Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Security and Privacy Requirements for Cloud Computing in Healthcare: Elicitation and Prioritization from a Patient Perspective

Published: 03 May 2020 Publication History

Abstract

Cloud computing promises essential improvements in healthcare delivery performance. However, its wide adoption in healthcare is yet to be seen, one main reason being patients’ concerns for security and privacy of their sensitive medical records. These concerns can be addressed through corresponding security and privacy requirements within the system engineering process. Despite a plethora of related research, security and privacy requirements for cloud systems and services have seldomly been investigated methodically so far, whereas their individual priorities to increase the system success probability have been neglected. Against this background, this study applies a systematic requirements engineering process: First, based on a systematic literature review, an extensive initial set of security and privacy requirements is elicited. Second, an online survey based on the best-worst scaling method is designed, conducted, and evaluated to determine priorities of security and privacy requirements.
Our results show that confidentiality and integrity of medical data are ranked at the top of the hierarchy of prioritized requirements, followed by control of data use and modification, patients’ anonymity, and patients’ control of access rights. Availability, fine-grained access control, revocation of access rights, flexible access, clinicians’ anonymity, as well as usability, scalability, and efficiency of the system complete the ranking. The level of agreement among patients is rather small, but statistically significant at the 0.01 level.
The main contribution of the present research comprises the study method and results highlighting the role of strong security and privacy and excluding any trade-offs with system usability. Enabling a richer understanding of patients’ security and privacy requirements for adopting cloud computing in healthcare, these are of particular importance to researchers and practitioners interested in supporting the process of security and privacy engineering for health-cloud solutions. It further represents a supplement that can support time-intensive negotiation meetings between the requirements engineers and patients.

