Healthcare SaaS Based on a Data Model with Built-In Security and Privacy

被引:24
作者
Asija, Ruchika [1 ]
Nallusamy, Rajarathnam [2 ]
机构
[1] Indira Gandhi Natl Open Univ, Sch Comp & Informat Sci, New Delhi, India
[2] Embnol Solut Private Ltd, Bangalore, Karnataka, India
关键词
Cloud Computing; Data Security; Healthcare; Privacy; Security;
D O I
10.4018/IJCAC.2016070101
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing is a major technology enabler for providing efficient services at affordable costs by reducing the costs of traditional software and hardware licensing models. As it continues to evolve, it is widely being adopted by healthcare organisations. But hosting healthcare solutions on cloud is challenging in terms of security and privacy of health data. To address these challenges and to provide security and privacy to health data on the cloud, the authors present a Software-as-a-Service (SaaS) application with a data model with built-in security and privacy. This data model enhances security and privacy of the data by attaching security levels in the data itself expressed in the form of XML instead of relying entirely on application level access controls. They also present the performance evaluation of their application using this data model with different scaling indicators. To further investigate the adoption of IT and cloud computing in Indian healthcare industry they have done a survey of some major hospitals in India.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 23 条
  • [1] Abdelkader H. S., 2012, P 8 IEEE INT C INF S
  • [2] Asija Ruchika, 2014, 2014 IEEE Global Humanitarian Technology Conference - South Asia Satellite (GHTC-SAS), P237, DOI 10.1109/GHTC-SAS.2014.6967590
  • [3] Bhattacharya J., 2012, J HLTH INFORM DEV CO
  • [4] A feedback min-max MPC algorithm for LPV systems subject to bounded rates of change of parameters
    Casavola, A
    Famularo, D
    Franzè, G
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2002, 47 (07) : 1147 - 1153
  • [5] Cloud Security Alliance (CSA), 2013, NOT 9 CLOUD COMP TOP
  • [6] Deng M., 2011, Proceedings of the 2011 IEEE 4th International Conference on Cloud Computing (CLOUD 2011), P549, DOI 10.1109/CLOUD.2011.108
  • [7] A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
    Deng, Mina
    Wuyts, Kim
    Scandariato, Riccardo
    Preneel, Bart
    Joosen, Wouter
    [J]. REQUIREMENTS ENGINEERING, 2011, 16 (01) : 3 - 32
  • [8] Doukas C, 2010, IEEE ENG MED BIO, P1037, DOI 10.1109/IEMBS.2010.5628061
  • [9] Fan XM, 2012, INT CONF CLOUD COMP, DOI 10.1109/CloudCom.2012.6427482
  • [10] Frost & Sullivan Research Service, 2013, HEALTHC INF TECHN MA