Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review

被引:40
作者
Ahmed, Afsheen [1 ]
Latif, Rabia [1 ]
Latif, Seemab [1 ]
Abbas, Haider [1 ]
Khan, Farrukh Aslam [2 ]
机构
[1] Natl Univ Sci & Technol, Islamabad, Pakistan
[2] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
关键词
Internet of Things; Cloud Computing; Multi-Cloud; Confidentiality; Integrity; E-Healthcare; Malicious Insiders; THREATS; INTERNET; THINGS;
D O I
10.1007/s11042-017-5540-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of Internet of Things (IoT) has introduced smart objects as the fundamental building blocks for developing a smart cyber-physical universal environment. The IoTs have innumerable daily life applications. The healthcare industry particularly has been benefited due to the provision of ubiquitous health monitoring, emergency response services, electronic medical billing, etc. Since IoT devices possess limited storage and processing power, therefore these intelligent objects are unable to efficiently provide the e-health facilities, or process and store enormous amount of collected data. IoTs are merged with Cloud Computing technology in Multi-Cloud form that basically helps cover the limitations of IoTs by offering a secure and on-demand shared pool of resources i.e., networks, servers, storage, applications, etc., to deliver effective and well-organized e-health amenities. Although the framework based on the integration of IoT and Multi-Cloud is contributing towards better patient care, yet on the contrary, it is challenging the privacy and reliability of the patients' information. The purpose of this systematic literature review is to identify the top security threat and to evaluate the existing security techniques used to combat this attack and their applicability in IoT and Multi-Cloud based e-Healthcare environment.
引用
收藏
页码:21947 / 21965
页数:19
相关论文
共 50 条
[1]   Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems [J].
Abbas, Haider ;
Latif, Rabia ;
Latif, Seemab ;
Masood, Ashraf .
ANNALS OF TELECOMMUNICATIONS, 2016, 71 (9-10) :477-487
[2]  
[Anonymous], 2016, IBM X FORCE RES 2016
[3]  
[Anonymous], 2011, International Workshop on Critical Information Infrastructures Security
[4]  
[Anonymous], J MED SYST
[5]  
[Anonymous], 2017, SEC 1 1 3
[6]  
[Anonymous], 2017, WHAT AR SOM DIS HOM
[7]  
Balasaraswathi VR, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), P1190, DOI 10.1109/ICACCCT.2014.7019286
[8]  
Chouhan P, 2016, INT J ADV RES COMPUT, V6, P92
[9]   Insider Threats to Cloud Computing: Directions for New Research Challenges [J].
Claycomb, William R. ;
Nicoll, Alex .
2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2012, :387-394
[10]  
Duncan A. J., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P857, DOI 10.1109/TrustCom.2012.188