References

[1]
Imad M. Abbadi, Mina Deng, Marco Nalin, Andrew Martin, Milan Petkovic, Ilaria Baroni, and Alberto Sanna. 2011. Trustworthy middleware services in the cloud. In Proceedings of the 3rd ACM International Workshop on Cloud Data Management. 33--40.
[2]
Assad Abbas and Samee U. Khan. 2014. A review on the state-of-the-art privacy preserving approaches in the e-health clouds. IEEE J. Biomed. Health Inform. 18, 4 (2014), 1431--1441.
[3]
Philip Achimugu, Ali Selamat, Roliana Ibrahim, and Mohd Naz’ri Mahrin. 2014. A systematic literature review of software requirements prioritization research. Info. Softw. Technol. 56, 6 (2014), 568--585.
[4]
Sanjay P. Ahuja, Sindhu Mani, and Jesus Zambrano. 2012. A survey of the state of cloud computing in healthcare. Netw. Commun. Technol. 1, 2 (2012), 12--19.
[5]
Yazan Al-Issa, Mohammad Ashraf Ottom, and Ahmed Tamrawi. 2019. eHealth cloud security challenges: A survey. J. Healthcare Eng. 2019, 1 (Sep. 2019), 1--15.
[6]
Jessica S. Ancker, Alison M. Edwards, Melissa C. Miller, and Rainu Kaushal. 2012a. Consumer perceptions of electronic health information exchange. American J. Prevent. Med. 34, 1 (2012), 76--80.
[7]
Jessica S. Ancker, Michael Silver, Melissa C. Miller, and Rainu Kaushal. 2012b. Consumer experience with and attitudes toward health information technology: A nationwide survey. Amer. Med. Inform. Assoc. 20, 1 (2012), 152--156.
[8]
Catherine L. Anderson and Ritu Agarwal. 2011. The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information. Info. Syst. Res. 22, 3 (2011), 469--490.
[9]
Jason Andress. 2014. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress.
[10]
Corey M. Angst and Ritu Agarwal. 2009. Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS Quart. 2, 33 (2009), 339--370.
[11]
Corey M. Angst, Ritu Agarwal, and Janelle Downing. 2006. An empirical examination of the importance of defining PHR for research and for practice. Robert H. Smith School Research Paper No. RHS-06-011 (2006).
[12]
Radha Appan and Glenn J. Browne. 2012. The impact of analyst-induced misinformation on the requirements elicitation process. MIS Quart. 36, 1 (2012), 85--106.
[13]
Ajit Appari and M. Eric Johnson. 2010. Information security and privacy in healthcare: Current state of research. Int. J. Internet Enterprise Manage. 6, 4 (2010), 279--314.
[14]
EKOS Research Associates. 2007. Electronic Health Information and Privacy Survey: What Canadians Think—2007. Technical Report. EKOS. Retrieved from https://www.infoway-inforoute.ca/en/component/edocman/resources/reports/privacy/14-ekos-survey-on-electronic-health-information-and-privacy-full.
[15]
Giuseppe Ateniese, Reza Curtmola, Breno De Medeiros, and Darren Davis. 2003. Medical information privacy assurance: Cryptographic and system aspects. In Security in Communication Networks. Springer, 199--218.
[16]
Pat Auger, Timothy M. Devinney, and Jordan J. Louviere. 2007. Using best--worst scaling methodology to investigate consumer ethical beliefs across countries. J. Bus. Ethics 70, 3 (2007), 299--326.
[17]
Aman Banerjee, Brenda Zosa, Debra Allen, Patricia A. Wilczewski, Robert Ferguson, and Jeffrey A. Claridge. 2016. Implementation of an image sharing system significantly reduced repeat computed tomographic imaging in a regional trauma system. J. Trauma Acute Care Surg. 80, 1 (2016), 51--4.
[18]
Gaurav Bansal and Rebecca Davenport. 2010. Moderating role of perceived health status on privacy concern factors and intentions to transact with high versus low trustworthy health website. In Proceedings of the 5th Midwest Association for Information Conference (MWAIS’10).
[19]
Gaurav Bansal and Fatemeh “Mariam” Zahedi. 2010. Trading trust for discount: Does frugality moderate the impact of privacy and security concerns? In Proceedings of the 16th Americas Conference on Information Systems (AMCIS’10).
[20]
Gaurav Bansal, Fatemeh “Mariam” Zahedi, and David Gefen. 2007. The impact of personal dispositions on privacy and trust in disclosing health information online. In Proceedings of the 13th Americas Conference on Information Systems (AMCIS’07).
[21]
Gaurav Bansal, Fatemeh “Miriam” Zahedi, and David Gefen. 2008. Efficacy of privacy assurance mechanisms in the context of disclosing health information online. In Proceedings of the 14th Americas Conference on Information Systems (AMCIS’08).
[22]
Gaurav Bansal, Fatemeh “Mariam” Zahedi, and David Gefen. 2010. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information. Online Decis. Supp. Syst. 49, 2 (2010), 138--150.
[23]
Johannes Barnickel, Hakan Karahan, and Ulrike Meyer. 2010. Security and privacy for mobile electronic health monitoring and recording systems. In Proceedings of the IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks. 1--6.
[24]
Randolph C. Barrows and Paul D. Clayton. 1996. Privacy, confidentiality, and electronic medical records. J. Amer. Med. Inform. Assoc. 3, 2 (1996), 139--148.
[25]
Sujoy Basu, Alan Karp, Jun Li, Jim Pruyne, Jerry Rolia, Sharad Singhal, Jaap Suermondt, and Ram Swaminathan. 2012. Fusion: Managing healthcare records at cloud scale. Computer 45, 11 (Nov. 2012), 42--49.
[26]
Hans Baumgartner and Jan-Benedict E. M. Steenkamp. 2001. Response styles in marketing research: A cross-national investigation. J. Market. Res. 38, 2 (2001), 143--156.
[27]
Md. Rizwan Beg, Qamar Abbas, and Ravi Prakash Verma. 2008. Interview process model for requirement elicitation. Int. J. Comput. Sci. Appl. 1, 2 (2008), 109--113.
