SlideShare a Scribd company logo
1 of 10
Download to read offline
Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 
A SYSTEMATIC LITERATURE REVIEW OF CLOUD 
COMPUTING IN EHEALTH 
Yan Hu and Guohua Bai 
Department of Creative Technologies, Blekinge Institute of Technology, Sweden 
ABSTRACT 
Cloud computing in eHealthis an emerging area for only few years. There needs to identify the state of the 
art and pinpoint challenges and possible directions for researchers and applications developers. Based on 
this need, we have conducted a systematic review of cloud computing in eHealth. We searched ACM 
Digital Library, IEEE Xplore, Inspec, ISI Web of Science and Springer as well as relevant open-access 
journals for relevant articles. A total of 237 studies were first searched, of which 44 papers met the Include 
Criteria. The studies identified three types of studied areas about cloud computing in eHealth, namely (1) 
cloud-based eHealth framework design (n=13);(2) applications of cloud computing (n=17); and (3) 
security or privacy control mechanisms of healthcare data in the cloud (n=14). Most of the studies in the 
review were about designs and concept-proof. Only very few studies have evaluated their research in the 
real world, which may indicate that the application of cloud computing in eHealth is still very immature. 
However, our presented review could pinpoint that a hybrid cloud platform with mixed access control and 
security protection mechanisms will be a main research area for developing citizen centred home-based 
healthcare applications. 
KEY WORDS 
Systematic review, eHealth, cloud computing, home-based healthcare 
1. INTRODUCTION 
This review examines existing researches on cloud-based eHealth solutions. The main goal is to 
identify the state of the art in this area and pinpoint challenges and possible directions for 
researchers and applications developers based on the current literatures. Though this studymay 
not able to specify thebenefits of using cloud technology in eHealth due to the progress in the area 
so far is made mostly in designs and concept-proof, not in real use context, we do, however, have 
identified some better ways of using cloud computing in eHealth. 
eHealthis defined as “the cost-effective and secure use of information and communications 
technologies in support of health and health-related fields, including healthcare services, 
health surveillance, health education, knowledge and research”.[1]The goal of eHealth is to 
improve the cooperation and coordination of healthcare, in order to improve the quality of care 
and reduce the cost of care at the same time. 
DOI: 10.5121/hiij.2014.3402 11
Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 
Cloud computing is a new technology which has emerged in the last five years. According to the 
definition by NIST, cloud computing is “a model can provide distributed, rapidly provisioned and 
configurable computing resources (such as servers, storage, applications, networks and other 
services), which are on-demand, rapid elastic and measured, to whom have network 
connections”.[2]Because of the obvious scalability, flexibility and availability at low cost of 
cloud services, there is a rapid trend of adopting cloud computing among enterprises or health-related 
12 
areas in the last few years. 
2. METHODS 
A systematic literature review requires a comprehensive and unbiased coverage of searched 
literatures. To maximise the coverage of our searched literatures, we started by identifying some 
of the most used alternative words/concepts and synonyms in the research questions.[3] We 
conducted first a manual search in the areas of related areas such as computer science and 
healthcare. The selected Databases are ACM Digital Library, IEEE Xplore, Inspec, ISI Web of 
Science and Springer. In order to cover more broad scope, open-access journals in the relevant 
areas were also included. We did not limit the publication year, since cloud computing was 
proposed only in the last five years. After general study of the related areas, the language of the 
papers was limited to English. The following search string was used to search the above 
mentioned databases: 
(Cloud)AND (eHealth OR "electronic health" OR e-health) 
The search string could be modified slightly when searching in different databases, since they 
have different rules for search strings. Our first search by the search string in all the mentioned 
databases produced 237 articles. In order to focus on the most relevant literatures, we conducted a 
primary evaluation based on reading the abstracts of all selected articles. The evaluation is based 
on the criteria described in Table 1. The inclusion criteria are applied independently for each 
author to select the relevant articles. This evaluation selected 44 articles for our thorough study, 
and all are included in the reference list. 
Table 1. Include and exclude criteria 
Include criteria Exclude criteria 
• Directly or indirectly 
related to both eHealth and 
cloud technology. 
• Cloud-based eHealth 
frameworks design. 
• Cloud computing solutions 
applied in healthcare. 
• Security and privacy 
mechanisms of healthcare 
data in cloud. 
• Written in English 
• Irrelevant to study of the cloud 
or eHealth. 
• Conceptual methods or 
cognitive introductions. 
• Review papers. 
• Business analysis reports. 
• Not written in English.
Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 
The quality of each paper was assessed by two authors mainly based on the Jovell and Navarro- 
Rubio system for classification from score 9 to 1 [4]. Guidelines for performing systematic 
literature reviews in related subject area[5] were followed for technology related issues. After 
include/exclude criteria and quality assessment criteria, a chosen set of papers was available for 
the data extraction process. In order to avoid the bias of subjective preference, we applied the 
method by which one researcher extracted the data and another checked the extraction. The 
Citation and Bibliography tool – Zotero – was used to manage all the extracted articles. 
13 
3. RESULTS 
After the steps of searching, evaluation and alternate reviews, 44 articles were finally selected 
from the total of 237 articles found from the first search. We believe the selected 44 articles can 
cover the basic view of the studied area of cloud computing in eHealth. Since both eHealth and 
cloud computing are emerging areas, the results of this study can offer the researchers up-to-date 
perspectives for their research. 
We found 19 countries where research articles were published on eHealth cloud computing. The 
largest number of articles were produced in the USA (n=14), followed by EU countries (n=11). 
We found relatively few papers in this new area produced in developing countries such as China 
(n=3), India (n=2) and UAE (n=3) (see Table 2). All papers we searched were published after 
2010, and this may indicate that research in cloud computing for healthcare is still an emerging 
area. Figure 1 shows the number of papers published across years in our searched results. 
Table 2. Countries conducting cloud-based eHealth researches 
Country No. of papers References 
USA 
Canada 
Australia 
UK 
UAE 
China 
Germany 
India 
France 
Croatia 
Italy 
Spain 
Sweden 
Netherland 
Bangladesh 
Puerto Rico 
Egypt 
Brazil 
14 
4 
3 
3 
3 
3 
2 
2 
1 
1 
1 
1 
1 
1 
1 
1 
1 
1 
7,11,13,17,18,20,25,29,30,32,35 
,41,43,45 
23,38,39,40 
20,44,48 
10,14,26 
8,21,33 
34,36,47 
46,49 
9,24 
42 
12 
15 
27 
19 
28 
37 
31 
16 
6
Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 
14 
3 
Number of papers 
5 
19 
17 
2010 2011 2012 2013 
Figure 1. Number of studies across years 
20 
15 
10 
5 
0 
In the following, we present some important findings from our study. The topics discussed in the 
reviewed articles are quite broad in relation to the use of cloud computing in eHealth domain. 
Generally, the topics can be classified into three categories: 1) Cloud-based eHealth framework 
design (n=13); 2) Applications of cloud computing in eHealth (n=17); and 3) Security or privacy 
control mechanisms of healthcare data in cloud (n=14). The distribution of the above topics is 
shown in Figure 2. 
Frameworks Applications 
Security issues 
2 
2 1 1 
9 
5 
0 
2010 2011 2012 2013 
Figure 2.Research type distributions. 
10 
8 
6 
4 
2 
0 
3.1 Discussion of the topics in the reviewed articles 
3.1.1Cloud-based eHealth framework design 
6 
5 
Since one of the most significant advantages of cloud computing is its huge data storage capacity, 
six papers proposed cloud-based frameworks for healthcare data sharing. One of the pioneers in 
this area, Rolim et al. [6] designed a framework for data collection by using sensors attached to 
medical equipment, and the collected data can be directly stored in a cloud, which can be 
accessed by authorised medical staff. Some studies[7][8][9] proposed a national level framework 
for eHealth based on cloud models. For example, Patra et al. [9] argued especially that their 
cloud-based solution on a national level would provide a cost effective way in dealing with 
patient information for rural areas. By encouraging people in rural areas to upload their personal 
healthcare information to the health cloud, the care providers can provide them with more correct 
healthcare services, such as remote diagnosis, supervision and emergency calls.
Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 
Other studies related to this category of framework design are more specific as regards 
application areas, such as the design of a Virtual Research Environment by both Simth et al.[10] 
and Regola et al.[11]; patients’ self-management by Martinovic et al.[12]; transition or 
standardisation of data stored in different EHR or PHR systems by Coats et al.[13]and Ekonomou 
et al.[14]; and designing a secure EHR framework [15][16][17][18]. 
15 
3.1.2.Applications of cloud computing 
High accessibility, availability and reliability make cloud computing a better solution for 
healthcare interoperability problems. Papers in this category mostly applied cloud technology for 
healthcare data sharing, processing and management, and can be categorised based on three types 
of cloud platforms, namely, public cloud, private cloud and hybrid cloud. 
Six papers presented their eHealth applications by using or testing in public clouds such as 
Google App Engine [19], Windows Azure[20][21] and Amazon EC2[22][23][24].The 
application[22] of Wooten et al. provided a patients-to-patients support and information sharing 
within patients community. The solution proposed by Benharref et al.[21] used the mobiles of 
seniors to send the patients’ data automatically to the cloud, and the patients themselves could 
decide with whom to share the data. Mohammed et al.[23]designed a Health Cloud Exchange 
(HCX) system which shares healthcare records between services and consumers with some 
privacy controls. 
For applications based on the private cloud, Bahga et al.[25] presented an achievement of sematic 
interoperability between different kinds of healthcare data, while DACRA[26] built a platform for 
interoperability on the syntax level. Vilaplana et al.[27]used queuing theory as the basic means to 
model the performance of an eHealth system based on the private cloud. Van Gorp et 
al.[28]applied virtualisation techniques to allow patients themselves to build their own lifelong 
PHRs. The PHR can then be shared with other stakeholders who are authorised and interested. 
Wu et al.[29]proposed an approach to EHR data schema composition with a broker based access 
control. In order to reduce the cost of adopting EHRs, HP published a cloud-based platform called 
Fusion[30]for securely managing and sharing healthcare information on large scale. Other studies 
also used the private cloud to integrate the EHR systems with other systems like healthcare billing 
system[31] and national law system[32]. 
Gul et al.[33] and Chen et al.[34]proposed a shared EHRs system based on hybrid cloud. In the 
proposed application of Chen et al.[34], the patient’s medical data are stored both in a hospital’s 
private cloud and public healthcare cloud. A mechanism is set up to make sure that the owners of 
the medical records can decide when their records should be protected in normal or emergency 
situation. Dixon et al.[35]implemented a community cloud-based exchange of clinical data 
between two disparate health care providers, which was mainly used by chronic disease 
healthcare. 
3.1.3.Security or privacy control mechanisms 
Healthcare data require protection for high security and privacy. Access control, an effective 
method to protect data, is widely used in many studies. Liu et al. [36] applied an identity based 
encryption (IBE) system in access control of PHR, and this identity-based cryptography system
Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 
can reduce the complexity of key management. Attribute based Encryption (ABE) is one of the 
most preferable encryption schemes used in cloud computing. For example, Fakhrul et al.[37] 
implemented Cipher text-Policy ABE in a security manager module to make it act as an 
administrative person; ESPAC[38] and Narayan et al.[39] proposed a patient-centric ABE access 
control scheme; and Aljumah et al.[40]designed an emergency mobile access to PHR cloud-based 
ABE. 
Three researches[41][42][43] mixed ABE and IBE to identify access on different levels (normal 
and emergency), which can handle more complex situations than a single scheme. Role based 
access control is based on ABE, which is an automatic procedure for authenticating healthcare 
user information and allocating corresponding role to guarantee all associated operations. Tong et 
al.[44]introduced a Cloud-based Privacy-aware Role Based Access Control model for 
controllability, traceability of data and authorised access to healthcare resources. Sharma et 
al.[45]developed an advanced role-based scheme called task based control to determine whether 
access should be granted to a healthcare cloud. 
Besides access control, several security protection techniques (Trusted Virtual domains[46], 
Watermarking method[47], Secure index implementation[48] and secret-sharing schemes[49]) 
were also introduced to maintain the high security and privacy of healthcare clouds. 
16 
4. DISCUSSIONS 
The presented review shows that cloud computing technology could be applied in several areas of 
the eHealth domain. The majority of studies introduced cloud computing technology as possible 
solutions for achieving eHealth interoperability. Although worldwide it is acknowledged that ICT 
technologies, such as cloud computing, can improve healthcare quality, most papers in this 
review are from developed countries. The present review does show, however, increasing studies 
from other developing countries. 
Almost all the studies suggest that due to the huge amount of patient health data, especially in the 
case of daily care, the cloud’s big data storage service provides a better way to store these data. 
The data can be shared among hospitals and third party research institutions or other healthcare 
organisations even on a national level. The huge data storage capacity of the cloud would help the 
development of big data mining in healthcare, as well as diagnosis and treatment. Pay-as-you-go 
mode of the cloud has significant economic strength, reducing cost for all healthcare 
organisations which would like to use cloud-based services. 
The patients-centric healthcare model will be a future trend where patients are active participants 
