Skip to main content

Table 3 Comparison among data sharing methods in the healthcare environment, taking into consideration the adopted methodology, aim, could accessibility, access control, and encryption technique

From: ReportFlow: an application for EEG visualization and reporting using cloud platform

First author

Method

Setting

Cloud accessibility

Access control

Encryption technique

Bertuccio

ReportFlow

EEGs data sharing for medical reporting

Public

RBAC

CP-ABE

Pugazhenthi

ID HKE

Securing and sharing of health data

Public

Not indicated

SE-KAC

Ahmed

CONNECT and ad hoc protocol

EHRs data sharing

Public

DAC

Not indicated

Basu

Fusion

EHRs data sharing and managing

Public and private

Not indicated

Symmetric

Marwan

Shamir’s secret share scheme

Securing health data

Public and private

Shamir’s secret share scheme

Shamir’s secret share scheme

Sneha

K-Anonymity

Securing and sharing of EHRs

Public

Not indicated

Re-encryption

Hwang

Data securing

Public

Not indicated

Knapsack public-key cryptosystem

Wei

EFADS

Data sharing for outsourcing data

Not indicated

Not indicated

Proxy re-encryption

Chu

Securing and sharing of scalable data

Public and private

Shamir’s secret share scheme

Key-aggregate encryption

Rezaeibagha

Securing and sharing of EHRs

Public and private

RBAC

Cryptographic building blocks for secret sharing

Thilakanathan

Ad hoc Java application

Securing and sharing of ECG data

Public

Not indicated

Public-key cryptography system

Tran

Securing and sharing of cloud-based social networks data

Public

Personal secret key to encrypt and decrypt data

Proxy re-encryption

  1. RBAC role-based access control, DAC discretionary access control, SE-KAC scalable and enhanced key-aggregate cryptosystem, CP-ABE Ciphertext-policy attribute-based encryption