Skip to main content
. 2021 Sep 14;18(18):9668. doi: 10.3390/ijerph18189668

Table 3.

Summary for e-health data security and privacy studies.

Ref. Target Security Concern Target Security Requirement Security Solution Strength Weakness
[21] - Unauthorized access
- Data disclosure
- Data tampering
- Access restriction
- Confidentiality
- Anonymity
- Accountability
- Access Control
- Anonymization
Anonymization and access control according to the sensitivity of e-health data The current anonymization method has some vulnerabilities that could lead to re-identification
[22] - Unauthorized access
- Data disclosure
- Data loss
- Data tampering
- Data forgery
- Access restriction
- Confidentiality
- Integrity
- Availability
- Accountability
- Access Control
- Blockchain (Hyperledger Fabric)
No single point of failure (SPoF) problem and the emergency scenario is considered Emergency access permission could be abused and access control requires a transaction fee
[23] - Unauthorized access
- Data disclosure
- Data loss
- Data tampering
- Data forgery
- Access restriction
- Confidentiality
- Integrity
- Access Control
- Blockchain (Ethereum)
No SPoF problem and employing an off-chain scaling method to solve the scalability problem of blockchain Lack of fine-grained access control and access control requires a transaction fee
[24] - Unauthorized access
- Data disclosure
- Data loss
- Data tampering
- Data forgery
- Access restriction
- Confidentiality
- Integrity
- Accountability
- Access Control
- AES
- Blockchain
A user can revoke permission to access their e-health data from medical staff at any time Symmetric key was shared to control access; therefore, once a key has been shared with someone or compromised, the key should be updated and related e-health data should be re-encrypted
[27] - Data disclosure - Confidentiality - AES
- RSA
- Steganography
Discrete wavelet transform is compatible with compression and has resistance to geometric distortions IoT is a target environment; however, AES and RSA that require high computational power were used
[28] - Data disclosure - Confidentiality - Quaternion-based Encryption Fast computation speed for the encryption of a large volume of e-health data The computation speed could be increased if the decomposition process were omitted
[29] - Data disclosure - Confidentiality - ECEM-based Encryption Differential attack resistance Performance should be evaluated on diverse medical images
[36] - Data disclosure
- Data tampering
- Data loss
- Data forgery
- Confidentiality
- Integrity
- Anonymity
- Accountability
- AES
- Blockchain
No SPoF problem and medical data can be securely preserved with the blockchain The transaction fee is relatively high compared to conventional data storage
[37] - Data disclosure
- Data tampering
- Data loss
- Data forgery
- Access restriction
- Confidentiality
- Integrity
- Anonymity
- Accountability
- Access Control
- Blockchain
Efficient consensus mechanism and access control protocol for e-health data were also proposed Access should be able to be delegated to related medical staff or other people in a secure manner for flexible data sharing
[38] - Data disclosure
- Data tampering
- Data loss
- Data forgery
- Integrity
- Accountability
- Blockchain Blockchain only records URLs instead of medical images that have a large data size Since real images are stored in the hospital’s database, both the blockchain and endpoints should be properly protected
[39] - Data disclosure - Confidentiality - Rijndael encryption
- Steganography
Fast processing time and high embedding capacity based on LSB Message capacity could be increased with noise cancellation and data reduction
[40] - Data disclosure
- Data tampering
- Confidentiality
- Integrity
- AES
- Steganography
It considered both confidentiality and integrity and had high capacity, robustness, and imperceptibility An error control mechanism should be adopted for a robust steganography method
[41] - Data disclosure
- Data tampering
- Data forgery
- Confidentiality
- Integrity
- Watermarking Resistance to sharpening and blurring attacks while maintaining acceptable imperceptibility A tracking key that makes the proposed scheme reversible has to be transmitted with each medical image
[42] - Data disclosure
- Data tampering
- Data forgery
- Confidentiality
- Integrity
- Watermarking Proposes an effective scheme to localize and restore tampered pixels and regions Various tampering attacks on image resizing, skewing, and rotating should be studied