Review Article

A Systematic Review of Security Mechanisms for Big Data in Health and New Alternatives for Hospitals

Table 1

Comparison of different security mechanisms in the literature.

PublicationSecurity mechanismProblem tackled

Wang et al. (2009) [38]CP-ABE schemeEncryptor leakage (leakage of randomness)
Cho et al. (2016) [31]Double layered architecturePrivacy invasion of personal users in big data
Liu et al. (2015) [32]Authenticator-based data integrity verification techniquesVerification of data integrity
Fabiano et al. (2015) [33]OpenSSL encryption packageLevel of security of data
Yan et al. (2016) [34]Proxy-based additive homomorphismInformation security of trusted suppliers
Zhou et al. (2015) [35]Chaos stochastic process and the Line Map principleImage security
Hsu et al. [36]Variant of the Diffie Hellman algorithmSecure transfer of data
Hingwe and Bhanu (2014) [37]Data encryption or double encryption for sensitive dataSecurity on cloud
Thilakanathan et al. (2014) [39]ElGamal algorithmSecurity in monitoring patients via remote devices
Cheng et al. (2014) [16]Splitting data in fragments and hash functionSecurity for a cloud supplier
Jing (2014) [18]AES encryption algorithm and RSA algorithmSecurity on the cloud
Subashini and Kavitha (2012) [40]Sensitive Data SegmentEnsuring the data