[28]
Steven Bellman, Eric J. Johnson, Stephen J. Kobrin, and Gerald L. Lohse. 2004. International differences in information privacy concerns: A global survey of consumers. Info. Soc. 20, 5 (2004), 313--324.
[29]
Alexander Benlian, William Kettinger, Ali Sunyaev, and Till J. Winkler. 2018. The transformative value of cloud computing: A decoupling, platformization, and recombination theoretical framework. J. Manage. Info. Syst. 35, 3 (2018), 719--739.
[30]
Lynne “Sam” Bishop, Bradford J. Holmes, and Christopher M. Kelley. 2005. National Consumer Health Privacy Survey 2005. Technical Report. Forrester Research, Inc. Retrieved from http://www.chcf.org/publications/2005/11/national-consumer-health-privacy-survey-2005.
[31]
Corentin Burnay. 2016. Are stakeholders the only source of information for requirements engineers? Toward a taxonomy of elicitation information sources. ACM Trans. Manage. Info. Syst. 7, 3 (2016).
[32]
Carole Cadwalladr and Emma Graham-Harrison. 2018. Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. The Guardian. Retrieved from https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election.
[33]
Lingfeng Chen and Doan B. Hoang. 2011. Novel data protection model in healthcare cloud. In Proceedings of the 13th International Conference on High Performance Computing and Communications. 550--555.
[34]
Tzer-Shyong Chen, Chia-Hui Liu, Tzer-Long Chen, Chin-Sheng Chen, Jian-Guo Bau, and Tzu-Ching Lin. 2012a. Secure dynamic access control scheme of PHR in cloud computing.J. Med. Syst. 36, 6 (2012), 4005--4020.
[35]
Yu-Yi Chen, Jun-Chao Lu, and Jinn-Ke Jan. 2012b. A secure EHR system based on hybrid clouds. J. Med. Syst. 36, 5 (2012), 3375--3384.
[36]
Keith Chrzan and Megan Peitz. 2019. Best-worst scaling with many items. J. Choice Model. 30, 2019 (2019), 61--72.
[37]
William G. Cochran and Gertrude M. Cox. 1957. Experimental Designs (2nd ed.). John Wiley 8 Sons, New York.
[38]
Eli Cohen, Steve Goodman, and Eli Cohen. 2009. Applying best-worst scaling to wine marketing. Int. J. Wine Bus. Res. 21, 1 (2009), 8--23.
[39]
Steve Cohen. 2003. Maximum difference scaling: Improved measures of importance and preference for segmentation. In Proceedings of the Sawtooth Software Conference. 61--74.
[40]
Steven H. Cohen and Paul Markowitz. 2002. Renewing market segmentation: Some new tools to correct old problems. In Proceedings of the ESOMAR Congress. 595--612.
[41]
Steven H. Cohen and Leopoldo Neira. 2003. Measuring preference for product benefits across countries: Overcoming scale usage bias with maximum difference scaling. In Proceedings of the ESOMAR Latin America Conference.
[42]
Bill Davey and Kevin R. Parker. 2015. Requirements elicitation problems: A literature analysis. IssuesInform. Sci. Info. Technol. 12 (2015), 71--82.
[43]
Mohanad Dawoud and D. Turgay Altilar. 2017. Cloud-based e-health systems: Security and privacy challenges and solutions. In Proceedings of the 2nd IEEE International Conference on Computer Science and Engineering.
[44]
Bart De Decker, Mohamed Layouni, Hans Vangheluwe, and Kristof Verslype. 2008. A privacy-preserving eHealth protocol compliant with the belgian healthcare system. In Public Key Infrastructure. Springer, 118--133.
[45]
Tobias Dehling and Ali Sunyaev. 2014. Secure provision of patient-centered health information technology services in public networks—Leveraging security and privacy features provided by the German nationwide health information technology infrastructure. Electronic Markets 24, 2 (2014), 89--99.
[46]
Mina Deng, Marco Nalin, Milan Petković, Ilaria Baroni, and Abitabile Marco. 2012. Towards trustworthy health platform cloud. In Proceedings of the 9th VLDB Workshop. Springer, 162--175.
[47]
Mina Deng, Milan Petkovic, Marco Nalin, and Ilaria Baroni. 2011. A home healthcare system in the cloud—Addressing security and privacy challenges. In Proceedings of the IEEE International Conference on Cloud Computing. 549--556.
[48]
Tamara Dinev, Valentina Albano, Heng Xu, Alessandro D’Atri, and Paul Hart. 2012. Individual’s attitudes towards electronic health records—A privacy calculus perspective. Ann. Info. Syst. 19 (2012), 19--50.
[49]
Tamara Dinev, Heng Xu, Jeff H. Smith, and Paul Hart. 2013. Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts. European J. Info. Syst. 22 (2013), 295--316.
[50]
Saeede Eftekhari, Niam Yaraghi, Ranjit Singh, Ram Danturti Gopal, and Ram Ramesh. 2017. Do health information exchanges deter repetition of medical services? ACM Trans. Manage. Info. Syst. 8, 1 (2017).
[51]
Tatiana Ermakova, Benjamin Fabian, and Rüdiger Zarnekow. 2013a. Security and privacy system requirements for adopting cloud computing in healthcare data sharing scenarios. In Proceedings of the 19th Americas Conference on Information Systems. 1--8.
[52]
Tatiana Ermakova, Benjamin Fabian, and Rüdiger Zarnekow. 2014. Acceptance of health clouds—A privacy calculus perspective. In Proceedings of the 22nd European Conference on Information Systems (ECIS’14).
[53]
Tatiana Ermakova, Benjamin Fabian, and Rüdiger Zarnekow. 2016. Improving individual acceptance of health clouds through confidentiality assurance. J. Appl. Clin. Inform. 7, 4 (2016), 983--993.
[54]
Tatiana Ermakova, Jan Huenges, Koray Erek, and Rüdiger Zarnekow. 2013b. Cloud computing in healthcare—A literature review on current state of research. In Proceedings of the 19th Americas Conference on Information Systems (AMCIS’13). 1--8.