in their own healthcare. Some studies presented cloud-based patients-centric healthcare 
applications by the users-centric feature of cloud computing. This will not only encourage 
healthcare receivers to be involved in their own healthcare, but also the cloud-based healthcare 
platform will provide a technical solution and a social network. In addition, healthcare receivers’ 
participation constitutes an efficient healthcare education in terms of patient’s self-management. 
High accessibility and availability of the cloud could help the healthcare data stored in the cloud 
to be accessed at anytime and anywhere in the world. If healthcare receivers could make parts of
Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 
their healthcare data in public cloud open, which means that data can be “freely used, reused and 
redistributed by anyone – subject only, at most, to the requirement to attribute and 
sharelike.”[50]. When the open data become available in the public cloud, it can be processed by 
remote services, such as medical systems in hospital, clinic decision support systems, expert 
systems, or distributed to other medical personnel. Around one third of the studies also show that 
the security and privacy gaps of healthcare data in the cloud could be solved by access control 
encryption schemes and security protection techniques. This would make it possible to move 
current server-client based eHealth services to cloud-based eHealth services and make more 
contribution to improve the current healthcare by high-technologies. 
The present review also noted some challenges to using cloud computing in eHealth. Healthcare 
data contain sensitive information, and dealing with sensitive data in the cloud could lead to some 
legal issues. Besides, it is important to select cloud providers carefully to guarantee the 
confidentiality of healthcare data. 
Based on the review, we could find that a hybrid cloud model which contains access controls and 
security protection techniques would be a reliable solution. The EHRs in the hospitals and other 
healthcare centres could keep their data in private clouds, while patients’ daily self-management 
data could be published in a confident public cloud. Patients as the owner of their health data 
should decide who can access their data and the conditions for sharing. 
17 
5. LIMITATIONS 
The present review has certain limitations. The most obvious one is the external validity or 
generalizability. Since cloud computing is a relatively new technology, the number of published 
works for our review topic is not so large. In order to have a wider spectrum of studies, the 
selection rate is slightly higher. Since all the databases we used for searching articles contain 
some intelligent search techniques, we did not create as many synonyms of “eHealth” as we may 
do. This may have caused some data loss. Since cloud computing came after 2010, and most of 
the studies in this review are conference papers with concept-proof-designs. Only very few 
studies havebeen evaluated in the real world or tested by some technical experts. 
6. CONCLUSION 
Research on applying cloud computing technology to eHealth is in its early stages; most 
researchers have presented ideas without real-world cases validation. The obvious features of 
cloud computing technology provide more reasons to adopt cloud computing in sharing and 
managing health information. The main purpose of our review is to identify some challenges and 
feasible cloud-based solutions which can be applied in eHealth. The current review suggests that 
with the unique superiority of the cloud in big data storage and processing ability, a hybrid cloud 
platform with mixed access control and security protection mechanisms will be a main research 
area for developing citizen centred home-based healthcare system.
Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 
18 
REFERENCES 
[1] “WHO | E-Health,” WHO. [Online]. Available: http://www.who.int/trade/glossary/story021/en/. 
[Accessed: 09-Feb-2014]. 
[2] P. Mell and T. Grance, “The NIST definition of cloud computing,” Natl. Inst. Stand. Technol., vol. 
53, no. 6, p. 50, 2009. 
[3] W. Afzal, R. Torkar, and R. Feldt, “A systematic review of search-based testing for non-functional 
system properties,” Inf. Softw. Technol., vol. 51, no. 6, pp. 957–976, Jun. 2009. 
[4] A. Jovell and M. Navarro-Rubio, “Evaluation of scientific evidence,” Med. Clínica, vol. 105, no. 19, 
p. 740, 1995. 
[5] S. Keele, “Guidelines for performing Systematic Literature Reviews in Software Engineering,” EBSE 
Technical Report EBSE-2007-01, 2007. 
[6] C. O. Rolim, F. L. Koch, C. B. Westphall, J. Werner, A. Fracalossi, and G. S. Salvador, “A Cloud 
Computing Solution for Patient’s Data Collection in Health Care Institutions,” in 2010 Second 
International Conference on eHealth, Telemedicine, and Social Medicine (ETELEMED), 10-16 Feb. 
2010, 2010, pp. 95–9. 
[7] E. Hendrick, B. Schooley, and C. Gao, “CloudHealth: Developing a reliable cloud platform for 
healthcare applications,” in 2013 IEEE 10th Consumer Communications and Networking Conference, 
CCNC 2013, January 11, 2013 - January 14, 2013, 2013, pp. 887–891. 
[8] O. Gul, M. Al-Qutayri, C. Y. Yeun, and Q. H. Vu, “Framework of a national level electronic health 
record system,” in 2012 International Conference on Cloud Computing Technologies, Applications 
and Management (ICCCTAM), 2012, pp. 60–65. 
[9] M. R. Patra, R. K. Das, and R. P. Padhy, “CRHIS: Cloud Based Rural Healthcare Information 
System,” in Proceedings of the 6th International Conference on Theory and Practice of Electronic 
Governance, New York, NY, USA, 2012, pp. 402–405. 
[10] R. Smith, J. Xu, S. Hima, and O. Johnson, “Gateway to the Cloud - Case Study: A Privacy-Aware 
Environment for Electronic Health Records Research,” in 2013 IEEE 7th International Symposium on 
Service Oriented System Engineering (SOSE), 2013, pp. 292–297. 
[11] N. Regola and N. V. Chawla, “Storing and Using Health Data in a Virtual Private Cloud,” J. Med. 
Internet Res., vol. 15, no. 3, p. e63, Mar. 2013. 
[12] G. Martinovic and B. Zoric, “E-health Framework Based on Autonomic Cloud Computing,” in 2012 
Second International Conference on Cloud and Green Computing (CGC), 2012, pp. 214–218. 
[13] B. Coats and S. Acharya, “Achieving electronic health record access from the cloud,” in Human- 
Computer Interaction: Applications and Services. 15th International Conference, HCI International 
2013, 21-26 July 2013, 2013, vol. pt. II, pp. 26–35. 
[14] E. Ekonomou, L. Fan, W. Buchanan, and C. Thuemmler, “An integrated cloud-based healthcare 
infrastructure,” in 2011 3rd IEEE International Conference on Cloud Computing Technology and 
Science, CloudCom 2011, November 29, 2011 - December 1, 2011, 2011, pp. 532–536. 
[15] F. Amato, A. Mazzeo, V. Moscato, and A. Picariello, “A Framework for Semantic Interoperability 
over the Cloud,” in 2013 Workshops of 27th International Conference on Advanced Information 
Networking and Applications (WAINA), 25-28 March 2013, 2013, pp. 1259–64. 
[16] A. S. Radwan, A. A. Abdel-Hamid, and Y. Hanafy, “Cloud-based service for secure electronic 
medical record exchange,” in 2012 22nd International Conference on Computer Theory and 
Applications, ICCTA 2012, October 13, 2012 - October 15, 2012, 2012, pp. 94–103. 
[17] S. Alshehri, S. P. Radziszowski, and R. K. Raj, “Secure access for healthcare data in the cloud using 
ciphertext-policy attribute-based encryption,” in 2012 IEEE International Conference on Data 
Engineering Workshops (ICDEW 2012), 1-5 April 2012, 2012, pp. 143–6. 
[18] F. Rahman, S. I. Ahamed, Ji-Jiang Yang, and Qing Wang, “PriGen: a Generic Framework to Preserve 
Privacy of Healthcare Data in the Cloud,” in Inclusive Society: Health and Wellbeing in the
Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 
Community, and Care at Home. 11th International Conference on Smart Homes and Health 
Telematics, ICOST 2013, 19-21 June 2013, 2013, pp. 77–85. 
[19] Y. Hu, F. Lu, I. Khan, and G. Bai, “A cloud computing solution for sharing healthcare information,” 
in Internet Technology And Secured Transactions, 2012 International Conferece For, 2012, pp. 465– 
470. 
[20] Shilin Lu, R. Ranjan, and P. Strazdins, “Reporting an Experience on Design and Implementation of e- 
Health Systems on Azure Cloud,” in Internet and Distributed Computing Systems. 6th International 
Conference, IDCS 2013, 28-30 Oct. 2013, 2013, pp. 145–59. 
[21] A. Benharref and M. A. Serhani, “Novel Cloud and SOA-based Framework for E-health Monitoring 
19 
Using Wireless Biosensors,” IEEE J. Biomed. Health Inform., vol. 18, no. 1, pp. 46–55, Jan. 2014. 
[22] R. Wooten, R. Klink, F. Sinek, Y. Bai, and M. Sharma, “Design and implementation of a secure 
healthcare social cloud system,” in 12th IEEE/ACM International Symposium on Cluster, Cloud and 
Grid Computing, CCGrid 2012, May 13, 2012 - May 16, 2012, 2012, pp. 805–810. 
[23] S. Mohammed, D. Servos, and J. Fiaidhi, “Developing a Secure Distributed OSGi Cloud Computing 
Infrastructure for Sharing Health Records,” in Autonomous and Intelligent Systems. Second 
International Conference, AIS 2011, 22-24 June 2011, 2011, pp. 241–52. 
[24] G. S. Bhange and S. R. Hiray, “Dental Patient Records Maintenance on Cloud Computing Using Data 
Protection Model,” in Proceedings of the CUBE International Information Technology Conference, 
New York, NY, USA, 2012, pp. 526–531. 
[25] A. Bahga and V. K. Madisetti, “A Cloud-based Approach for Interoperable Electronic Health Records 
(EHRs),” IEEE J. Biomed. Health Inform., vol. 17, no. 5, pp. 894–906, Sep. 2013. 
[26] L. Fan, W. Buchanan, C. Thummler, O. Lo, A. Khedim, O. Uthmani, A. Lawson, and D. Bell, 
“DACAR Platform for eHealth Services Cloud,” in 2011 IEEE International Conference on Cloud 
Computing (CLOUD), 2011, pp. 219–226. 
[27] J. Vilaplana, F. Solsona, F. Abella, R. Filgueira, and J. Rius, “The cloud paradigm applied to e- 
Health,” BMC Med. Inform. Decis. Mak., vol. 13, no. 1, p. 35, Mar. 2013. 
[28] P. Van Gorp and M. Comuzzi, “Lifelong Personal Health Data and Application Software via Virtual 
Machines in the Cloud,” IEEE J. Biomed. Health Inform., vol. 18, no. 1, pp. 36–45, Jan. 2014. 
[29] Ruoyu Wu, Gail-Joon Ahn, and Hongxin Hu, “Secure sharing of electronic health records in clouds,” 
in 2012 8th International Conference on Collaborative Computing: Networking, Applications and 
Worksharing (CollaborateCom 2012), 14-17 Oct. 2012, 2012, pp. 711–18. 
[30] S. Basu, A. H. Karp, Jun Li, J. Pruyne, J. Rolia, S. Singhal, J. Suermondt, and R. Swaminathan, 
“Fusion: Managing Healthcare Records at Cloud Scale,” Computer, vol. 45, no. 11, pp. 42–9, Nov. 
2012. 
[31] M. Rodriguez-Martinez, H. Valdivia, J. Rivera, J. Seguel, and M. Greer, “MedBook: A cloud-based 
healthcare billing and record management system,” in 2012 IEEE 5th International Conference on 
Cloud Computing, CLOUD 2012, June 24, 2012 - June 29, 2012, 2012, pp. 899–905. 
[32] Ruoyu Wu, Gail-Joon Ahn, and Hongxin Hu, “Towards HIPAA-Compliant Healthcare Systems in 
Cloud Computing,” Int. J. Comput. Models Algorithms Med., vol. 3, no. 2, pp. 1–22, Apr. 2012. 
[33] O. Gul, M. Al-Qutayri, Q. H. Vu, and C. Y. Yeun, “Data integration of electronic health records using 
Artificial Neural Networks,” in 7th International Conference for Internet Technology and Secured 
Transactions, ICITST 2012, December 10, 2012 - December 12, 2012, 2012, pp. 313–317. 
[34] Yu-Yi Chen, Jun-Chao Lu, and Jinn-Ke Jan, “A Secure EHR System Based on Hybrid Clouds,” J. 
Med. Syst., vol. 36, no. 5, pp. 3375–84, Oct. 2012. 
[35] B. E. Dixon, L. Simonaitis, H. S. Goldberg, M. D. Paterno, M. Schaeffer, T. Hongsermeier, A. 
Wright, and B. Middleton, “A pilot study of distributed knowledge management and clinical decision 
support in the cloud,” Artif. Intell. Med., vol. 59, no. 1, pp. 45–53, Sep. 2013. 
[36] Chia-Hui Liu, Fong-Qi Lin, Dai-Lun Chiang, Tzer-Long Chen, Chin-Sheng Chen, Han-Yu Lin, Yu- 
Fang Chung, and Tzer-Shyong Chen, “Secure PHR Access Control Scheme for Healthcare 
Application Clouds,” in 2013 42nd International Conference on Parallel Processing (ICPP), 1-4 Oct. 
2013, 2013, pp. 1067–76.
Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 
[37] M. FakhrulAlamOnik, K. Anam, S. Sabir Salman - Al - Musawi, and N. Rashid, “A Secured Cloud 
based Health Care Data Management System,” Int. J. Comput. Appl., vol. 49, no. 12, pp. 24–30, Jul. 
2012. 
[38] M. Barua, X. Liang, R. Lu, and X. Shen, “ESPAC: Enabling Security and Patient-centric Access 
20 
Control for eHealth in cloud computing,” Int. J. Secur. Netw., vol. 6, no. 2, pp. 67–76, Jan. 2011. 
[39] S. Narayan, M. Gagné, and R. Safavi-Naini, “Privacy preserving EHR system using attribute-based 
infrastructure,” in Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 
New York, NY, USA, 2010, pp. 47–52. 
[40] F. Aljumah, R. H. M. Leung, M. Pourzandi, and M. Debbabi, “Emergency mobile access to personal 
health records stored on an untrusted cloud,” in 2nd International Conference on Health Information 
Science, HIS 2013, March 25, 2013 - March 27, 2013, 2013, vol. 7798 LNCS, pp. 30–41. 
[41] Jie Huang, M. Sharaf, and Chin-Tser Huang, “A Hierarchical Framework for Secure and Scalable 
EHR Sharing and Access Control in Multi-cloud,” in 2012 41st International Conference on Parallel 
Processing Workshops (ICPPW 2012), 10-13 Sept. 2012, 2012, pp. 279–87. 
[42] A. Lounis, A. Hadjidj, A. Bouabdallah, and Y. Challal, “Secure and scalable cloud-based architecture 
for e-Health wireless sensor networks,” in 2012 21st International Conference on Computer 
Communications and Networks, ICCCN 2012, July 30, 2012 - August 2, 2012, 2012, p. IEEE; IEEE 
Communication Society; U.S. National Science Foundation (NSF); City Mayor of Munich. 
[43] Yue Tong, Jinyuan Sun, S. S. M. Chow, and Pan Li, “Towards auditable cloud-assisted access of 
encrypted health data,” in 2013 IEEE Conference on Communications and Network Security (CNS), 
14-16 Oct. 2013, 2013, pp. 514–19. 
[44] L. Chen and D. B. Hoang, “Novel data protection model in healthcare cloud,” in 13th IEEE 
International Workshop on FTDCS 2011, the 8th International Conference on ATC 2011, the 8th 
International Conference on UIC 2011 and the 13th IEEE International Conference on HPCC 2011, 
September 2, 2011 - September 4, 2011, 2011, pp. 550–555. 
[45] M. Sharma, Y. Bai, S. Chung, and L. Dai, “Using Risk in Access Control for Cloud-Assisted 
eHealth,” in 2012 IEEE 14th International Conference on High Performance Computing and 
Communication 2012 IEEE 9th International Conference on Embedded Software and Systems 
(HPCC-ICESS), 2012, pp. 1047–1052. 
[46] H. Löhr, A.-R. Sadeghi, and M. Winandy, “Securing the e-health cloud,” in Proceedings of the 1st 
ACM International Health Informatics Symposium, New York, NY, USA, 2010, pp. 220–229. 
[47] Zhiwei Yu, C. Thomborson, Chaokun Wang, Jianmin Wang, and Rui Li, “A cloud-based 
watermarking method for health data security,” in 2012 International Conference on High 
Performance Computing & Simulation (HPCS 2012), 2-6 July 2012, 2012, pp. 642–7. 
[48] A. Alabdulatif, I. Khalil, and V. Mai, “Protection of electronic health records (EHRs) in cloud,” in 
2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology 
Society (EMBC), 3-7 July 2013, 2013, pp. 4191–4. 
[49] T. Ermakova and B. Fabian, “Secret sharing for health data in multi-provider clouds,” in 2013 IEEE 
15th Conference on Business Informatics (CBI), 15-18 July 2013, 2013, pp. 93–100. 
[50] “What is Open Data? — Open Data Handbook.” [Online]. Available: 
http://opendatahandbook.org/en/what-is-open-data/. [Accessed: 04-May-2014].

