Articles
| Open Access | The Convergence of Patient-Centric Cryptography and Automated Compliance: A Comprehensive Framework for Secure Cloud-Assisted Healthcare Monitoring and Algorithmic Auditing
Stella Antonelli , Department of Cyber-Physical Systems, National University of Singapore, SingaporeAbstract
The paradigm shift towards cloud-assisted healthcare has introduced unprecedented efficiencies in patient monitoring and data management, yet it has simultaneously exposed sensitive medical information to a diverse array of cyber threats and regulatory complexities. This research provides an exhaustive analysis of the security architectures required to protect e-health infrastructures, focusing on the synthesis of patient-centric access control, compressive sensing, and automated compliance frameworks. By evaluating state-of-the-art cryptographic methods such as Patient Controlled Encryption (PCE) and checkable attribute-based encryption, the study identifies the mechanisms through which data sovereignty can be returned to the individual. Furthermore, the article explores the emerging concept of HIPAA-as-Code, a methodology for embedding automated audit trails directly into machine learning pipelines within cloud environments. Through a systematic review of networking challenges and prioritization of security controls using fuzzy analytic hierarchy processes, the research delineates the transition from traditional perimeter-based security to a zero-trust, code-defined governance model. The findings suggest that while intelligent data management and biometric authentication significantly harden cloud defenses, the future of healthcare security lies in the seamless integration of privacy-aware compressive sensing and automated, continuous regulatory auditing.
Keywords
Cloud Computing Security, Patient-Centric Access Control, HIPAA-as-Code, Compressive Sensing
References
Barua M, Liang X, Lu R, Shen X. ESPAC: Enabling security and patient-centric access control for eHealth in cloud computing. Int. J. Sec. Networks. 2011;6(2/3):67–76.
Benaloh J, Chase M, Horvitz E, Lauter K. Patient controlled encryption: ensuring privacy of electronic medical records. CCSW ’09 Proceedings of the 2009 ACM workshop on cloud computing security. 2009;103–114.
Chen C, Yang T, Chiang M, Shih T. A privacy authentication scheme based on cloud for medical environment. J. Med. Syst. 2014;38:143.
Dashti W, Qureshi A, Jahangeer A, Zafar A. Security challenges over cloud environment from service provider prospective. Cloud Computing and Data Science. 2020;12–20.
Li J, Huang X, Li J, Chen X, Xiang Y. Securely Outsourcing Attribute-based Encryption with Checkability. IEEE Trans Parallel Distrib Syst. 2013.
Löhr H, Sadeghi A, Winandy M. Securing the e-health cloud. Proc. ACM Int. Conf. Health Inform. IHI ’10. 2010;220–229.
Mehraeen E, Ghazisaeedi M, Farzi J, Mirshekari SJ. Security challenges in healthcare cloud computing: a systematic review. Global Journal of Health Science. 2016;9(3):157.
Moura J, Hutchison D. Review and analysis of networking challenges in cloud computing. Journal of Network and Computer Applications. 2016;60:113–29.
Ogiela L, Ogiela MR, Ko H. Intelligent Data Management and Security in Cloud Computing. Sensors (Basel, Switzerland). 2020;20(12).
Shakil KA, Zareen FJ, Alam M, Jabin S. BAMHealthCloud: A biometric authentication and data management system for healthcare data in cloud. Journal of King Saud University-Computer and Information Sciences. 2020;32(1):57–64.
Tabrizchi H, Rafsanjani MK. A survey on security challenges in cloud computing: issues, threats, and solutions. The Journal of Supercomputing. 2020:1–40.
Tariq MI, Ahmed S, Memon NA, Tayyaba S, Ashraf MW, Nazir M, et al. Prioritization of Information Security Controls through Fuzzy AHP for Cloud Computing Networks and Wireless Sensor Networks. Sensors (Basel, Switzerland). 2020;20(5).
Varanasi, S. R. (2025b). HIPAA-AS-Code: Automated Audit Trails in AWS Sage Maker Pipelines. European Journal of Engineering and Technology Research, 10(5), 23–26. https://doi.org/10.24018/ejeng.2025.10.5.3287
Wang C, Zhang B, Ren K, Roveda JM, Wen Chen C, Xu Z. A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing. IEEE INFOCOM 2014. 2014;2130–2138.
Wu B, Wang C, Yao H. Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based Internet of things. PloS one. 2020;15(4):e0230722.
Download and View Statistics
Copyright License
Copyright (c) 2025 Stella Antonelli

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their manuscripts, and all Open Access articles are disseminated under the terms of the Creative Commons Attribution License 4.0 (CC-BY), which licenses unrestricted use, distribution, and reproduction in any medium, provided that the original work is appropriately cited. The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.