[55]
Benjamin Fabian, Annika Baumann, and Jessika Lackner. 2015a. Topological analysis of cloud service connectivity. Comput. Industr. Eng. 88 (Oct. 2015), 151--165.
[56]
Benjamin Fabian, Tatiana Ermakova, and Philipp Junghanns. 2015b. Collaborative and secure sharing of healthcare data in multi-clouds. Info. Syst. 48, March 2015 (March 2015), 132--150.
[57]
Benjamin Fabian, Seda Gürses, Maritta Heisel, Thomas Santen, and Holger Schmidt. 2010. A comparison of security requirements engineering methods. Require. Eng. 15, 1 (2010), 7--40.
[58]
FFIEC. 2008. Authentication in an Internet Banking Environment. Technical Report. Federal Financial Institutions Examination Council.
[59]
Adam Finn and Jordan J. Louviere. 1992. Determining the appropriate response to evidence of public concern: The case of food safety. J. Public Policy Market. 11, 2 (1992), 12--25.
[60]
Donald Firesmith. 2004. Prioritizing requirements. J. Object Technol. 3, 8 (2004), 35--48.
[61]
Terry N. Flynn, Jordan J. Louviere, Tim J. Peters, and Joanna Coast. 2007. Best--worst scaling: What it can do for health care research and how to do it. J. Health Econ. 26, 1 (2007), 171--189.
[62]
Hideo Fujita, Yuji Uchimura, Kayo Waki, Koji Omae, Ichiro Takeuchi, and Kazuhiko Ohe. 2013. Development and clinical study of mobile 12-lead electrocardiography based on cloud computing for cardiac emergency. Studies Health Technol. Inform. 192, 1 (Aug. 2013), 1077--1077.
[63]
Fangjian Gao and Ali Sunyaev. 2019. Context matters: A review of the determinant factors in the decision to adopt cloud computing in healthcare. Int. J. Info. Manage. 48 (2019), 120--138.
[64]
Fangjian Gao, Scott Thiebes, and Ali Sunyaev. 2016. Exploring cloudy collaboration in healthcare: An evaluation framework of cloud computing services for hospitals. In Proceedings of the 49th Hawaii International Conference on System Sciences (HICSS’16). 979--988.
[65]
Fangjian Gao, Scott Thiebes, and Ali Sunyaev. 2018. Rethinking the meaning of cloud computing for healthcare: A taxonomic perspective and future research directions. J. Med. Internet Res. 20, 7 (2018), e10041.
[66]
Margaret Gerteis. 1993. Through the Patient’s Eyes: Understanding and Promoting Patient-Centered Care. Jossey-Bass, San Francisco.
[67]
Ali Gholami, Anna-Sara Lind, Jane Reichel, Jan-Eric Litton, Ake Edlund, and Erwin Laure. 2014. Privacy threat modeling for emerging BiobankClouds. Procedia Comput. Sci. 37 (2014), 489--496.
[68]
Lena Griebel, Hans-Ulrich Prokosch, Felix Köpcke, Dennis Toddenroth, Jan Christoph, Ines Leb, Igor Engel, and Martin Sedlmayr. 2015. A scoping review of cloud computing in healthcare. MC Med. Inform. Decis. Mak. 15, 1 (2015).
[69]
Seda Gürses, Bettina Berendt, and Thomas Santen. 2006. Multilateral security requirements analysis for preserving privacy in ubiquitous environments. In Proceedings of the UKDU Workshop. 51--64.
[70]
Seda Gürses, Jens H. Jahnke, Christina Obry, Adeniyi Onabajo, Thomas Santen, and Morgan Price. 2005. Eliciting confidentiality requirements in practice. In Proceedings of the 15th Annual International Conference hosted by the IBM Centers for Advanced Studies. 101--116.
[71]
Seda Gürses and Thomas Santen. 2006. Contextualizing security goals: A method for multilateral security requirements elicitation. In Sicherheit, Vol. 6. 42--53.
[72]
John Haskew, Gunnar Rø, Kaori Saito, Kenrick Turner, George Odhiambo, Annah Wamae, Shahnaaz Sharif, and Tomohiko Sugishita. 2015. Implementation of a cloud-based electronic medical record for maternal and child health in rural Kenya. Int. J. Med. Inform. 84, 5 (2015), 349--354.
[73]
HHS. 2000. Summary of the HIPAA Privacy Rule. Technical Report. United States Department of Health 8 Human Services. Retrieved from https://www.hhs.gov/sites/default/files/privacysummary.pdf.
[74]
Jui-Chien Hsieh, Ai-Hsien Li, and Chung-Chi Yang. 2013. Mobile, cloud, and big data computing: Contributions, challenges, and new directions in telecardiology. Int. J. Environ. Res. Public Health 10, 11 (2013), 6131--53.
[75]
Jie Huang, Mohamed Sharaf, and Chin-Tser Huang. 2012. A hierarchical framework for secure and scalable EHR sharing and access control in multi-cloud. In Proceedings of the 41st International Conference on Parallel Processing Workshops. 279--287.
[76]
Hsin-Ginn Hwang, Hwai-En Han, Kuang-Ming Kuo, and Chung-Feng Liu. 2012. The differing privacy concerns regarding exchanging electronic medical records of Internet users in Taiwan. J. Med. Syst. 36, 6 (2012), 3783--3793.
[77]
IEEE. 1990. IEEE Standard Glossary of Software Engineering Terminology. Technical Report. C/S2ESC—Software 8 Systems Engineering Standards Committee.
[78]
Iulia Ion, Niharika Sachdeva, Ponnurangam Kumaraguru, and Srdjan Čapkun. 2011. Home is safer than the cloud! Privacy concerns for consumer cloud storage. In Proceedings of the 7th Symposium on Usable Privacy and Security.
[79]
Jennifer Israelson and Ebru Celikel Cankaya. 2012. A hybrid web based personal health record system shielded with comprehensive security. In Proceedings of the 45th Hawaii International Conference on System Science. 2958--2968.
[80]
Matthais Jarke and Kalle J. Lyytinen. 2015. Editorial: “Complexity of systems evolution: Requirements engineering perspective.” ACM Trans. Manage. Info. Syst. 5, 3 (2015).
[81]