More Related Content

What's hot

Careers in bioinformatics
Careers in bioinformaticsCareers in bioinformatics
Careers in bioinformaticsentranzz123
 
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...IRJET Journal
 
Impacts of mobile devices in medical environment
Impacts of mobile devices in medical environmentImpacts of mobile devices in medical environment
Impacts of mobile devices in medical environmentLucas Machado
 
Disease prediction in big data healthcare using extended convolutional neural...
Disease prediction in big data healthcare using extended convolutional neural...Disease prediction in big data healthcare using extended convolutional neural...
Disease prediction in big data healthcare using extended convolutional neural...IJAAS Team
 
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User BehaviorIRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User BehaviorIRJET Journal
 
T OP K-O PINION D ECISIONS R ETRIEVAL IN H EALTHCARE S YSTEM
T OP  K-O PINION  D ECISIONS  R ETRIEVAL IN  H EALTHCARE  S YSTEM T OP  K-O PINION  D ECISIONS  R ETRIEVAL IN  H EALTHCARE  S YSTEM
T OP K-O PINION D ECISIONS R ETRIEVAL IN H EALTHCARE S YSTEM csandit
 
ONTOLOGY-DRIVEN INFORMATION RETRIEVAL FOR HEALTHCARE INFORMATION SYSTEM : ...
ONTOLOGY-DRIVEN INFORMATION RETRIEVAL  FOR HEALTHCARE INFORMATION SYSTEM :   ...ONTOLOGY-DRIVEN INFORMATION RETRIEVAL  FOR HEALTHCARE INFORMATION SYSTEM :   ...
ONTOLOGY-DRIVEN INFORMATION RETRIEVAL FOR HEALTHCARE INFORMATION SYSTEM : ...IJNSA Journal
 
Selection of Articles using Data Analytics for Behavioral Dissertation Resear...
Selection of Articles using Data Analytics for Behavioral Dissertation Resear...Selection of Articles using Data Analytics for Behavioral Dissertation Resear...
Selection of Articles using Data Analytics for Behavioral Dissertation Resear...PhD Assistance
 
