Review Article
A Systematic Review of Security Mechanisms for Big Data in Health and New Alternatives for Hospitals
Table 1
Comparison of different security mechanisms in the literature.
| Publication | Security mechanism | Problem tackled |
| Wang et al. (2009) [38] | CP-ABE scheme | Encryptor leakage (leakage of randomness) | Cho et al. (2016) [31] | Double layered architecture | Privacy invasion of personal users in big data | Liu et al. (2015) [32] | Authenticator-based data integrity verification techniques | Verification of data integrity | Fabiano et al. (2015) [33] | OpenSSL encryption package | Level of security of data | Yan et al. (2016) [34] | Proxy-based additive homomorphism | Information security of trusted suppliers | Zhou et al. (2015) [35] | Chaos stochastic process and the Line Map principle | Image security | Hsu et al. [36] | Variant of the Diffie Hellman algorithm | Secure transfer of data | Hingwe and Bhanu (2014) [37] | Data encryption or double encryption for sensitive data | Security on cloud | Thilakanathan et al. (2014) [39] | ElGamal algorithm | Security in monitoring patients via remote devices | Cheng et al. (2014) [16] | Splitting data in fragments and hash function | Security for a cloud supplier | Jing (2014) [18] | AES encryption algorithm and RSA algorithm | Security on the cloud | Subashini and Kavitha (2012) [40] | Sensitive Data Segment | Ensuring the data |
|
|