A Systematic Review of Privacy-Aware Cloud Framework for Medical Secure E-Governance Data Processing

Authors

  • Qing Guan Faculty of Information Technology, City University Malaysia, Petaling Jaya, Selangor, Malaysia 46100; Gannan University of Science and Technology, Ganzhou, Jiangxi, China 341000
  • Mustafa Muwafak Alobaedy Faculty of Information Technology, City University Malaysia, Petaling Jaya, Selangor, Malaysia 46100; 4Faculty of Computing and Informatics, Multimedia University, Cyberjaya, Selangor, Malaysia 63100
  • Mohd Nurul Hafiz Bin Ibrahim Faculty of Information Technology, City University Malaysia, Petaling Jaya, Selangor, Malaysia 46100
  • S. B. Goyal Chitkara University Institute of Engineering & Technology, Rajpura, Punjab, India 140401

DOI:

https://doi.org/10.57159/jcmm.5.1.25222

Keywords:

Systematic Review, E-Governance, Cloud Computing, Data Privacy, Encryption

Abstract

Cloud computing has greatly increased the effectiveness of e-governance, but there are also significant concerns about data security and privacy. The paper presents an in-depth evaluation of privacy-focused cloud architectures for the secure processing of medical e-governance data, in line with PRISMA. The study examined 72 peer-reviewed articles published after 2013 from IEEE Xplore, the ACM Digital Library, ScienceDirect, and SpringerLink. The study researched technologies, including AI-driven anomaly detection, hybrid cloud architecture, blockchain-enabled access management, and homomorphic encryption. This review organizes the available frameworks and evaluates how well they performed in previous studies. To build greater trust in digital governance systems, future trends point to lightweight encryption, cross-device functionality, and AI-powered security solutions. This in-depth examination of privacy-conscious frameworks identifies weaknesses in the research and offers helpful tips for both researchers and policymakers. The results indicate gaps in existing methodologies, thereby facilitating the development of e-governance infrastructures that are more secure, cost-efficient, and scalable, thereby enabling effective healthcare applications.

References

V. Grigalashvili, “E-government and e-governance: Various or multifarious concepts,” International Journal of Scientific and Management Research, vol. 5, no. 01, pp. 183–196, 2022.

A. Raza, “A review of cybersecurity threats in e-government systems: Towards secure digital governance,” Multidisciplinary Research in Computing Information Systems, vol. 4, no. 3, pp. 131–142, 2024.

D. Korobenko, A. Nikiforova, and R. Sharma, “Towards a privacy and security-aware framework for ethical ai: Guiding the development and assessment of ai systems,” in Proceedings of the 25th Annual International Conference on Digital Government Research, pp. 740–753, 2024.

A. Meri, M. K. Hasan, M. Dauwed, M. Jarrar, A. Aldujaili, M. Al-Bsheish, S. Shehab, and H. M. Kareem, “Organizational and behavioral attributes’ roles in adopting cloud services: An empirical study in the healthcare industry,” Plos one, vol. 18, no. 8, p. e0290654, 2023.

G. Lichtenheim, Transforming E-Governance with Cloud-Based AI: A Systems Methodology for Implementation. PhD thesis, Stevens Institute of Technology, 2024.

A. Carrera-Rivera, W. Ochoa, F. Larrinaga, and G. Lasa, “How-to conduct a systematic literature review: A quick guide for computer science research,” MethodsX, vol. 9, p. 101895, 2022.

D. Lakshmi and A. K. Tyagi, eds., Emerging Technologies and Security in Cloud Computing. Hershey, PA, USA: IGI Global, 2024.

M. Mubeen, M. Arslan, and G. Anandhi, “Strategies to avoid illegal data access,” Journal of Communication Engineering & Systems, vol. 12, no. 3, pp. 29–40, 2022.

P. K. Soni and H. Dhurwe, “Challenges and open issues in cloud computing services,” in Advanced Computing Techniques for Optimization in Cloud, pp. 19–37, Chapman and Hall/CRC, 2024.

Y. Jiang, Y. Zhou, and T. Feng, “A blockchain-based secure multi-party computation scheme with multi-key fully homomorphic proxy re-encryption,” Information, vol. 13, no. 10, p. 481, 2022.

A. A. Solanke, “Sovereign cloud implementation: Technical architectures for data residency and regulatory compliance,” Int. J. Sci. Res. Arch, vol. 11, no. 2, pp. 2136–2147, 2024.

B. K. Gudepu and R. Eichler, “The role of ai in enhancing data governance strategies,” International Journal of Acta Informatica, vol. 3, no. 1, pp. 169–186, 2024.

M. N. I. Khan, “A systematic review of legal technology adoption in contract management, data governance, and compliance monitoring,” American Journal of Interdisciplinary Studies, vol. 3, no. 01, pp. 01–30, 2022.

A. Javadpour, F. Ja’fari, T. Taleb, Y. Zhao, B. Yang, and C. Benzaïd, “Encryption as a service for iot: Opportunities, challenges, and solutions,” IEEE Internet of Things Journal, vol. 11, no. 5, pp. 7525–7558, 2023.

K. Pampattiwar and P. Chavan, “A secure and scalable blockchain-based model for electronic health record management,” Scientific Reports, vol. 15, no. 1, p. 11612, 2025.

M. Elhoseny, A. Abdelaziz, A. S. Salama, A. M. Riad, K. Muhammad, and A. K. Sangaiah, “A hybrid model of internet of things and cloud computing to manage big data in health services applications,” Future generation computer systems, vol. 86, pp. 1383–1394, 2018.