MitoGame: Gamification Method for Detecting Mitosis from Histopathological I...
MitoGame:  Gamification Method for Detecting Mitosis from Histopathological I...MitoGame:  Gamification Method for Detecting Mitosis from Histopathological I...
MitoGame: Gamification Method for Detecting Mitosis from Histopathological I...IRJET Journal
 
Estimating the Statistical Significance of Classifiers used in the Predictio...
Estimating the Statistical Significance of Classifiers used in the  Predictio...Estimating the Statistical Significance of Classifiers used in the  Predictio...
Estimating the Statistical Significance of Classifiers used in the Predictio...IOSR Journals
 
Ontology based clustering in research project
Ontology based clustering in research projectOntology based clustering in research project
Ontology based clustering in research projecteSAT Publishing House
 
Development and Problems in the Field of Medical Information Reporting
Development and Problems in the Field of Medical Information ReportingDevelopment and Problems in the Field of Medical Information Reporting
Development and Problems in the Field of Medical Information ReportingYogeshIJTSRD
 
DATA MINING METHODOLOGIES TO STUDY STUDENT'S ACADEMIC PERFORMANCE USING THE...
DATA MINING METHODOLOGIES TO  STUDY STUDENT'S ACADEMIC  PERFORMANCE USING THE...DATA MINING METHODOLOGIES TO  STUDY STUDENT'S ACADEMIC  PERFORMANCE USING THE...
DATA MINING METHODOLOGIES TO STUDY STUDENT'S ACADEMIC PERFORMANCE USING THE...ijcsa
 
A Review of Intelligent Agent Systems in Animal Health Care
A Review of Intelligent Agent Systems in Animal Health CareA Review of Intelligent Agent Systems in Animal Health Care
A Review of Intelligent Agent Systems in Animal Health CareIJCSIS Research Publications
 
The trend analysis of the level of fin metrics and e-stat tools for research ...
The trend analysis of the level of fin metrics and e-stat tools for research ...The trend analysis of the level of fin metrics and e-stat tools for research ...
The trend analysis of the level of fin metrics and e-stat tools for research ...Alexander Decker
 

What's hot (17)

Careers in bioinformatics
Careers in bioinformaticsCareers in bioinformatics
Careers in bioinformatics
 
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...
 
Impacts of mobile devices in medical environment
Impacts of mobile devices in medical environmentImpacts of mobile devices in medical environment
Impacts of mobile devices in medical environment
 
Understandable data-efficient AI
Understandable data-efficient AIUnderstandable data-efficient AI
Understandable data-efficient AI
 
Disease prediction in big data healthcare using extended convolutional neural...
Disease prediction in big data healthcare using extended convolutional neural...Disease prediction in big data healthcare using extended convolutional neural...
Disease prediction in big data healthcare using extended convolutional neural...
 
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User BehaviorIRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
 
T OP K-O PINION D ECISIONS R ETRIEVAL IN H EALTHCARE S YSTEM
T OP  K-O PINION  D ECISIONS  R ETRIEVAL IN  H EALTHCARE  S YSTEM T OP  K-O PINION  D ECISIONS  R ETRIEVAL IN  H EALTHCARE  S YSTEM
T OP K-O PINION D ECISIONS R ETRIEVAL IN H EALTHCARE S YSTEM
 
ONTOLOGY-DRIVEN INFORMATION RETRIEVAL FOR HEALTHCARE INFORMATION SYSTEM : ...
ONTOLOGY-DRIVEN INFORMATION RETRIEVAL  FOR HEALTHCARE INFORMATION SYSTEM :   ...ONTOLOGY-DRIVEN INFORMATION RETRIEVAL  FOR HEALTHCARE INFORMATION SYSTEM :   ...
ONTOLOGY-DRIVEN INFORMATION RETRIEVAL FOR HEALTHCARE INFORMATION SYSTEM : ...
 
Selection of Articles using Data Analytics for Behavioral Dissertation Resear...
Selection of Articles using Data Analytics for Behavioral Dissertation Resear...Selection of Articles using Data Analytics for Behavioral Dissertation Resear...
Selection of Articles using Data Analytics for Behavioral Dissertation Resear...
 
MitoGame: Gamification Method for Detecting Mitosis from Histopathological I...
MitoGame:  Gamification Method for Detecting Mitosis from Histopathological I...MitoGame:  Gamification Method for Detecting Mitosis from Histopathological I...
MitoGame: Gamification Method for Detecting Mitosis from Histopathological I...
 
Estimating the Statistical Significance of Classifiers used in the Predictio...
Estimating the Statistical Significance of Classifiers used in the  Predictio...Estimating the Statistical Significance of Classifiers used in the  Predictio...
Estimating the Statistical Significance of Classifiers used in the Predictio...
 
[IJCT-V3I3P1] Authors: Sunny Sharma, Karandeep Kaur, Amritpal Singh
[IJCT-V3I3P1] Authors: Sunny Sharma, Karandeep Kaur, Amritpal Singh[IJCT-V3I3P1] Authors: Sunny Sharma, Karandeep Kaur, Amritpal Singh
[IJCT-V3I3P1] Authors: Sunny Sharma, Karandeep Kaur, Amritpal Singh
 
Ontology based clustering in research project
Ontology based clustering in research projectOntology based clustering in research project
Ontology based clustering in research project
 
Development and Problems in the Field of Medical Information Reporting
Development and Problems in the Field of Medical Information ReportingDevelopment and Problems in the Field of Medical Information Reporting
Development and Problems in the Field of Medical Information Reporting
 
DATA MINING METHODOLOGIES TO STUDY STUDENT'S ACADEMIC PERFORMANCE USING THE...
DATA MINING METHODOLOGIES TO  STUDY STUDENT'S ACADEMIC  PERFORMANCE USING THE...DATA MINING METHODOLOGIES TO  STUDY STUDENT'S ACADEMIC  PERFORMANCE USING THE...
DATA MINING METHODOLOGIES TO STUDY STUDENT'S ACADEMIC PERFORMANCE USING THE...
 
A Review of Intelligent Agent Systems in Animal Health Care
A Review of Intelligent Agent Systems in Animal Health CareA Review of Intelligent Agent Systems in Animal Health Care
A Review of Intelligent Agent Systems in Animal Health Care
 
The trend analysis of the level of fin metrics and e-stat tools for research ...
The trend analysis of the level of fin metrics and e-stat tools for research ...The trend analysis of the level of fin metrics and e-stat tools for research ...
The trend analysis of the level of fin metrics and e-stat tools for research ...
 

Viewers also liked

Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computingSuranga Nisiwasala
 
Ranking the micro level critical factors of electronic medical records adopti...
Ranking the micro level critical factors of electronic medical records adopti...Ranking the micro level critical factors of electronic medical records adopti...
Ranking the micro level critical factors of electronic medical records adopti...hiij
 
THE 4 R’S – REASON, REDCAP, REVIEW AND RESEARCH - IN A LARGE HEALTHCARE ORGAN...
THE 4 R’S – REASON, REDCAP, REVIEW AND RESEARCH - IN A LARGE HEALTHCARE ORGAN...THE 4 R’S – REASON, REDCAP, REVIEW AND RESEARCH - IN A LARGE HEALTHCARE ORGAN...
THE 4 R’S – REASON, REDCAP, REVIEW AND RESEARCH - IN A LARGE HEALTHCARE ORGAN...hiij
 
Understanding your website visitors
Understanding your website visitorsUnderstanding your website visitors
Understanding your website visitorsNick Leech
 
Copyrights & education r3
Copyrights & education r3Copyrights & education r3
Copyrights & education r3ajethridge
 
Каталог 16 2014
Каталог 16 2014Каталог 16 2014
Каталог 16 2014j_barinova
 
3. pengumuman lelang batik kain rev.2014
3. pengumuman lelang batik kain rev.20143. pengumuman lelang batik kain rev.2014
3. pengumuman lelang batik kain rev.2014Fawwaz Akif
 
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEW
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEWINTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEW
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEWhiij
 
Initial test eso
Initial test esoInitial test eso
Initial test esoAngel Leon
 
The impacts of lifestyle behavior on
The impacts of lifestyle behavior onThe impacts of lifestyle behavior on
The impacts of lifestyle behavior onhiij
 
Oyama tea anti oksidant
Oyama tea anti oksidantOyama tea anti oksidant
Oyama tea anti oksidantBagus Widodo
 
Uts miicrc sector sustainability
Uts miicrc sector sustainabilityUts miicrc sector sustainability
Uts miicrc sector sustainabilityUTSBusinessSchool
 

Viewers also liked (17)

Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
Ranking the micro level critical factors of electronic medical records adopti...
Ranking the micro level critical factors of electronic medical records adopti...Ranking the micro level critical factors of electronic medical records adopti...
Ranking the micro level critical factors of electronic medical records adopti...
 
THE 4 R’S – REASON, REDCAP, REVIEW AND RESEARCH - IN A LARGE HEALTHCARE ORGAN...
THE 4 R’S – REASON, REDCAP, REVIEW AND RESEARCH - IN A LARGE HEALTHCARE ORGAN...THE 4 R’S – REASON, REDCAP, REVIEW AND RESEARCH - IN A LARGE HEALTHCARE ORGAN...
THE 4 R’S – REASON, REDCAP, REVIEW AND RESEARCH - IN A LARGE HEALTHCARE ORGAN...
 
