Skip to main content
. 2022 Dec 20;23(1):14. doi: 10.3390/s23010014

Table 2.

Related work: Comparison analysis of previous studies in terms of opportunity for individuals to create cryptographic keys, digitally agree or deny access to PHR, use their own keys to encrypt data, and choose the infrastructure to store PHR. Comparison of previous studies in terms of their focus on EHR and PHR.

Author Year Main Focus Key Generation Grant Access Revoke Access Encrypt Data Manage Location
Roehrs et al. [4] 2017 Interoperability X - - X X
Sonkamble et al. [37] 2017 Interoperability - X X - -
Ghadamyari and Shame [20] 2019 Data Analysis - - - - -
She et al. [21] 2019 Privacy - - - X -
Radhakrishnan et al. [38] 2019 Security - X - - -
Niu et al. [39] 2019 Interoperability - X - - -
Yazdinejad et al. [22] 2020 Authentication - X - - -
Zhuang et al. [40] 2020 Information Exchange - X - - -
Muizz Mahdy [41] 2020 Interoperability X X - - -
Misbhauddin et al. [19] 2020 Scalability X X X - -
Madine et al. [42] 2020 Interoperability X X - X -
Sun et al. [26] 2020 Security - - - - -
Ghani et al. [43] 2020 Information Exchange X X X - -
Mubashar et al. [32] 2021 Information Exchange - - - - -
Wang et al. [44] 2021 Interoperability X X - X X
Proposed Model 2022 Interoperability X X X X X