Philipp Junghanns, Benjamin Fabian, and Tatiana Ermakova. 2016. Engineering of secure multi-cloud storage. Comput. Industry 83 (Dec. 2016), 108--120.
[82]
Hao-Yun Kao, Wen-Hsiung Wu, Tyng-Yeu Liang, King-The Lee, Ming-Feng Hou, and Hon-Yi Shi. 2015. Cloud-based service information system for evaluating quality of life after breast cancer surgery. PLoS ONE 10, 9 (2015), e0139252.
[83]
Argyro P. Karanasiou and Emile Douilhet. 2016. Never mind the data: The legal quest over control of information 8 the networked self. In Proceedings of the IEEE International Conference on Cloud Engineering Workshop (IC2EW’16).
[84]
Joachim Karlsson. 1996. Software requirements prioritizing. In Proceedings of the 2nd International Conference on Requirements Engineering. 110--116.
[85]
Tatiana King, Ljiljana Brankovic, and Patricia Gillard. 2011. Perspectives of Australian adults about protecting the privacy of their health information in statistical databases. J. Med. Inform. 81 (2011), 279--289.
[86]
Kyriakos Kritikos and Dimitris Plexousakis. 2009. Mixed-integer programming for QoS-based web service matchmaking. IEEE Trans. Services Comput. 2, 2 (2009), 122--139.
[87]
Raoul Kübler. 2012. Essays on corporate communication: Empirical applications to product recall communication and advertising creativity. PhD Dissertation, University of Kiel, Faculty of Business, Economics and Social Sciences.
[88]
K. M. Kuo, C. C. Ma, and J. W. Alexander. 2013. How do patients respond to violation of their information privacy. Health Info. Manage. J. 43, 2 (2013), 23--33.
[89]
Mu-Hsing Kuo. 2011. Opportunities and challenges of cloud computing to improve health care services. J. Med. Internet Res. 13, 3 (2011), e67.
[90]
Deborah Beranek Lafky and Thomas A. Horan. 2011. Personal health records: Consumer attitudes toward privacy and security of their personal health information. Health Inform. J. 17, 1 (2011), 63--71.
[91]
Butler Lampson. 2009. Privacy and security Usable security: How to get it. Commun. ACM 52, 11 (2009), 25--27.
[92]
Jens Lansing, Stephan Schneider, and Ali Sunyaev. 2013. Cloud service certifications: Measuring consumers’ preferences for assurances. In Proceedings of the 21st European Conference on Information Systems (ECIS’13). 1--12.
[93]
Michael V. Laric, Dennis A. Pitta, and Lea Prevel Katsanis. 2009. Consumer concerns for healthcare information privacy: A comparison of US and Canadian perspectives. Res. Healthcare Financial Manage. 12, 1 (2009), 93--111.
[94]
Rabia Latif, Haider Abbas, and Saïd Assar. 2014. Distributed denial of service (DDoS) attack in cloud-assisted wireless body area networks: A systematic literature review. J. Med. Syst. 38, 11 (2014), 128.
[95]
Julie Anne Lee, Geoffrey N. Soutar, and Jordan Louviere. 2007. Measuring values using best-worst scaling: The LOV example. Psychol. Market. 24, 12 (2007), 1043--1058.
[96]
Pierre Legendre. 2005. Species associations: The kendall coefficient of concordance revisited. J. Agric. Biol. Environ. Stat. 10, 2 (2005), 226--245.
[97]
Yair Levy and Timothy J. Ellis. 2006. A systems approach to conduct an effective literature review in support of information systems research. Inform. Sci. J. 9 (2006), 181--212.
[98]
Ming Li, Shucheng Yu, Ning Cao, and Wenjing Lou. 2011b. Authorized private keyword search over encrypted personal health records in cloud computing. In Proceedings of the 31st IEEE International Conference on Distributed Computing Systems. 383--392.
[99]
Ming Li, Shucheng Yu, Kui Ren, and Wenjing Lou. 2010. Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In Security and Privacy in Communication Networks, S. Jajodia and J. Zhou (Eds.). Vol. 50. Springer, 89--106.
[100]
Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou. 2012. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24, 1 (2012), 131--143.
[101]
Zhuo-Rong Li, En-Chi Chang, Kuo-Hsuan Huang, and Feipei Lai. 2011a. A secure electronic medical record sharing mechanism in the cloud computing platform. In Proceedings of the IEEE 15th International Symposium on Consumer Electronics. 98--103.
[102]
Angela Lin and Nan-Chou Chen. 2012. Cloud computing as an innovation: Perception, attitude, and adoption. Int. J. Info. Manage. 32, 6 (2012), 533--540.
[103]
Che-Wei Lin, Shabbir Syed Abdul, Daniel L. Clinciu, Jeremiah Scholl, Xiangdong Jin, Haifei Lu, Steve S. Chen, Usman Iqbal, Maxwell J. Heineck, and Yu-Chuan Li. 2014a. Empowering village doctors and enhancing rural healthcare using cloud computing in a rural area of mainland China. Comput. Methods Programs Biomed. J. 113, 2 (2014).
[104]
Chia-Yung Lin, Kang-Lin Peng, Ji Chen, Jui-Yuan Tsai, Yu-Chee Tseng, Jhih-Ren Yang, and Min-Huey Chen. 2014b. Improvements in dental care using a new mobile app with cloud services. J. Formosan Med. Assoc. 113, 10 (2014), 742--9.
[105]
Hans Löhr, Ahmad-Reza Sadeghi, and Marcel Winandy. 2010. Securing the e-health cloud. In Proceedings of the 1st ACM International Health Informatics Symposium. 220--229.
[106]
James Manyika, Michael Chui, Jacques Bughin, Richard Dobbs, Peter Bisson, and Alex Marrs. 2013. Disruptive Technologies: Advances That Will Transform Life Business and the Global Economy. Technical Report. McKinsey Global Institute. Retrieved from http://wwwmckinseycom/insights/business_technology/disruptive_technologies.
[107]
Anthony A. J. Marley and Jordan J. Louviere. 2005. Some probabilistic models of best, worst, and best--worst choices. J. Math. Psychol. 49, 6 (2005), 464--480.