Understanding your website visitors
Understanding your website visitorsUnderstanding your website visitors
Understanding your website visitors
 
ใบงาน3
ใบงาน3ใบงาน3
ใบงาน3
 
Copyrights & education r3
Copyrights & education r3Copyrights & education r3
Copyrights & education r3
 
ใบงานท 10
ใบงานท   10ใบงานท   10
ใบงานท 10
 
Каталог 16 2014
Каталог 16 2014Каталог 16 2014
Каталог 16 2014
 
3. pengumuman lelang batik kain rev.2014
3. pengumuman lelang batik kain rev.20143. pengumuman lelang batik kain rev.2014
3. pengumuman lelang batik kain rev.2014
 
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEW
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEWINTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEW
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEW
 
Triple jump
Triple jumpTriple jump
Triple jump
 
Initial test eso
Initial test esoInitial test eso
Initial test eso
 
The impacts of lifestyle behavior on
The impacts of lifestyle behavior onThe impacts of lifestyle behavior on
The impacts of lifestyle behavior on
 
Oyama tea anti oksidant
Oyama tea anti oksidantOyama tea anti oksidant
Oyama tea anti oksidant
 
Sap 0 rkom
Sap 0 rkomSap 0 rkom
Sap 0 rkom
 
Volunteers
VolunteersVolunteers
Volunteers
 
Uts miicrc sector sustainability
Uts miicrc sector sustainabilityUts miicrc sector sustainability
Uts miicrc sector sustainability
 

Similar to A systematic literature review of cloud

A Systematic Literature Review of Cloud Computing in Ehealth
A Systematic Literature Review of Cloud Computing in Ehealth A Systematic Literature Review of Cloud Computing in Ehealth
A Systematic Literature Review of Cloud Computing in Ehealth hiij
 
COVID-19 knowledge-based system for diagnosis in Iraq using IoT environment
COVID-19 knowledge-based system for diagnosis in Iraq using IoT environmentCOVID-19 knowledge-based system for diagnosis in Iraq using IoT environment
COVID-19 knowledge-based system for diagnosis in Iraq using IoT environmentnooriasukmaningtyas
 
Enhancing healthcare services through cloud service: a systematic review
Enhancing healthcare services through cloud service: a systematic reviewEnhancing healthcare services through cloud service: a systematic review
Enhancing healthcare services through cloud service: a systematic reviewIJECEIAES
 
Fog_Computing_in_Healthcare_Systematic_Review.pdf
Fog_Computing_in_Healthcare_Systematic_Review.pdfFog_Computing_in_Healthcare_Systematic_Review.pdf
Fog_Computing_in_Healthcare_Systematic_Review.pdfengdlshadfm
 
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEW
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEWINTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEW
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEWhiij
 
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEW
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEWINTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEW
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEWhiij
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
 
PREDICTIVE ANALYTICS IN HEALTHCARE SYSTEM USING DATA MINING TECHNIQUES
PREDICTIVE ANALYTICS IN HEALTHCARE SYSTEM USING DATA MINING TECHNIQUESPREDICTIVE ANALYTICS IN HEALTHCARE SYSTEM USING DATA MINING TECHNIQUES
PREDICTIVE ANALYTICS IN HEALTHCARE SYSTEM USING DATA MINING TECHNIQUEScscpconf
 
An Overview on the Use of Data Mining and Linguistics Techniques for Building...
An Overview on the Use of Data Mining and Linguistics Techniques for Building...An Overview on the Use of Data Mining and Linguistics Techniques for Building...
An Overview on the Use of Data Mining and Linguistics Techniques for Building...ijcsit
 
Intelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIntelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIRJET Journal
 
Interenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare NetworkInterenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare NetworkIstabraq M. Al-Joboury
 
NATIONAL CULTURAL DIMENSIONS AND ELECTRONIC CLINICAL RECORDS ACCEPTANCE: AN E...
NATIONAL CULTURAL DIMENSIONS AND ELECTRONIC CLINICAL RECORDS ACCEPTANCE: AN E...NATIONAL CULTURAL DIMENSIONS AND ELECTRONIC CLINICAL RECORDS ACCEPTANCE: AN E...
NATIONAL CULTURAL DIMENSIONS AND ELECTRONIC CLINICAL RECORDS ACCEPTANCE: AN E...IJMIT JOURNAL
 
Digitalization Capacity for Knowledge Acquisition-Learning from Health Monito...
Digitalization Capacity for Knowledge Acquisition-Learning from Health Monito...Digitalization Capacity for Knowledge Acquisition-Learning from Health Monito...
Digitalization Capacity for Knowledge Acquisition-Learning from Health Monito...shengjing 孙胜晶
 
Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Luis Felipe Tabares Pérez
 
Application Evaluation Project Part 1 Evaluation Plan FocusTec.docx
Application Evaluation Project Part 1 Evaluation Plan FocusTec.docxApplication Evaluation Project Part 1 Evaluation Plan FocusTec.docx
Application Evaluation Project Part 1 Evaluation Plan FocusTec.docxalfredai53p
 
Rule-based Information Extraction for Airplane Crashes Reports
Rule-based Information Extraction for Airplane Crashes ReportsRule-based Information Extraction for Airplane Crashes Reports
Rule-based Information Extraction for Airplane Crashes ReportsCSCJournals
 
Review on Medical Reports Extraction and Storage in EHR systems
Review on Medical Reports Extraction and Storage in EHR systemsReview on Medical Reports Extraction and Storage in EHR systems
Review on Medical Reports Extraction and Storage in EHR systemsIRJET Journal
 
Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Ivan Mauricio Cabezas Troyano
 
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVE
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVECRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVE
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVEIJNSA Journal
 

Similar to A systematic literature review of cloud (20)

A Systematic Literature Review of Cloud Computing in Ehealth
A Systematic Literature Review of Cloud Computing in Ehealth A Systematic Literature Review of Cloud Computing in Ehealth
A Systematic Literature Review of Cloud Computing in Ehealth
 
COVID-19 knowledge-based system for diagnosis in Iraq using IoT environment
COVID-19 knowledge-based system for diagnosis in Iraq using IoT environmentCOVID-19 knowledge-based system for diagnosis in Iraq using IoT environment
COVID-19 knowledge-based system for diagnosis in Iraq using IoT environment
 
Enhancing healthcare services through cloud service: a systematic review
Enhancing healthcare services through cloud service: a systematic reviewEnhancing healthcare services through cloud service: a systematic review
Enhancing healthcare services through cloud service: a systematic review
 
Fog_Computing_in_Healthcare_Systematic_Review.pdf
Fog_Computing_in_Healthcare_Systematic_Review.pdfFog_Computing_in_Healthcare_Systematic_Review.pdf
Fog_Computing_in_Healthcare_Systematic_Review.pdf
 
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEW
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEWINTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEW
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEW
 
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEW
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEWINTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEW
INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEW
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
PREDICTIVE ANALYTICS IN HEALTHCARE SYSTEM USING DATA MINING TECHNIQUES
PREDICTIVE ANALYTICS IN HEALTHCARE SYSTEM USING DATA MINING TECHNIQUESPREDICTIVE ANALYTICS IN HEALTHCARE SYSTEM USING DATA MINING TECHNIQUES
PREDICTIVE ANALYTICS IN HEALTHCARE SYSTEM USING DATA MINING TECHNIQUES
 
An Overview on the Use of Data Mining and Linguistics Techniques for Building...
An Overview on the Use of Data Mining and Linguistics Techniques for Building...An Overview on the Use of Data Mining and Linguistics Techniques for Building...
An Overview on the Use of Data Mining and Linguistics Techniques for Building...
 
Intelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIntelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosis
 
Ijetcas14 438
Ijetcas14 438Ijetcas14 438
Ijetcas14 438
 
Interenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare NetworkInterenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare Network
 
NATIONAL CULTURAL DIMENSIONS AND ELECTRONIC CLINICAL RECORDS ACCEPTANCE: AN E...
NATIONAL CULTURAL DIMENSIONS AND ELECTRONIC CLINICAL RECORDS ACCEPTANCE: AN E...NATIONAL CULTURAL DIMENSIONS AND ELECTRONIC CLINICAL RECORDS ACCEPTANCE: AN E...
NATIONAL CULTURAL DIMENSIONS AND ELECTRONIC CLINICAL RECORDS ACCEPTANCE: AN E...
 
Digitalization Capacity for Knowledge Acquisition-Learning from Health Monito...
Digitalization Capacity for Knowledge Acquisition-Learning from Health Monito...Digitalization Capacity for Knowledge Acquisition-Learning from Health Monito...
Digitalization Capacity for Knowledge Acquisition-Learning from Health Monito...
 
Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...
 
Application Evaluation Project Part 1 Evaluation Plan FocusTec.docx
Application Evaluation Project Part 1 Evaluation Plan FocusTec.docxApplication Evaluation Project Part 1 Evaluation Plan FocusTec.docx
Application Evaluation Project Part 1 Evaluation Plan FocusTec.docx
 
Rule-based Information Extraction for Airplane Crashes Reports
Rule-based Information Extraction for Airplane Crashes ReportsRule-based Information Extraction for Airplane Crashes Reports
Rule-based Information Extraction for Airplane Crashes Reports
 
Review on Medical Reports Extraction and Storage in EHR systems
Review on Medical Reports Extraction and Storage in EHR systemsReview on Medical Reports Extraction and Storage in EHR systems
Review on Medical Reports Extraction and Storage in EHR systems
 
Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...
 
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVE
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVECRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVE
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVE
 

More from hiij

Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)hiij
 
Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)hiij
 
Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)hiij
 
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...hiij
 
Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)hiij
 
AUTOMATIC AND NON-INVASIVE CONTINUOUS GLUCOSE MONITORING IN PAEDIATRIC PATIENTS
AUTOMATIC AND NON-INVASIVE CONTINUOUS GLUCOSE MONITORING IN PAEDIATRIC PATIENTSAUTOMATIC AND NON-INVASIVE CONTINUOUS GLUCOSE MONITORING IN PAEDIATRIC PATIENTS
AUTOMATIC AND NON-INVASIVE CONTINUOUS GLUCOSE MONITORING IN PAEDIATRIC PATIENTShiij
 
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMSINTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMShiij
 
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...hiij
 
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMSINTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMShiij
 
Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)hiij
 
The Proposed Guidelines for Cloud Computing Migration for South African Rural...
The Proposed Guidelines for Cloud Computing Migration for South African Rural...The Proposed Guidelines for Cloud Computing Migration for South African Rural...
The Proposed Guidelines for Cloud Computing Migration for South African Rural...hiij
 
SUPPORTING LARGE-SCALE NUTRITION ANALYSIS BASED ON DIETARY SURVEY DATA
SUPPORTING LARGE-SCALE NUTRITION ANALYSIS BASED ON DIETARY SURVEY DATASUPPORTING LARGE-SCALE NUTRITION ANALYSIS BASED ON DIETARY SURVEY DATA
SUPPORTING LARGE-SCALE NUTRITION ANALYSIS BASED ON DIETARY SURVEY DATAhiij
 
AN EHEALTH ADOPTION FRAMEWORK FOR DEVELOPING COUNTRIES: A SYSTEMATIC REVIEW
AN EHEALTH ADOPTION FRAMEWORK FOR DEVELOPING COUNTRIES: A SYSTEMATIC REVIEWAN EHEALTH ADOPTION FRAMEWORK FOR DEVELOPING COUNTRIES: A SYSTEMATIC REVIEW
AN EHEALTH ADOPTION FRAMEWORK FOR DEVELOPING COUNTRIES: A SYSTEMATIC REVIEWhiij
 
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...hiij
 
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...hiij
 
CHINESE PHARMACISTS LAW MODIFICATION, HOW TO PROTECT PATIENTS‘INTERESTS?
CHINESE PHARMACISTS LAW MODIFICATION, HOW TO PROTECT PATIENTS‘INTERESTS?CHINESE PHARMACISTS LAW MODIFICATION, HOW TO PROTECT PATIENTS‘INTERESTS?
CHINESE PHARMACISTS LAW MODIFICATION, HOW TO PROTECT PATIENTS‘INTERESTS?hiij
 
