Cloud E-health Systems: A Survay on Security Challenges and Solutions

被引:0
作者
Kamoona, Mohammed Ali [1 ]
Altamimi, Ahmad Mousa [1 ]
机构
[1] Appl Sci Private Univ, Comp Sci Dept, Amman, Jordan
来源
2018 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT) | 2018年
关键词
cloud; e-health; access control; cryptographic; PRIVACY; RECORDS; STATE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud progression have led it to be adapted in many aspects and application that serve human demands. One of the recent trends in cloud computing is the e-health services, as many healthcare institutes have begun to interchange toward the digitalized version of health records. E-health provide easy sharing of personal health care records between multiple organizations and offered real-time monitoring for the patient's state via storing this data over the cloud servers. However, having the data in such a distributed setting rises the need for having a secured data sharing with fine-grained access control, as the records are stored in a third-party service provider that is considered a semi trusted. Also, many different aspects of security should be taken into count with e-health, for instance the data is critical and should be only available to its owners. Numerous works have been done to secure the medical data in cloud environment. This work focuses on the security challenges and solutions for on Cloud-based E-health systems. Specifically, a state of the art is presented to preserve and protect E-health data, which consists of two tiers: cryptographic and non-cryptographic approach. Also, some of main issues and open problems that can be used in future studies are pointed out in this work.
引用
收藏
页码:189 / 194
页数:6
相关论文
共 50 条
[31]   The cloud paradigm applied to e-Health [J].
Jordi Vilaplana ;
Francesc Solsona ;
Francesc Abella ;
Rosa Filgueira ;
Josep Rius .
BMC Medical Informatics and Decision Making, 13
[32]   E-Health and Privacy: Risks, Opportunities and Solutions [J].
Coban, Cigdem ;
Tuysuz, Mehmet Fatih .
2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, :554-559
[33]   Blockchain Survey for Security and Privacy in the e-Health Ecosystem [J].
Boughdiri, Maher ;
Abdellatif, Takoua ;
Abdellatif, Tesnim .
RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2022, 2023, 13857 :69-84
[34]   A Comprehensive Assessment Framework for Evaluating Adaptive Security and Privacy Solutions for IoT e-Health Applications [J].
Aman, Waqas ;
Mohammed, Fatima Najla .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (10) :613-623
[35]   Reporting an experience on design and implementation of e-Health systems on Azure cloud [J].
Lu, Shilin ;
Ranjan, Rajiv ;
Strazdins, Peter .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (10) :2602-2615
[36]   Reporting an Experience on Design and Implementation of e-Health Systems on Azure Cloud [J].
Lu, Shilin ;
Ranjan, Rajiv ;
Strazdins, Peter .
INTERNET AND DISTRIBUTED COMPUTING SYSTEMS, IDCS 2013, 2013, 8223 :145-159
[37]   A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems [J].
Ksibi, Sondes ;
Jaidi, Faouzi ;
Bouhoula, Adel .
PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, :652-657
[38]   Cloud Computing Framework for e-Health Security Requirements and Security Policy Rules Case Study: A European Cloud-Based Health System [J].
Georgiou, Dimitra ;
Lambrinoudakis, Costas .
TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2020, 2020, 12395 :17-31
[39]   e-Health Promises and Challenges: Some Ethical Considerations [J].
Kluge, Eike-Henner W. .
INTERNATIONAL PERSPECTIVES IN HEALTH INFORMATICS, 2011, 164 :148-153
[40]   Methodologic challenges of e-health research [J].
Bowling, J. Michael ;
Rimer, Barbara K. ;
Lyons, Elizabeth J. ;
Golin, Carol E. ;
Frydman, Gilles ;
Ribisl, Kurt M. .
EVALUATION AND PROGRAM PLANNING, 2006, 29 (04) :390-396