[108]
A. A. J. Marley and T. N. Flynn. 2014. Best worst scaling: Theory and methods. In Handbook of Choice Modelling, S. Hess and A. Daly (Eds.). 178--201.
[109]
E. J. Melício Monteiro, C. Costa, and J. L. Oliveira. 2016. A cloud architecture for teleradiology-as-a-service. Methods Info. Med. 53, 5 (2016), 203--14.
[110]
Peter Mell and Timothy Grance. 2011. The NIST Definition of Cloud Computing. Technical Report. National Institute of Standards and Technology (NIST). Retrieved from http://csrcnistgov/publications/nistpubs/800-145/SP800-145pdf.
[111]
Frank Moisiadis. 2002. The fundamentals of prioritizing requirements. In Proceedings of Systems Engineering Test and Evaluation Conference.
[112]
Karthikeyan Nagarajan and R. Sukanesh. 2012. Cloud based emergency health care information service in India. J. Med. Syst. 36, 6 (2012), 4031--6.
[113]
Sharyl J. Nass, Laura A. Levit, and Lawrence O. Gostin (Eds.). 2009. Beyond the HIPAA Privacy Rule: Enhancing Privacy. Improving Health Through Research. National Academies Press, WA.
[114]
Pantelis Natsiavas, Christine Kakalou, Konstantinos Votis, Dimitrios Tzovaras, Nicos Maglaveras, and Vassilis Koutkias. 2019. Requirements elicitation for secure and interoperable cross-border health data exchange: The KONFIDO study. Instit. Eng. Technol. 13, 3 (2019), 203--210.
[115]
Azadeh Nematzadeh and L. Jean Camp. 2010. Threat analysis of online health information system. In Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments. 1--7.
[116]
Edmund A. M. Neugebauer, Holger Pfaff, Matthias Schrappe, and Gerd Glaeske. 2008. Versorgungsforschung -- Konzept, Methoden und Herausforderungen. In Prävention und Versorgungsforschung: Ausgewählte Beiträge des 2. Nationalen Präventionskongresses und 6. Deutschen Kongresses für Versorgungsforschung, Dresden 24. bis 27. Oktober 2007.
[117]
Patricia A. Norberg, Dan Horne, and David Horne. 2007. The privacy paradox: Personal information disclosure intentions versus behaviors. J. Consumer Affairs 41, 1 (2007), 100--126.
[118]
Ch. Padmini, Sk. Salamuddin, and S. Suresh Babu. 2013. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. Int. J. Recent Innovat. Trends Comput. Commun. 1, 8 (2013), 679--681.
[119]
European Parliament and Council. 2016. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Retrieved from eur-lex.europa.eu.
[120]
Gihan Perera, Anne Holbrook, Lehana Thabane, Gary Foster, and Donald J. Willison. 2011. Views on health information sharing and privacy from primary care practices using electronic medical records. Int. J. Med. Inform. 80, 2 (2011), 94--101.
[121]
John D. Piette, Milton O. Mendoza-Avelares, Martha Ganser, Muhima Mohamed, Nicolle Marinec, and Sheila Krishnan. 2011. A preliminary study of a cloud-computing model for chronic illness self-care support in an underdeveloped country. American J. Prevent. Med. 40, 6 (2011), 629--32.
[122]
Pascoe Pleasence, Nigel J. Balmer, and Catrina Denvir. 2015. How People Understand and Interact with the Law. Technical Report. Legal Education Foundation. Retrieved from https://www.thelegaleducationfoundation.org/wp-content/uploads/2015/12/HPUIL_report.pdf.
[123]
Juha Puustjärvi and Leena Puustjärvi. 2013. Practising cloud-based telemedicine in developing countries. Int. J. Electron. Healthcare 7, 3 (2013), 181--204.
[124]
Kai Rannenberg, Andreas Pfitzmann, and Günther Müller. 1999. IT security and multilateral security. In Multilateral Security in Communications — Technology, Infrastructure, Economy, Günther Müller and Kai Rannenberg (Eds.), Vol. 3. Addison-Wesley-Longman, München, 21--29.
[125]
Thomas C. Rindfleisch. 1997. Privacy, information technology, and health care. Commun. ACM 40, 8 (1997), 92--100.
[126]
Laurie A. Rinehart-Thompson. 2008. Storage media profiles and health record retention practice patterns in acute care hospitals. Perspect. Health Info. Manage. 5, 9 (2008).
[127]
F. Riordan, C. Papoutsi, J. E. Reed, C. Marston, D. Bell, and A. Majeed. 2015. Patient and public attitudes towards informed consent models and levels of awareness of electronic health records in the UK. Int. J. Med. Inform. 84, 4 (2015), 237--247.
[128]
J. P. C. Rodrigues, I. de la Torre, G. Fernández, and M. López-Coronado. 2013. Analysis of the security and privacy requirements of cloud-based electronic health records systems. J. Med. Internet Res. 15, 8 (2013), e186.
[129]
Andrew J. Rohm and George R. Milne. 2004. Just what the doctor ordered—The role of information sensitivity and trust in reducing medical information privacy concerns. J. Bus. Res. 57, 9 (2004), 1000--1011.
[130]
Abhik Roy, Peter G. P. Walters, and Sherriff T. K. Luk. 2001. Chinese puzzles and paradoxes: Conducting business research in China. J. Bus. Res. 52, 2 (2001), 203--210.
[131]
Chris Rupp. 2005. UML 2 glasklar: Praxiswissen für die UML-Modellierung und-Zertifizierung. Carl Hanser Verlag, München.
[132]
Thomas L. Saaty. 1990. How to make a decision: The analytic hierarchy process. European J. Operat. Res. 48, 1 (1990), 9--26.
[133]
John P. Sahlin. 2013. Chapter cloud computing: Past, present, and future. In Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing, Xiaoyu Yang and Lu Liu (Eds.). Business Science Reference, 19--50.
[134]
Anam Sajid and Haider Abbas. 2016. Data privacy in cloud-assisted healthcare systems: State of the art and future challenges. J. Med. Syst. 40, 6 (2016), 155.
