 (2011)

    Article  Google Scholar 

  45. Shrivastva, K.M.P.D., Rizvi, M.A., Singh, S.: Big data privacy based on differential privacy a hope for big data. In: 2014 International Conference on Computational Intelligence and Communication Networks (CICN). IEEE (2014)

  46. Aggarwal, C.C., Philip, S.Y.: A General Survey of Privacy-Preserving Data Mining Models and Algorithms. Springer, Berlin (2008)

    Book  Google Scholar 

  47. Kiran, P., Kavya, N.P.: A survey on methods, attacks and metric for privacy preserving data publishing. Int. J. Comput. Appl. 53(18), 20–28 (2012)

    Google Scholar 

  48. Xu, Y., et al.: A survey of privacy preserving data publishing using generalization and suppression. Appl. Math. 8(3), 1103–1116 (2014)

    Google Scholar 

  49. Fung, B., et al.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. (CSUR) 42(4), 14 (2010)

    Article  Google Scholar 

  50. Pussewalage, H.S.G., Oleshchuk, V.A.: Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions. Int. J. Inf. Manag. 36(6), 1161–1173 (2016)

    Article  Google Scholar 

  51. Yüksel, B., Küpçü, A., Özkasap, O.: Research issues for privacy and security of electronic health services. Future Gener. Comput. Syst. 68, 1–13 (2017)

    Article  Google Scholar 

  52. Fernández-Alemán, J.L., et al.: Security and privacy in electronic health records: a systematic literature review. J. Biomed. Informat. 46(3), 541–562 (2013)

    Article  Google Scholar 

  53. Sajid, A., Abbas, H.: Data privacy in cloud-assisted healthcare systems: state of the art and future challenges. J. Med. Syst. 40(6), 1–16 (2016)

    Article  Google Scholar 

  54. Ruj, S., Stojmenovic, M., Nayak, A.: Privacy preserving access control with authentication for securing data in clouds. In: 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid). IEEE (2012)

  55. Zhang, R., Liu, L., Xue, R.: Role-based and time-bound access and management of EHR data. Secur. Commun. Netw. 7(6), 994–1015 (2014)

    Article  Google Scholar 

  56. Haas, S., et al.: Aspects of privacy for electronic health records. Int. J. Med. Inform. 80(2), e26–e31 (2011)

    Article  Google Scholar 

  57. Xu, L., Cremers, A.B., Wilken, T.: Pseudonymization for secondary use of cloud based electronic health records (2015)

  58. Pecarina, J., Pu, S., Liu, J.-C.: SAPPHIRE: anonymity for enhanced control and private collaboration in healthcare clouds. In: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE (2012)

  59. Tong, Y., et al.: Cloud-assisted mobile-access of health data with privacy and auditability. IEEE J. Biomed. Health Inform. 18(2), 419–429 (2014)

    Article  Google Scholar 

  60. Riedl, B., Grascher, V., Fenz, S., Neubauer, T.: Pseudonymization for improving the privacy in e-health applications. In: Proceedings of the Annual Hawaii International Conference System Sciences, pp. 1–9 (2008)

  61. Huang, L.C., Chu, H.C., Lien, C.Y., Hsiao, C.H., Kao, T.: Privacy preservation and information security protection for patients’ portable electronic health records. Comput. Biol. Med. 39(9), 743–750 (2009)

    Article  Google Scholar 

  62. Alhaqbani, B., Fidge, C.: Privacy-preserving electronic health record linkage using pseudonym identifiers. In: Proceedings of the International Conference E-Health Networking, Applications and Services Healthcom, pp. 108–117 (2008)

  63. Zhang, K., et al.: Sedic: privacy-aware data intensive computing on hybrid clouds. In: Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM (2011)

  64. Zhou, Z., et al.: Prometheus: privacy-aware data retrieval on hybrid cloud. In: INFOCOM, 2013 Proceedings IEEE. IEEE (2013)

  65. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  66. El Emam, K., Dankar, F.K.: Protecting privacy using k-anonymity. J. Am. Med. Inform. Assoc. 15(5), 627–637 (2008)