S. Carpov, T. H. Nguyen, R. Sirdey, G. Constantino, and F. Martinelli, “Practical privacy-preserving medical diagnosis using homomorphic encryption,” in 2016 ieee 9th international conference on cloud computing (cloud), pp. 593–599, IEEE, 2016.

M. Goswami, “Ai-based anomaly detection for real-time cybersecurity,” International journal of research and review techniques, vol. 3, no. 1, pp. 45–53, 2024.

P. R. Joshi, S. Islam, and S. Islam, “A framework for cloud based e-government from the perspective of developing countries,” Future Internet, vol. 9, no. 4, p. 80, 2017.

S. V. Subramanyam, “Cloud-based enterprise systems: Bridging scalability and security in healthcare and finance,” IJSAT-International Journal on Science and Technology, vol. 16, no. 1, 2025.

K. Abouelmehdi, A. Beni-Hessane, and H. Khaloufi, “Big healthcare data: preserving security and privacy,” Journal of big data, vol. 5, no. 1, p. 1, 2018.

I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, and S. U. Khan, “The rise of ‘big data’ on cloud computing: Review and open research issues,” Information systems, vol. 47, pp. 98–115, 2015.

M. Sharma and P. Sharma, “Artificial intelligence based anomaly detection for secure e-government transaction: A review,” International Journal of Research & Technology, vol. 13, no. 4, pp. 513–522, 2025.

W. Li, J. Wu, J. Cao, N. Chen, Q. Zhang, and R. Buyya, “Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions,” Journal of Cloud Computing, vol. 10, no. 1, p. 35, 2021.

H. Chen, K. Laine, and P. Rindal, “Fast private set intersection from homomorphic encryption,” in Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, pp. 1243–1255, 2017.

A. Al Badawi, Y. Polyakov, K. M. M. Aung, B. Veeravalli, and K. Rohloff, “Implementation and performance evaluation of rns variants of the bfv homomorphic encryption scheme,” IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 2, pp. 941–956, 2019.

I. Boumezbeur, K. Zarour, et al., “Improving privacy-preserving healthcare data sharing in a cloud environment using hybrid encryption,” Acta Informatica Pragensia, vol. 11, no. 3, pp. 361–379, 2022.

R. Hema, S. Yousuff, P. Kothari, A. Anandaraj, A. Rani, and C. Raman, “Hybrid blockchain-cloud architecture for secure e-governance solutions,” in 2025 Tenth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), pp. 1–10, IEEE, 2025.

A. Altherwi, M. T. Ahmad, M. M. Alam, H. Mirza, N. Sultana, A. A. Pasha, N. Sultana, A. I. Khan, M. M. Alam, and R. Azim, “A hybrid optimization approach for securing cloud-based e-health systems,” Multimedia Tools and Applications, vol. 84, no. 16, pp. 16525–16560, 2025.

L. Belli, W. B. Gaspar, and S. S. Jaswant, “Data sovereignty and data transfers as fundamental elements of digital transformation: Lessons from the brics countries,” Computer Law & Security Review, vol. 54, p. 106017, 2024.

S. Hashemi, K. Monfaredi, and M. Masdari, “Using cloud computing for e-government: challenges and benefits,” International Journal of Computer, Information, Systems and Control Engineering, vol. 7, no. 9, pp. 596–603, 2013.

K. Mahaphan, “Digital transformation in public services: Challenges and opportunities,” in Proceeding of International Conference on Social Science and Humanity, vol. 2, pp. 211–226, 2025.

T. Chen, Y. Yu, Z. Duan, J. Gao, and K. Lan, “Blockchain/abe-based fusion solution for e-government data sharing and privacy protection,” in Proceedings of the 2020 4th International Conference on Electronic Information Technology and Computer Engineering, pp. 258–264, 2020.

J. W. Rittinghouse and J. F. Ransome, Cloud computing: implementation, management, and security. CRC press, 2017.

S. Singh, Y.-S. Jeong, and J. H. Park, “A survey on cloud computing security: Issues, threats, and solutions,” Journal of Network and Computer Applications, vol. 75, pp. 200–222, 2016.

C. C. Agbo, Q. H. Mahmoud, and J. M. Eklund, “Blockchain technology in healthcare: a systematic review,” in Healthcare, vol. 7, p. 56, MDPI, 2019.

A. Alabdulatif, “Blockchain-based privacy-preserving authentication and access control model for e-health users,” Information, vol. 16, no. 3, p. 219, 2025.

I. Yaqoob, I. A. T. Hashem, A. Gani, S. Mokhtar, E. Ahmed, N. B. Anuar, and A. V. Vasilakos, “Big data: From beginning to future,” International Journal of Information Management, vol. 36, no. 6, pp. 1231–1247, 2016.

B. Zaabar, O. Cheikhrouhou, F. Jamil, M. Ammi, and M. Abid, “Healthblock: A secure blockchain-based healthcare data management system,” Computer Networks, vol. 200, p. 108500, 2021.

N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, “A deep learning approach to network intrusion detection,” IEEE transactions on emerging topics in computational intelligence, vol. 2, no. 1, pp. 41–50, 2018.

Downloads

Published

28-02-2026

How to Cite

Guan, Q., Alobaedy, M. M., Ibrahim, M. N. H. B., & Goyal, S. B. (2026). A Systematic Review of Privacy-Aware Cloud Framework for Medical Secure E-Governance Data Processing. Journal of Computers, Mechanical and Management, 5(1), 76–92. https://doi.org/10.57159/jcmm.5.1.25222