[135]
Ravi S. Sandhu, Edward J. Coynek, Hal L. Feinsteink, and Charles E. Youman. 1996. Role-based access control models. IEEE Comput. 29, 2 (1996).
[136]
Roy C. Schmidt. 1997. Managing delphi surveys using nonparametric statistical techniques. Decision Sci. J. 28 (1997), 763--774.
[137]
S. G. Shini, Tony Thomas, and K. Chithraranjan. 2012. Cloud based medical image exchange-security challenges. Procedia Eng. 38 (2012), 3454--3461.
[138]
R. Shirey. 2000. Internet Security Glossary. Technical Report. The Internet Society. Retrieved from https://www.ietf.org/rfc/rfc2828.txt.
[139]
Steven R. Simon, J. Stewart Evans, Alison Benjamin, David Delano, and David W. Bates. 2009. Patients’ attitudes toward electronic health information exchange: Qualitative study. J. Med. Internet Res. 11, 3 (2009), e30.
[140]
H. Jeff Smith, Sandra Milberg, Sandra Milberg, and Sandra J. Burke. 1996. Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quart. 20, 2 (1996), 167--196.
[141]
Ian Sommerville and Pete Sawyer. 1997. Requirements Engineering: A Good Practice Guide. John Wiley 8 Sons, Chichester.
[142]
Ed Sperling. 2009. Measuring IT security costs. Forbes (2009). Retrieved from https://www.forbes.com/2009/02/07/security-information-tech-technology-cio-network_0209_security.html.
[143]
William Stallings. 2003. Cryptography and Network Security: Principles and Practice (international 3rd ed.). Pearson Education, Upper Saddle River, NJ.
[144]
Nabil Sultan. 2014a. Discovering the potential of cloud computing in accelerating the search for curing serious illnesses. Int. J. Info. Manage. 34, 2 (2014), 221--225.
[145]
Nabil Sultan. 2014b. Making use of cloud computing for healthcare provision: Opportunities and challenges. Int. J. Info. Manage. 34, 2 (2014), 177--184.
[146]
Ali Sunyaev. 2020. Cloud Computing. Springer International Publishing, Cham, 195--236.
[147]
TAPAS. 2004. TAPAS security requirements. Retrieved from http://opentapas.org/.
[148]
Amanda L. Terry, Bert M. Chesworth, Paul Stolee, Robert B. Bournee, and Mark Speechley. 2007. Joint replacement recipients’ post-surgery views about health information privacy and registry participation. Health Policy 85 (2007), 293--304.
[149]
Scott Thiebes, Kalle Lyytinen, and Ali Sunyaev. 2017. Sharing is about caring? Motivating and discouraging factors in sharing individual genomic data. In Proceedings of the 38th International Conference on Information Systems (ICIS’17).
[150]
Louis L. Thurstone. 1994. A law of comparative judgment. Psychol. Rev. 101, 2 (1994), 266--270.
[151]
Yaacov Trope and Nira Liberman. 2010. Construal-level theory of psychological distance. Psychol. Rev. 117, 2 (2010), 440--463.
[152]
TRUSTe/NCSA. 2016. 2016 TRUSTe/NCSA Consumer Privacy Infographic—U.S. Edition. Technical Report. TRUSTe/NCSA. Retrieved from www.trustarc.com.
[153]
Helma van der Linden, Dipak Kalra, Arie Hasman, and Jan Talmon. 2009. Inter-organizational future proof EHR systems: A review of the security and privacy related issues. Int. J. Med. Inform. 78, 3 (2009), 141--160.
[154]
Jan vom Brocke, Alexander Simons, Bjoern Niehaves, Bjorn Niehaves, Kai Reimer, Ralf Plattfaut, and Anne Cleven. 2009. Reconstructing the giant: On the importance of rigour in documenting the literature search process. In Proceedings of the 17th European Conference on Information Systems.
[155]
Jan vom Brocke, Alexander Simons, Kai Riemer, Bjoern Niehaves, Ralf Plattfaut, and Anne Cleven. 2015. Standing on the shoulders of giants: Challenges and recommendations of literature search in information systems research. Commun. Assoc. Info. Syst. 37 (2015), 205--224.
[156]
J. Wainer, C. J. R. Campos, M. D. U. Salinas, and D. Sigulem. 2008. Security requirements for a lifelong electronic health record system: An opinion. Open Med. Inform. J. 2 (2008), 160--165.
[157]
Jane Webster and Richard T. Watson. 2002. Analyzing the past to prepare for the future: Writing a literature review. MIS Quart. 26, 2 (2002), 13--23.
[158]
Shao-Jen Weng, Donald Gotcher, Hsin-Hung Wu, Yeong-Yuh Xu, Ching-Wen Yang, and Lai-Shiun Lai. 2016. Cloud image data center for healthcare network in Taiwan. J. Med. Sys. 40, 4 (2016), 89.
[159]
Melinda Whetstone and Ronald Goldsmith. 2009. Factors influencing intention to use personal health records. Int. J. Pharm. Healthcare Market. 3, 1 (2009), 8--25.
[160]
Richard Whiddett, Inga Hunter, Judith Engelbrecht, and Jocelyn Handy. 2006. Patients’ attitudes towards sharing their health information. Int. J. Med. Inform. 75, 7 (2006), 530--541.
[161]
Wiktoria Wilkowska and Martina Ziefle. 2012. Privacy and data security in e-health: Requirements from the user’s perspective. Health Inform. J. 18, 3 (2012), 191--201.
[162]
Haibo Yang and Mary Tate. 2012. A descriptive literature review and classification of cloud computing research. Commun. Assoc. Info. Syst. 31 (2012), 35--60.
[163]
Ka-Ping Yee. 2004. Aligning security and usability. IEEE Secur. Privacy 2, 5 (2004), 48--55.
[164]
Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou. 2010. Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of the 29th Conference on Information Communications. 534--542.
[165]
Rui Zhang and Ling Liu. 2010. Security models and requirements for healthcare application clouds. In Proceedings of the 3rd International Conference on Computer Science and Education. 268--275.

