Skip to main content

A Succinct Analytical Study of the Usability of Encryption Methods in Healthcare Data Security

  • Chapter
  • First Online:
Next Generation Healthcare Informatics

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1039))

Abstract

Rapid digitization of medical records and administrative databases, combined with developments in statistics and computing power, promises to make epidemiological research for bettering healthcare more fruitful than ever before. The requirement for access to a copious amount of potentially sensitive patient health information is common in such circumstances (protected health information, such as names, record numbers, addresses, and medication). Such digitalization can also lead to a potential risk for patient confidentiality if a data leak occurs. Keeping the fact in mind, certain methods are being adopted by many organizations to curb such problems. One of the major techniques involved is encryption. In this chapter, we are going to reflect how protected health information (PHI) can be protected with the help of various encryption techniques. It also covers strategies for securing information and maintaining data integrity, as well as the relationship between patient data, measurement data, and diagnosis. This study ends by concluding how far this technique has been helpful in protecting healthcare data, its advantages over other techniques, and its current presence in the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. DesRoches, C., Campbell, Rao, E, S., Donelan, K., Ferris, T., Jha, A., Kaushal, R., Levy, D., Rosenbaum, S., & Shields, A., (2008). Electronic health records in ambulatory care—A national survey of physicians. New England Journal of Medicine, 359(1), 50–60. https://doi.org/10.1056/NEJMsa0802005

  2. Eichelberg, M., Aden, T., Riesmeier, J., Dogac, A., & Laleci, G. (2005). A survey and analysis of electronic healthcare record standards. ACM Computing Surveys (CSUR), 37(4), 277–315. https://doi.org/10.1145/1118890.1118891

    Article  Google Scholar 

  3. Vimercati, S. D. C., Foresti, S., Jajodia, S., Paraboschi, S., & Samarati, P. (2007). Over-encryption: Management of access control evolution on outsourced data. In Proceedings of the 33rd International Conference on Very Large Databases VLDB ’07 (pp. 123–134).

    Google Scholar 

  4. Benaloh, J., Chase, M., Horvitz, E., & Lauter, K. (2009). Patient controlled encryption: Ensuring privacy of electronic medical records. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security CCSW’09 (pp. 103–114). https://doi.org/10.1145/1655008.1655024

  5. Zhang, G., Liu, X., & Yang, Y. (2015). Time-series pattern based effective noise generation for privacy protection on cloud. IEEE Transactions on Computers, 64(5), 1456–1469. https://doi.org/10.1109/TC.2014.2298013

    Article  MathSciNet  Google Scholar 

  6. Silva, B. M., Rodrigues Joel, J. P. C., Canelo, F., Lopes, I. C., & Zhou, L. (2013). A data encryption solution for mobile health apps in cooperation environments. Journal of Medical Internet Research, 15(4), e66. https://doi.org/10.2196/jmir.2498. https://www.jmir.org/2013/4/e66/

  7. Tran, D. H., Hai-Long. N., Wei, Z., & Keong, N. W. (2011). Towards security in sharing data on cloud-based social networks. In 8th International Conference on Information, Communications and Signal Processing (ICICS), Singapore, 2011 (pp. 1–5).

    Google Scholar 

  8. Huda, M., Sonehara, N., & Yamada, S. (2009). A privacy management architecture for patient-controlled personal health record system. Journal of Engineering Science an Technology, 4(2), 154170.

    Google Scholar 

  9. Thilakanathan, D., Chen, S., Nepal, S., Calvo, R., & Alem, L. (2014). A platform for secure monitoring and sharing of generic health data in the Cloud. Future Generation Computer Systems, 35, 102–113. https://doi.org/10.1016/j.future.2013.09.011

    Article  Google Scholar 

  10. Karvelas, P. (2014). The Australian [May 26, 2015]. Australia's mental health system must become more efficient. http://www.theaustralian.com.au/national-affairs/policy/australias-mental-health-system-must-become-more-efficient/story-fn59nokw-1226850819260

  11. Li, W., Ni, W., & Liu, D. (2017). Fine-grained access control for personal health records in cloud computing (pp. 1278–1289). IEEE.

    Google Scholar 

  12. Saleem, S., Ullah, S., & Kwak, K. S. (2011). A study of IEEE 802.15.4 security framework for wireless body area networks. Sensors, 11(2), 1383–1395.

    Article  Google Scholar 

  13. Kumar, P., & Lee, H.-J. (2011). Security issues in healthcare applications using wireless medical sensor networks: A survey. Sensors, 12(1), 55–91.

    Article  Google Scholar 

  14. Gupta, L. (2014). ‘Security in low energy body area networks for healthcare. In Conference Proceedings.

    Google Scholar 

  15. Lovelit Jose, C. M., & Poovammmal, E. (2016). A survey on privacy preservation of healthcare data using cryptographic techniques. International Journal of Pharmacy & Technology, 8(4), 22322.

    Google Scholar 

  16. Rath, M., & Mishra, S. (2019). Advanced-level security in network and real-time applications using machine learning approaches. In Machine learning and cognitive science applications in cyber security (pp. 84–104). IGI Global.

    Google Scholar 

  17. Mishra, S., Sahoo, S., & Mishra, B. K. (2019). Addressing security issues and standards in Internet of things. In Emerging trends and applications in cognitive computing (pp. 224–257). IGI Global.

    Google Scholar 

  18. Kekgathetse, M. (2015). An evaluation of current computing research aimed at improving online security: Encryption.

    Google Scholar 

  19. Mehmood, Z., Ghani, A., Chen, G., & Alghamdi, A. S. (2019). Authentication and secure key management in e-health services: A robust and efficient protocol using biometrics. IEEE Access, 7, 113385–113397. [CrossRef]

    Google Scholar 

  20. Khezr, S., Yassine, M. A., & Benlamri, R. (2019). Blockchain technology in healthcare: A comprehensive review and directions for future research. Applied Sciences, 9, 1736. [CrossRef]

    Google Scholar 

  21. Mishra, S., Tripathy, N., Mishra, B. K., & Mahanty, C. (2019). Analysis of security issues in cloud environment. Security designs for the cloud, IoT, and social networking (pp. 19–41).

    Google Scholar 

  22. Li, H., Yang, Y., Dai, Y., Yu, S., & Xiang, Y. (2020). Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Transactions on Cloud Computing, 8, 484–494.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hrudaya Kumar Tripathy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Abhishek, Tripathy, H.K., Mishra, S. (2022). A Succinct Analytical Study of the Usability of Encryption Methods in Healthcare Data Security. In: Tripathy, B.K., Lingras, P., Kar, A.K., Chowdhary, C.L. (eds) Next Generation Healthcare Informatics. Studies in Computational Intelligence, vol 1039. Springer, Singapore. https://doi.org/10.1007/978-981-19-2416-3_7

Download citation

Publish with us

Policies and ethics