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...hiij
 
PERSONALIZED MEDICINE SUPPORT SYSTEM: RESOLVING CONFLICT IN ALLOCATION TO RIS...
PERSONALIZED MEDICINE SUPPORT SYSTEM: RESOLVING CONFLICT IN ALLOCATION TO RIS...PERSONALIZED MEDICINE SUPPORT SYSTEM: RESOLVING CONFLICT IN ALLOCATION TO RIS...
PERSONALIZED MEDICINE SUPPORT SYSTEM: RESOLVING CONFLICT IN ALLOCATION TO RIS...hiij
 
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...hiij
 
CLINICAL AND SOCIAL DETERMINANTS TO IMPROVE DOD/VETERAN WELL BEING: THE SERVI...
CLINICAL AND SOCIAL DETERMINANTS TO IMPROVE DOD/VETERAN WELL BEING: THE SERVI...CLINICAL AND SOCIAL DETERMINANTS TO IMPROVE DOD/VETERAN WELL BEING: THE SERVI...
CLINICAL AND SOCIAL DETERMINANTS TO IMPROVE DOD/VETERAN WELL BEING: THE SERVI...hiij
 

More from hiij (20)

Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)
 
Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)
 
Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)
 
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
 
Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)
 
AUTOMATIC AND NON-INVASIVE CONTINUOUS GLUCOSE MONITORING IN PAEDIATRIC PATIENTS
AUTOMATIC AND NON-INVASIVE CONTINUOUS GLUCOSE MONITORING IN PAEDIATRIC PATIENTSAUTOMATIC AND NON-INVASIVE CONTINUOUS GLUCOSE MONITORING IN PAEDIATRIC PATIENTS
AUTOMATIC AND NON-INVASIVE CONTINUOUS GLUCOSE MONITORING IN PAEDIATRIC PATIENTS
 
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMSINTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
 
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
 
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMSINTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
 
Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)
 
The Proposed Guidelines for Cloud Computing Migration for South African Rural...
The Proposed Guidelines for Cloud Computing Migration for South African Rural...The Proposed Guidelines for Cloud Computing Migration for South African Rural...
The Proposed Guidelines for Cloud Computing Migration for South African Rural...
 
SUPPORTING LARGE-SCALE NUTRITION ANALYSIS BASED ON DIETARY SURVEY DATA
SUPPORTING LARGE-SCALE NUTRITION ANALYSIS BASED ON DIETARY SURVEY DATASUPPORTING LARGE-SCALE NUTRITION ANALYSIS BASED ON DIETARY SURVEY DATA
SUPPORTING LARGE-SCALE NUTRITION ANALYSIS BASED ON DIETARY SURVEY DATA
 
AN EHEALTH ADOPTION FRAMEWORK FOR DEVELOPING COUNTRIES: A SYSTEMATIC REVIEW
AN EHEALTH ADOPTION FRAMEWORK FOR DEVELOPING COUNTRIES: A SYSTEMATIC REVIEWAN EHEALTH ADOPTION FRAMEWORK FOR DEVELOPING COUNTRIES: A SYSTEMATIC REVIEW
AN EHEALTH ADOPTION FRAMEWORK FOR DEVELOPING COUNTRIES: A SYSTEMATIC REVIEW
 
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
 
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
 
CHINESE PHARMACISTS LAW MODIFICATION, HOW TO PROTECT PATIENTS‘INTERESTS?
CHINESE PHARMACISTS LAW MODIFICATION, HOW TO PROTECT PATIENTS‘INTERESTS?CHINESE PHARMACISTS LAW MODIFICATION, HOW TO PROTECT PATIENTS‘INTERESTS?
CHINESE PHARMACISTS LAW MODIFICATION, HOW TO PROTECT PATIENTS‘INTERESTS?
 
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
 
PERSONALIZED MEDICINE SUPPORT SYSTEM: RESOLVING CONFLICT IN ALLOCATION TO RIS...
PERSONALIZED MEDICINE SUPPORT SYSTEM: RESOLVING CONFLICT IN ALLOCATION TO RIS...PERSONALIZED MEDICINE SUPPORT SYSTEM: RESOLVING CONFLICT IN ALLOCATION TO RIS...
PERSONALIZED MEDICINE SUPPORT SYSTEM: RESOLVING CONFLICT IN ALLOCATION TO RIS...
 
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
 
CLINICAL AND SOCIAL DETERMINANTS TO IMPROVE DOD/VETERAN WELL BEING: THE SERVI...
CLINICAL AND SOCIAL DETERMINANTS TO IMPROVE DOD/VETERAN WELL BEING: THE SERVI...CLINICAL AND SOCIAL DETERMINANTS TO IMPROVE DOD/VETERAN WELL BEING: THE SERVI...
CLINICAL AND SOCIAL DETERMINANTS TO IMPROVE DOD/VETERAN WELL BEING: THE SERVI...
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 