    Article  Google Scholar 

  67. Gionis, A., Mazza, A., Tassa, T.: k-Anonymization revisited. In: 2008 IEEE 24th International Conference on Data Engineering. IEEE (2008)

  68. LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data. ACM (2005)

  69. LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: 22nd International Conference on Data Engineering (ICDE’06). IEEE (2006)

  70. LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Workload-aware a Jian, et al. “Utility-based anonymization using local recoding.” In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2006)

  71. Xu, J., et al.: Utility-based anonymization using local recoding. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2006)

  72. Fung, B.C.M., Wang, K., Yu, P.S.: Top-down specialization for information and privacy preservation. In: 21st International Conference on Data Engineering (ICDE’05). IEEE (2005)

  73. Li, J., et al.: Achieving k-anonymity by clustering in attribute hierarchical structures. In: International Conference on Data Warehousing and Knowledge Discovery. Springer, Berlin (2006)

  74. Machanavajjhala, A., et al.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3 (2007)

    Article  MathSciNet  Google Scholar 

  75. Wong, R.C.-W., et al.: (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2006)

  76. Truta, T.M., Vinay, B.: Privacy protection: p-sensitive k-anonymity property. In: ICDE Workshops (2006)

  77. Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. IEEE 23rd International Conference on Data Engineering, 2007. ICDE 2007. IEEE (2007)

  78. Li, N., Li, T., Venkatasubramanian, S.: Closeness: a new privacy measure for data publishing. IEEE Trans. Knowl. Data Eng. 22(7), 943–956 (2010)

    Article  Google Scholar 

  79. Xiao, X., Tao, Y.: Anatomy: simple and effective privacy preservation. In: Proceedings of the 32nd International Conference on Very Large Data Bases. VLDB Endowment (2006)

  80. Nergiz, M.E., Atzori, M., Clifton, C.: Hiding the presence of individuals from shared databases. In: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data. ACM (2007)

  81. Nergiz, M.E., Clifton, C.: δ-presence without complete world knowledge. IEEE Trans. Knowl. Data Eng. 22(6), 868–883 (2010)

    Article  Google Scholar 

  82. Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)

    Article  MathSciNet  Google Scholar 

  83. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceeding of the IEEE INFOCOM (2011)

  84. Yuan, J., Yu, S.: Efficient privacy-preserving biometric identification in cloud computing. In: Proceedings of the IEEE INFOCOM (2013)

  85. Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  86. Pino, C., Di Salvo, R.: A survey of cloud computing architecture and applications in health. In: International Conference on Computer Science and Electronics Engineering (2013)

  87. Chandrasekaran, S., Mohan, S., Natarajan, R.: Survey on HealthCloud characteristics. Health Technol. 5(2), 135–146 (2015)

    Article  Google Scholar 

  88. Burke, M.J.: Enabling anonymous crime reporting on mobile phones in the developing world (2013)

  89. Panackal, J.J., Pillai, A.S.: Privacy preserving data mining: an extensive survey. In: ACEEE. International Conference on Multimedia Processing, Communication and Information Technology (2013)

  90. Li, T., et al.: Slicing: a new approach for privacy preserving data publishing. IEEE Trans. Knowl. Data Eng. 24(3), 561–574 (2012)

    Article  Google Scholar 

  91. Zhang, Q., et al.: Aggregate query answering on anonymized tables. In: 2007 IEEE 23rd International Conference on Data Engineering. IEEE (2007)

  92. Ghinita, G., Tao, Y., Kalnis, P.: On the anonymization of sparse high-dimensional data. In: 2008 IEEE 24th International Conference on Data Engineering. IEEE (2008)

  93. Zheleva, E., Getoor, L.: Preserving the privacy of sensitive relationships in graph data. In: Privacy, Security, and Trust in KDD, 153–171. Springer, Berlin (2008)

  94. Fung, B.C.M.: Privacy-preserving data publishing. Diss. Simon Fraser University (2007)

  95. Sehatkar, M.: Towards a Privacy Preserving Framework for Publishing Longitudinal Data. Diss. University of Ottawa (2014)