Cited By

View all
  • (2024)Significance of Cloud Computing in the Healthcare Industry and Digital InfrastructureInfrastructure Development Strategies for Empowerment and Inclusion10.4018/979-8-3693-2917-7.ch016(341-362)Online publication date: 31-May-2024
  • (2024)Systematic Literature Review of Cloud Computing Research Between 2010 and 2023Digital Transformation in the Viral Age10.1007/978-3-031-60003-6_5(64-88)Online publication date: 21-May-2024
  • (2024)Quantum encryption of healthcare imagesSecurity and Privacy10.1002/spy2.3917:5Online publication date: 18-Apr-2024
  • Show More Cited By

Index Terms

  1. Security and Privacy Requirements for Cloud Computing in Healthcare: Elicitation and Prioritization from a Patient Perspective

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Transactions on Management Information Systems
        ACM Transactions on Management Information Systems  Volume 11, Issue 2
        Research Commentary
        June 2020
        115 pages
        ISSN:2158-656X
        EISSN:2158-6578
        DOI:10.1145/3398026
        Issue’s Table of Contents
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 03 May 2020
        Accepted: 01 February 2020
        Revised: 01 October 2019
        Received: 01 February 2017
        Published in TMIS Volume 11, Issue 2

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Cloud computing
        2. healthcare
        3. privacy
        4. requirements
        5. security

        Qualifiers

        • Research-article
        • Research
        • Refereed

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)189
        • Downloads (Last 6 weeks)28
        Reflects downloads up to 20 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Significance of Cloud Computing in the Healthcare Industry and Digital InfrastructureInfrastructure Development Strategies for Empowerment and Inclusion10.4018/979-8-3693-2917-7.ch016(341-362)Online publication date: 31-May-2024
        • (2024)Systematic Literature Review of Cloud Computing Research Between 2010 and 2023Digital Transformation in the Viral Age10.1007/978-3-031-60003-6_5(64-88)Online publication date: 21-May-2024
        • (2024)Quantum encryption of healthcare imagesSecurity and Privacy10.1002/spy2.3917:5Online publication date: 18-Apr-2024
        • (2023)Rehabilomics Strategies Enabled by Cloud-Based Rehabilitation: A Scoping Review (Preprint)Journal of Medical Internet Research10.2196/54790Online publication date: 21-Nov-2023
        • (2023)Investigating Healthcare 4.0 Transition Through a Knowledge Management PerspectiveIEEE Transactions on Engineering Management10.1109/TEM.2022.320088970:9(3297-3310)Online publication date: Sep-2023
        • (2023)Design Concerns for Multiorganizational, Multistakeholder Collaboration: A Study in the Healthcare IndustryJournal of Management Information Systems10.1080/07421222.2023.217277140:1(239-270)Online publication date: 30-Mar-2023
        • (2023)Blockchain based efficient tamper-proof EHR storage for decentralized cloud-assisted storageAlexandria Engineering Journal10.1016/j.aej.2023.01.01268(205-226)Online publication date: Apr-2023
        • (2023)Secure transfer of robust healthcare data using blockchain-based privacyCluster Computing10.1007/s10586-023-04011-z27:2(1275-1291)Online publication date: 9-May-2023
        • (2022)PUF-PSS: A Physically Secure Privacy-Preserving Scheme Using PUF for IoMT-Enabled TMISElectronics10.3390/electronics1119308111:19(3081)Online publication date: 27-Sep-2022
        • (2022)A Quantitative Comparative Study of Data-oriented Trust Management Schemes in Internet of ThingsACM Transactions on Management Information Systems10.1145/347624813:3(1-30)Online publication date: 13-Apr-2022
        • Show More Cited By

        View Options

        Login options

        Full Access

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media