A systematic literature review of cloud

  • 1. Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 A SYSTEMATIC LITERATURE REVIEW OF CLOUD COMPUTING IN EHEALTH Yan Hu and Guohua Bai Department of Creative Technologies, Blekinge Institute of Technology, Sweden ABSTRACT Cloud computing in eHealthis an emerging area for only few years. There needs to identify the state of the art and pinpoint challenges and possible directions for researchers and applications developers. Based on this need, we have conducted a systematic review of cloud computing in eHealth. We searched ACM Digital Library, IEEE Xplore, Inspec, ISI Web of Science and Springer as well as relevant open-access journals for relevant articles. A total of 237 studies were first searched, of which 44 papers met the Include Criteria. The studies identified three types of studied areas about cloud computing in eHealth, namely (1) cloud-based eHealth framework design (n=13);(2) applications of cloud computing (n=17); and (3) security or privacy control mechanisms of healthcare data in the cloud (n=14). Most of the studies in the review were about designs and concept-proof. Only very few studies have evaluated their research in the real world, which may indicate that the application of cloud computing in eHealth is still very immature. However, our presented review could pinpoint that a hybrid cloud platform with mixed access control and security protection mechanisms will be a main research area for developing citizen centred home-based healthcare applications. KEY WORDS Systematic review, eHealth, cloud computing, home-based healthcare 1. INTRODUCTION This review examines existing researches on cloud-based eHealth solutions. The main goal is to identify the state of the art in this area and pinpoint challenges and possible directions for researchers and applications developers based on the current literatures. Though this studymay not able to specify thebenefits of using cloud technology in eHealth due to the progress in the area so far is made mostly in designs and concept-proof, not in real use context, we do, however, have identified some better ways of using cloud computing in eHealth. eHealthis defined as “the cost-effective and secure use of information and communications technologies in support of health and health-related fields, including healthcare services, health surveillance, health education, knowledge and research”.[1]The goal of eHealth is to improve the cooperation and coordination of healthcare, in order to improve the quality of care and reduce the cost of care at the same time. DOI: 10.5121/hiij.2014.3402 11
  • 2. Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 Cloud computing is a new technology which has emerged in the last five years. According to the definition by NIST, cloud computing is “a model can provide distributed, rapidly provisioned and configurable computing resources (such as servers, storage, applications, networks and other services), which are on-demand, rapid elastic and measured, to whom have network connections”.[2]Because of the obvious scalability, flexibility and availability at low cost of cloud services, there is a rapid trend of adopting cloud computing among enterprises or health-related 12 areas in the last few years. 2. METHODS A systematic literature review requires a comprehensive and unbiased coverage of searched literatures. To maximise the coverage of our searched literatures, we started by identifying some of the most used alternative words/concepts and synonyms in the research questions.[3] We conducted first a manual search in the areas of related areas such as computer science and healthcare. The selected Databases are ACM Digital Library, IEEE Xplore, Inspec, ISI Web of Science and Springer. In order to cover more broad scope, open-access journals in the relevant areas were also included. We did not limit the publication year, since cloud computing was proposed only in the last five years. After general study of the related areas, the language of the papers was limited to English. The following search string was used to search the above mentioned databases: (Cloud)AND (eHealth OR "electronic health" OR e-health) The search string could be modified slightly when searching in different databases, since they have different rules for search strings. Our first search by the search string in all the mentioned databases produced 237 articles. In order to focus on the most relevant literatures, we conducted a primary evaluation based on reading the abstracts of all selected articles. The evaluation is based on the criteria described in Table 1. The inclusion criteria are applied independently for each author to select the relevant articles. This evaluation selected 44 articles for our thorough study, and all are included in the reference list. Table 1. Include and exclude criteria Include criteria Exclude criteria • Directly or indirectly related to both eHealth and cloud technology. • Cloud-based eHealth frameworks design. • Cloud computing solutions applied in healthcare. • Security and privacy mechanisms of healthcare data in cloud. • Written in English • Irrelevant to study of the cloud or eHealth. • Conceptual methods or cognitive introductions. • Review papers. • Business analysis reports. • Not written in English.
  • 3. Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 The quality of each paper was assessed by two authors mainly based on the Jovell and Navarro- Rubio system for classification from score 9 to 1 [4]. Guidelines for performing systematic literature reviews in related subject area[5] were followed for technology related issues. After include/exclude criteria and quality assessment criteria, a chosen set of papers was available for the data extraction process. In order to avoid the bias of subjective preference, we applied the method by which one researcher extracted the data and another checked the extraction. The Citation and Bibliography tool – Zotero – was used to manage all the extracted articles. 13 3. RESULTS After the steps of searching, evaluation and alternate reviews, 44 articles were finally selected from the total of 237 articles found from the first search. We believe the selected 44 articles can cover the basic view of the studied area of cloud computing in eHealth. Since both eHealth and cloud computing are emerging areas, the results of this study can offer the researchers up-to-date perspectives for their research. We found 19 countries where research articles were published on eHealth cloud computing. The largest number of articles were produced in the USA (n=14), followed by EU countries (n=11). We found relatively few papers in this new area produced in developing countries such as China (n=3), India (n=2) and UAE (n=3) (see Table 2). All papers we searched were published after 2010, and this may indicate that research in cloud computing for healthcare is still an emerging area. Figure 1 shows the number of papers published across years in our searched results. Table 2. Countries conducting cloud-based eHealth researches Country No. of papers References USA Canada Australia UK UAE China Germany India France Croatia Italy Spain Sweden Netherland Bangladesh Puerto Rico Egypt Brazil 14 4 3 3 3 3 2 2 1 1 1 1 1 1 1 1 1 1 7,11,13,17,18,20,25,29,30,32,35 ,41,43,45 23,38,39,40 20,44,48 10,14,26 8,21,33 34,36,47 46,49 9,24 42 12 15 27 19 28 37 31 16 6
  • 4. Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 14 3 Number of papers 5 19 17 2010 2011 2012 2013 Figure 1. Number of studies across years 20 15 10 5 0 In the following, we present some important findings from our study. The topics discussed in the reviewed articles are quite broad in relation to the use of cloud computing in eHealth domain. Generally, the topics can be classified into three categories: 1) Cloud-based eHealth framework design (n=13); 2) Applications of cloud computing in eHealth (n=17); and 3) Security or privacy control mechanisms of healthcare data in cloud (n=14). The distribution of the above topics is shown in Figure 2. Frameworks Applications Security issues 2 2 1 1 9 5 0 2010 2011 2012 2013 Figure 2.Research type distributions. 10 8 6 4 2 0 3.1 Discussion of the topics in the reviewed articles 3.1.1Cloud-based eHealth framework design 6 5 Since one of the most significant advantages of cloud computing is its huge data storage capacity, six papers proposed cloud-based frameworks for healthcare data sharing. One of the pioneers in this area, Rolim et al. [6] designed a framework for data collection by using sensors attached to medical equipment, and the collected data can be directly stored in a cloud, which can be accessed by authorised medical staff. Some studies[7][8][9] proposed a national level framework for eHealth based on cloud models. For example, Patra et al. [9] argued especially that their cloud-based solution on a national level would provide a cost effective way in dealing with patient information for rural areas. By encouraging people in rural areas to upload their personal healthcare information to the health cloud, the care providers can provide them with more correct healthcare services, such as remote diagnosis, supervision and emergency calls.
  • 5. Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 Other studies related to this category of framework design are more specific as regards application areas, such as the design of a Virtual Research Environment by both Simth et al.[10] and Regola et al.[11]; patients’ self-management by Martinovic et al.[12]; transition or standardisation of data stored in different EHR or PHR systems by Coats et al.[13]and Ekonomou et al.[14]; and designing a secure EHR framework [15][16][17][18]. 15 3.1.2.Applications of cloud computing High accessibility, availability and reliability make cloud computing a better solution for healthcare interoperability problems. Papers in this category mostly applied cloud technology for healthcare data sharing, processing and management, and can be categorised based on three types of cloud platforms, namely, public cloud, private cloud and hybrid cloud. Six papers presented their eHealth applications by using or testing in public clouds such as Google App Engine [19], Windows Azure[20][21] and Amazon EC2[22][23][24].The application[22] of Wooten et al. provided a patients-to-patients support and information sharing within patients community. The solution proposed by Benharref et al.[21] used the mobiles of seniors to send the patients’ data automatically to the cloud, and the patients themselves could decide with whom to share the data. Mohammed et al.[23]designed a Health Cloud Exchange (HCX) system which shares healthcare records between services and consumers with some privacy controls. For applications based on the private cloud, Bahga et al.[25] presented an achievement of sematic interoperability between different kinds of healthcare data, while DACRA[26] built a platform for interoperability on the syntax level. Vilaplana et al.[27]used queuing theory as the basic means to model the performance of an eHealth system based on the private cloud. Van Gorp et al.[28]applied virtualisation techniques to allow patients themselves to build their own lifelong PHRs. The PHR can then be shared with other stakeholders who are authorised and interested. Wu et al.[29]proposed an approach to EHR data schema composition with a broker based access control. In order to reduce the cost of adopting EHRs, HP published a cloud-based platform called Fusion[30]for securely managing and sharing healthcare information on large scale. Other studies also used the private cloud to integrate the EHR systems with other systems like healthcare billing system[31] and national law system[32]. Gul et al.[33] and Chen et al.[34]proposed a shared EHRs system based on hybrid cloud. In the proposed application of Chen et al.[34], the patient’s medical data are stored both in a hospital’s private cloud and public healthcare cloud. A mechanism is set up to make sure that the owners of the medical records can decide when their records should be protected in normal or emergency situation. Dixon et al.[35]implemented a community cloud-based exchange of clinical data between two disparate health care providers, which was mainly used by chronic disease healthcare. 3.1.3.Security or privacy control mechanisms Healthcare data require protection for high security and privacy. Access control, an effective method to protect data, is widely used in many studies. Liu et al. [36] applied an identity based encryption (IBE) system in access control of PHR, and this identity-based cryptography system
  • 6. Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 can reduce the complexity of key management. Attribute based Encryption (ABE) is one of the most preferable encryption schemes used in cloud computing. For example, Fakhrul et al.[37] implemented Cipher text-Policy ABE in a security manager module to make it act as an administrative person; ESPAC[38] and Narayan et al.[39] proposed a patient-centric ABE access control scheme; and Aljumah et al.[40]designed an emergency mobile access to PHR cloud-based ABE. Three researches[41][42][43] mixed ABE and IBE to identify access on different levels (normal and emergency), which can handle more complex situations than a single scheme. Role based access control is based on ABE, which is an automatic procedure for authenticating healthcare user information and allocating corresponding role to guarantee all associated operations. Tong et al.[44]introduced a Cloud-based Privacy-aware Role Based Access Control model for controllability, traceability of data and authorised access to healthcare resources. Sharma et al.[45]developed an advanced role-based scheme called task based control to determine whether access should be granted to a healthcare cloud. Besides access control, several security protection techniques (Trusted Virtual domains[46], Watermarking method[47], Secure index implementation[48] and secret-sharing schemes[49]) were also introduced to maintain the high security and privacy of healthcare clouds. 16 4. DISCUSSIONS The presented review shows that cloud computing technology could be applied in several areas of the eHealth domain. The majority of studies introduced cloud computing technology as possible solutions for achieving eHealth interoperability. Although worldwide it is acknowledged that ICT technologies, such as cloud computing, can improve healthcare quality, most papers in this review are from developed countries. The present review does show, however, increasing studies from other developing countries. Almost all the studies suggest that due to the huge amount of patient health data, especially in the case of daily care, the cloud’s big data storage service provides a better way to store these data. The data can be shared among hospitals and third party research institutions or other healthcare organisations even on a national level. The huge data storage capacity of the cloud would help the development of big data mining in healthcare, as well as diagnosis and treatment. Pay-as-you-go mode of the cloud has significant economic strength, reducing cost for all healthcare organisations which would like to use cloud-based services. The patients-centric healthcare model will be a future trend where patients are active participants in their own healthcare. Some studies presented cloud-based patients-centric healthcare applications by the users-centric feature of cloud computing. This will not only encourage healthcare receivers to be involved in their own healthcare, but also the cloud-based healthcare platform will provide a technical solution and a social network. In addition, healthcare receivers’ participation constitutes an efficient healthcare education in terms of patient’s self-management. High accessibility and availability of the cloud could help the healthcare data stored in the cloud to be accessed at anytime and anywhere in the world. If healthcare receivers could make parts of