  96. Gkountouna, O. A Survey on Privacy Preservation Methods. NTUA, Technical Report (2011)

  97. Aggarwal, C.C., Philip, S.Y.: A condensation approach to privacy preserving data mining. In: Advances in Database Technology-EDBT 2004, pp. 183–199. Springer, Berlin (2004)

  98. Kargupta, H., et al.: Random-data perturbation techniques and privacy-preserving data mining. Knowl. Inf. Syst. 7(4), 387–414 (2005)

    Article  Google Scholar 

  99. Saygin, Y., Hakkani-Tur, D., Tur, G.: Sanitization and anonymization of document repositories. In: Web and Information Security, p. 133 (2006)

  100. Guo, L.: Randomization Based Privacy Preserving Categorical Data Analysis. Diss. The University of North Carolina at Charlotte (2010)

  101. Li, C., Aggarwal, C.C., Wang, J.: On Anonymization of Multi-graphs. SDM (2011)

  102. Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(05), 571–588 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  103. Liu, J., Wang, K.: Anonymizing transaction data by integrating suppression and generalization. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, Berlin (2010)

  104. Xu, Y., et al.: Anonymizing transaction databases for publication. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2008)

  105. Chakaravarthy, V.T., et al.: Efficient techniques for document sanitization. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management. ACM (2008)

  106. Chen, R., et al.: Privacy-preserving trajectory data publishing by local suppression. Inf. Sci. 231, 83–97 (2013)

    Article  MATH  Google Scholar 

  107. Zigomitros, A., Solanas, A., Patsakis, C.: The role of inference in the anonymization of medical records. In: 2014 IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS). IEEE (2014)

  108. Li, D., et al.: Permutation anonymization. J. Intell. Inf. Syst. 47, 427–445 (2015)

    Article  Google Scholar 

  109. Tao, Y., et al.: Angel: enhancing the utility of generalization for privacy preserving publication. IEEE Trans. Knowl. Data Eng. 21(7), 1073–1087 (2009)

    Article  Google Scholar 

  110. Brickell, J.L.: Privacy-preserving computatiaon for data mining (2009)

  111. Dwork, C.: Differential privacy: a survey of results. In: Theory and Applications of Models of Computation, pp. 1–19. Springer, Berlin (2008)

  112. Ganz, N.: Data Anonymization and its Effect on Personal Privacy. Diss. State University Of New York (2015)

  113. Li, N., Qardaji, W., Su, D.: On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. ACM (2012)

  114. Chen, J.R., et al.: Publishing set-valued data via differential privacy. Proc. VLDB Endow. 4(11), 1087–1098 (2011)

    Article  Google Scholar 

  115. Andrés, M.E., et al. Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM (2013)

  116. Gupta, A., Roth, A., Ullman, J.: Iterative constructions and private data release. Theory of Cryptography Conference. Springer, Berlin (2012)

  117. Sala, A., et al.: Sharing graphs using differentially private graph models. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference. ACM (2011)

  118. Hay, M., et al.: Accurate estimation of the degree distribution of private networks. In: 2009 Ninth IEEE International Conference on Data Mining. IEEE (2009)

  119. Karwa, V., et al.: Private analysis of graph structure. Proc. VLDB Endow. 4(11), 1146–1157 (2011)

    Article  Google Scholar 

  120. Proserpio, D., Goldberg, S., McSherry, F.: A workflow for differentially-private graph synthesis. In: Proceedings of the 2012 ACM Workshop on Workshop on Online Social Networks. ACM (2012)

  121. De Mauro, A., Greco, M., Grimaldi, M.: What is big data? A consensual definition and a review of key research topics. In: AIP Conference Proceedings, vol. 1644(1) (2015)

  122. Sagiroglu, S., Sinanc, D.: Big data: a review. In: 2013 International Conference on Collaboration Technologies and Systems (CTS). IEEE (2013)

  123. Gharehchopogh, F.S., Khalifelu, Z.A.: Analysis and evaluation of unstructured data: text mining versus natural language processing. In: 2011 5th International Conference on Application of Information and Communication Technologies (AICT). IEEE (2011)

  124. Poulis, G., et al.: Anonymizing data with relational and transaction attributes. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, Berlin (2013)

  125. Terrovitis, M., Mamoulis, N., Kalnis, P.: Privacy-preserving anonymization of set-valued data. Proc. VLDB Endow. 1(1), 115–125 (2008)

    Article  Google Scholar 

  126. Liu, J.: Optimal anonymization for transaction publishing. Chin. J. Electron. 20(2), 238–242 (2011)

    Google Scholar 

  127. Jiang, W., et al.: t-Plausibility: semantic preserving text sanitization. In: International Conference on Computational Science and Engineering, 2009. CSE’09. Vol. 3. IEEE (2009)

  128. Xiao, X., Tao, Y.: Personalized privacy preservation. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data. ACM (2006)

  129. Nair, L.R., Shetty, S.D.: Research in big data and analytics: an overview. Int. J. Comput. Appl 108(14), 19–23 (2014)

    Google Scholar 

  130. Andreu-Perez, J., et al.: Big data for health. IEEE J. Biomed. Health Inform. 19(4), 1193–1208 (2015)

    Article  Google Scholar 

  131. Hu, H., et al.: Toward scalable systems for big data analytics: a technology tutorial. IEEE Access 2, 652–687 (2014)

    Article  Google Scholar 

  132. Zhang, X., et al.: A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud. J. Comput. Syst. Sci. 80(5), 1008–1020 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  133. Wagner, I., Eckhoff, D.: Technical privacy metrics: a systematic survey. ACM Comput. Surv. (CSUR) 51(3), 57 (2018)

    Article  Google Scholar 

  134. Zhang, Q., et al.: Aggregate query answering on anonymized tables. In: IEEE 23rd International Conference on Data Engineering, 2007. ICDE 2007. IEEE (2007)

  135. Xiao, X., Tao, Y.: m-Invariance: towards privacy preserving re-publication of dynamic datasets. In: SIGMOD (2007)

  136. Rahimi, M.: Extended K-anonymity model for privacy preserving on micro data. Int. J. Comput. Netw. Inf. Secur. 7(12), 42–51 (2015)

    Google Scholar 

  137. Li, X., Jiexing, Tao, Yufei, Xiao: Preservation of proximity privacy in publishing numerical sensitive data. In: Proceedings of the 2008 ACM SIGMOD International Conference Management data (2008)

  138. Terrovitis, M., et al.: Privacy preservation by disassociation. Proc. VLDB Endow. 5(10), 944–955 (2012)

    Article  Google Scholar 

  139. Soria-Comas, J., et al.: Enhancing data utility in differential privacy via micro aggregation-based k-anonymity. VLDB J. 23(5), 771–794 (2014)

    Article  Google Scholar 

  140. Anjum, A., Raschia, G.: Anonymizing sequential releases under arbitrary updates. In: Proceedings of the Joint EDBT/ICDT 2013 Workshops, EDBT’13, pp. 145–154 (2013)

  141. Seol, K., et al.: Privacy-preserving attribute-based access control model for XML-based electronic health record system. IEEE Access 6, 9114–9128 (2018)

    Article  Google Scholar 

  142. Gruschka, N., et al.: Privacy issues and data protection in big data: a case study analysis under GDPR. In: 2018 IEEE International Conference on Big Data (Big Data). IEEE (2018)

  143. Aurucci, P., et al.: “GDPR” impact on health data exchange in European digital environment. In: E-health 2018 ICT, Society and Human Beings, vol 45 (2018)

  144. Van Deursen, T., Koster, P., Petkovic, M.: Reliable personal health records. Stud. Health Technol. Inform. 136, 484 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abid Khan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kanwal, T., Anjum, A. & Khan, A. Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities. Cluster Comput 24, 293–317 (2021). https://doi.org/10.1007/s10586-020-03106-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-020-03106-1

Keywords

Navigation