  • 7. Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 their healthcare data in public cloud open, which means that data can be “freely used, reused and redistributed by anyone – subject only, at most, to the requirement to attribute and sharelike.”[50]. When the open data become available in the public cloud, it can be processed by remote services, such as medical systems in hospital, clinic decision support systems, expert systems, or distributed to other medical personnel. Around one third of the studies also show that the security and privacy gaps of healthcare data in the cloud could be solved by access control encryption schemes and security protection techniques. This would make it possible to move current server-client based eHealth services to cloud-based eHealth services and make more contribution to improve the current healthcare by high-technologies. The present review also noted some challenges to using cloud computing in eHealth. Healthcare data contain sensitive information, and dealing with sensitive data in the cloud could lead to some legal issues. Besides, it is important to select cloud providers carefully to guarantee the confidentiality of healthcare data. Based on the review, we could find that a hybrid cloud model which contains access controls and security protection techniques would be a reliable solution. The EHRs in the hospitals and other healthcare centres could keep their data in private clouds, while patients’ daily self-management data could be published in a confident public cloud. Patients as the owner of their health data should decide who can access their data and the conditions for sharing. 17 5. LIMITATIONS The present review has certain limitations. The most obvious one is the external validity or generalizability. Since cloud computing is a relatively new technology, the number of published works for our review topic is not so large. In order to have a wider spectrum of studies, the selection rate is slightly higher. Since all the databases we used for searching articles contain some intelligent search techniques, we did not create as many synonyms of “eHealth” as we may do. This may have caused some data loss. Since cloud computing came after 2010, and most of the studies in this review are conference papers with concept-proof-designs. Only very few studies havebeen evaluated in the real world or tested by some technical experts. 6. CONCLUSION Research on applying cloud computing technology to eHealth is in its early stages; most researchers have presented ideas without real-world cases validation. The obvious features of cloud computing technology provide more reasons to adopt cloud computing in sharing and managing health information. The main purpose of our review is to identify some challenges and feasible cloud-based solutions which can be applied in eHealth. The current review suggests that with the unique superiority of the cloud in big data storage and processing ability, a hybrid cloud platform with mixed access control and security protection mechanisms will be a main research area for developing citizen centred home-based healthcare system.
  • 8. Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 18 REFERENCES [1] “WHO | E-Health,” WHO. [Online]. Available: http://www.who.int/trade/glossary/story021/en/. [Accessed: 09-Feb-2014]. [2] P. Mell and T. Grance, “The NIST definition of cloud computing,” Natl. Inst. Stand. Technol., vol. 53, no. 6, p. 50, 2009. [3] W. Afzal, R. Torkar, and R. Feldt, “A systematic review of search-based testing for non-functional system properties,” Inf. Softw. Technol., vol. 51, no. 6, pp. 957–976, Jun. 2009. [4] A. Jovell and M. Navarro-Rubio, “Evaluation of scientific evidence,” Med. Clínica, vol. 105, no. 19, p. 740, 1995. [5] S. Keele, “Guidelines for performing Systematic Literature Reviews in Software Engineering,” EBSE Technical Report EBSE-2007-01, 2007. [6] C. O. Rolim, F. L. Koch, C. B. Westphall, J. Werner, A. Fracalossi, and G. S. Salvador, “A Cloud Computing Solution for Patient’s Data Collection in Health Care Institutions,” in 2010 Second International Conference on eHealth, Telemedicine, and Social Medicine (ETELEMED), 10-16 Feb. 2010, 2010, pp. 95–9. [7] E. Hendrick, B. Schooley, and C. Gao, “CloudHealth: Developing a reliable cloud platform for healthcare applications,” in 2013 IEEE 10th Consumer Communications and Networking Conference, CCNC 2013, January 11, 2013 - January 14, 2013, 2013, pp. 887–891. [8] O. Gul, M. Al-Qutayri, C. Y. Yeun, and Q. H. Vu, “Framework of a national level electronic health record system,” in 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM), 2012, pp. 60–65. [9] M. R. Patra, R. K. Das, and R. P. Padhy, “CRHIS: Cloud Based Rural Healthcare Information System,” in Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, New York, NY, USA, 2012, pp. 402–405. [10] R. Smith, J. Xu, S. Hima, and O. Johnson, “Gateway to the Cloud - Case Study: A Privacy-Aware Environment for Electronic Health Records Research,” in 2013 IEEE 7th International Symposium on Service Oriented System Engineering (SOSE), 2013, pp. 292–297. [11] N. Regola and N. V. Chawla, “Storing and Using Health Data in a Virtual Private Cloud,” J. Med. Internet Res., vol. 15, no. 3, p. e63, Mar. 2013. [12] G. Martinovic and B. Zoric, “E-health Framework Based on Autonomic Cloud Computing,” in 2012 Second International Conference on Cloud and Green Computing (CGC), 2012, pp. 214–218. [13] B. Coats and S. Acharya, “Achieving electronic health record access from the cloud,” in Human- Computer Interaction: Applications and Services. 15th International Conference, HCI International 2013, 21-26 July 2013, 2013, vol. pt. II, pp. 26–35. [14] E. Ekonomou, L. Fan, W. Buchanan, and C. Thuemmler, “An integrated cloud-based healthcare infrastructure,” in 2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011, November 29, 2011 - December 1, 2011, 2011, pp. 532–536. [15] F. Amato, A. Mazzeo, V. Moscato, and A. Picariello, “A Framework for Semantic Interoperability over the Cloud,” in 2013 Workshops of 27th International Conference on Advanced Information Networking and Applications (WAINA), 25-28 March 2013, 2013, pp. 1259–64. [16] A. S. Radwan, A. A. Abdel-Hamid, and Y. Hanafy, “Cloud-based service for secure electronic medical record exchange,” in 2012 22nd International Conference on Computer Theory and Applications, ICCTA 2012, October 13, 2012 - October 15, 2012, 2012, pp. 94–103. [17] S. Alshehri, S. P. Radziszowski, and R. K. Raj, “Secure access for healthcare data in the cloud using ciphertext-policy attribute-based encryption,” in 2012 IEEE International Conference on Data Engineering Workshops (ICDEW 2012), 1-5 April 2012, 2012, pp. 143–6. [18] F. Rahman, S. I. Ahamed, Ji-Jiang Yang, and Qing Wang, “PriGen: a Generic Framework to Preserve Privacy of Healthcare Data in the Cloud,” in Inclusive Society: Health and Wellbeing in the
  • 9. Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 Community, and Care at Home. 11th International Conference on Smart Homes and Health Telematics, ICOST 2013, 19-21 June 2013, 2013, pp. 77–85. [19] Y. Hu, F. Lu, I. Khan, and G. Bai, “A cloud computing solution for sharing healthcare information,” in Internet Technology And Secured Transactions, 2012 International Conferece For, 2012, pp. 465– 470. [20] Shilin Lu, R. Ranjan, and P. Strazdins, “Reporting an Experience on Design and Implementation of e- Health Systems on Azure Cloud,” in Internet and Distributed Computing Systems. 6th International Conference, IDCS 2013, 28-30 Oct. 2013, 2013, pp. 145–59. [21] A. Benharref and M. A. Serhani, “Novel Cloud and SOA-based Framework for E-health Monitoring 19 Using Wireless Biosensors,” IEEE J. Biomed. Health Inform., vol. 18, no. 1, pp. 46–55, Jan. 2014. [22] R. Wooten, R. Klink, F. Sinek, Y. Bai, and M. Sharma, “Design and implementation of a secure healthcare social cloud system,” in 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012, May 13, 2012 - May 16, 2012, 2012, pp. 805–810. [23] S. Mohammed, D. Servos, and J. Fiaidhi, “Developing a Secure Distributed OSGi Cloud Computing Infrastructure for Sharing Health Records,” in Autonomous and Intelligent Systems. Second International Conference, AIS 2011, 22-24 June 2011, 2011, pp. 241–52. [24] G. S. Bhange and S. R. Hiray, “Dental Patient Records Maintenance on Cloud Computing Using Data Protection Model,” in Proceedings of the CUBE International Information Technology Conference, New York, NY, USA, 2012, pp. 526–531. [25] A. Bahga and V. K. Madisetti, “A Cloud-based Approach for Interoperable Electronic Health Records (EHRs),” IEEE J. Biomed. Health Inform., vol. 17, no. 5, pp. 894–906, Sep. 2013. [26] L. Fan, W. Buchanan, C. Thummler, O. Lo, A. Khedim, O. Uthmani, A. Lawson, and D. Bell, “DACAR Platform for eHealth Services Cloud,” in 2011 IEEE International Conference on Cloud Computing (CLOUD), 2011, pp. 219–226. [27] J. Vilaplana, F. Solsona, F. Abella, R. Filgueira, and J. Rius, “The cloud paradigm applied to e- Health,” BMC Med. Inform. Decis. Mak., vol. 13, no. 1, p. 35, Mar. 2013. [28] P. Van Gorp and M. Comuzzi, “Lifelong Personal Health Data and Application Software via Virtual Machines in the Cloud,” IEEE J. Biomed. Health Inform., vol. 18, no. 1, pp. 36–45, Jan. 2014. [29] Ruoyu Wu, Gail-Joon Ahn, and Hongxin Hu, “Secure sharing of electronic health records in clouds,” in 2012 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012), 14-17 Oct. 2012, 2012, pp. 711–18. [30] S. Basu, A. H. Karp, Jun Li, J. Pruyne, J. Rolia, S. Singhal, J. Suermondt, and R. Swaminathan, “Fusion: Managing Healthcare Records at Cloud Scale,” Computer, vol. 45, no. 11, pp. 42–9, Nov. 2012. [31] M. Rodriguez-Martinez, H. Valdivia, J. Rivera, J. Seguel, and M. Greer, “MedBook: A cloud-based healthcare billing and record management system,” in 2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012, June 24, 2012 - June 29, 2012, 2012, pp. 899–905. [32] Ruoyu Wu, Gail-Joon Ahn, and Hongxin Hu, “Towards HIPAA-Compliant Healthcare Systems in Cloud Computing,” Int. J. Comput. Models Algorithms Med., vol. 3, no. 2, pp. 1–22, Apr. 2012. [33] O. Gul, M. Al-Qutayri, Q. H. Vu, and C. Y. Yeun, “Data integration of electronic health records using Artificial Neural Networks,” in 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, December 10, 2012 - December 12, 2012, 2012, pp. 313–317. [34] Yu-Yi Chen, Jun-Chao Lu, and Jinn-Ke Jan, “A Secure EHR System Based on Hybrid Clouds,” J. Med. Syst., vol. 36, no. 5, pp. 3375–84, Oct. 2012. [35] B. E. Dixon, L. Simonaitis, H. S. Goldberg, M. D. Paterno, M. Schaeffer, T. Hongsermeier, A. Wright, and B. Middleton, “A pilot study of distributed knowledge management and clinical decision support in the cloud,” Artif. Intell. Med., vol. 59, no. 1, pp. 45–53, Sep. 2013. [36] Chia-Hui Liu, Fong-Qi Lin, Dai-Lun Chiang, Tzer-Long Chen, Chin-Sheng Chen, Han-Yu Lin, Yu- Fang Chung, and Tzer-Shyong Chen, “Secure PHR Access Control Scheme for Healthcare Application Clouds,” in 2013 42nd International Conference on Parallel Processing (ICPP), 1-4 Oct. 2013, 2013, pp. 1067–76.
  • 10. Health Informatics-An International Journal (HIIJ) Vol.3, No.4, November 2014 [37] M. FakhrulAlamOnik, K. Anam, S. Sabir Salman - Al - Musawi, and N. Rashid, “A Secured Cloud based Health Care Data Management System,” Int. J. Comput. Appl., vol. 49, no. 12, pp. 24–30, Jul. 2012. [38] M. Barua, X. Liang, R. Lu, and X. Shen, “ESPAC: Enabling Security and Patient-centric Access 20 Control for eHealth in cloud computing,” Int. J. Secur. Netw., vol. 6, no. 2, pp. 67–76, Jan. 2011. [39] S. Narayan, M. Gagné, and R. Safavi-Naini, “Privacy preserving EHR system using attribute-based infrastructure,” in Proceedings of the 2010 ACM workshop on Cloud computing security workshop, New York, NY, USA, 2010, pp. 47–52. [40] F. Aljumah, R. H. M. Leung, M. Pourzandi, and M. Debbabi, “Emergency mobile access to personal health records stored on an untrusted cloud,” in 2nd International Conference on Health Information Science, HIS 2013, March 25, 2013 - March 27, 2013, 2013, vol. 7798 LNCS, pp. 30–41. [41] Jie Huang, M. Sharaf, and Chin-Tser Huang, “A Hierarchical Framework for Secure and Scalable EHR Sharing and Access Control in Multi-cloud,” in 2012 41st International Conference on Parallel Processing Workshops (ICPPW 2012), 10-13 Sept. 2012, 2012, pp. 279–87. [42] A. Lounis, A. Hadjidj, A. Bouabdallah, and Y. Challal, “Secure and scalable cloud-based architecture for e-Health wireless sensor networks,” in 2012 21st International Conference on Computer Communications and Networks, ICCCN 2012, July 30, 2012 - August 2, 2012, 2012, p. IEEE; IEEE Communication Society; U.S. National Science Foundation (NSF); City Mayor of Munich. [43] Yue Tong, Jinyuan Sun, S. S. M. Chow, and Pan Li, “Towards auditable cloud-assisted access of encrypted health data,” in 2013 IEEE Conference on Communications and Network Security (CNS), 14-16 Oct. 2013, 2013, pp. 514–19. [44] L. Chen and D. B. Hoang, “Novel data protection model in healthcare cloud,” in 13th IEEE International Workshop on FTDCS 2011, the 8th International Conference on ATC 2011, the 8th International Conference on UIC 2011 and the 13th IEEE International Conference on HPCC 2011, September 2, 2011 - September 4, 2011, 2011, pp. 550–555. [45] M. Sharma, Y. Bai, S. Chung, and L. Dai, “Using Risk in Access Control for Cloud-Assisted eHealth,” in 2012 IEEE 14th International Conference on High Performance Computing and Communication 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), 2012, pp. 1047–1052. [46] H. Löhr, A.-R. Sadeghi, and M. Winandy, “Securing the e-health cloud,” in Proceedings of the 1st ACM International Health Informatics Symposium, New York, NY, USA, 2010, pp. 220–229. [47] Zhiwei Yu, C. Thomborson, Chaokun Wang, Jianmin Wang, and Rui Li, “A cloud-based watermarking method for health data security,” in 2012 International Conference on High Performance Computing & Simulation (HPCS 2012), 2-6 July 2012, 2012, pp. 642–7. [48] A. Alabdulatif, I. Khalil, and V. Mai, “Protection of electronic health records (EHRs) in cloud,” in 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 3-7 July 2013, 2013, pp. 4191–4. [49] T. Ermakova and B. Fabian, “Secret sharing for health data in multi-provider clouds,” in 2013 IEEE 15th Conference on Business Informatics (CBI), 15-18 July 2013, 2013, pp. 93–100. [50] “What is Open Data? — Open Data Handbook.” [Online]. Available: http://opendatahandbook.org/en/what-is-open-data/. [Accessed: 04-May-2014].