Protecting Medical Data in Cloud Storage Using Fault-Tolerance Mechanism

被引:5
作者
Marwan, M. [1 ]
Kartit, A. [1 ]
Ouahmane, H. [1 ]
机构
[1] Univ Chouaib Doukkali El Jadida, Lab LTI, ENSA, BP 299, El Jadida, Morocco
来源
2017 INTERNATIONAL CONFERENCE ON SMART DIGITAL ENVIRONMENT (ICSDE'17) | 2017年
关键词
Medical image; cloud computing; fault tolerance; security;
D O I
10.1145/3128128.3128161
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Given the fact that cloud computing offers cost-efficient storage systems, medical organizations are more interested in using this alternative solution to safeguard their patients' data. Equally interestingly, users are charged based typically on the amount of occupied storage space. Basically, this concept is meant to cut costs and improve the quality of healthcare services. Consequently, implementing cloud storage would help clients to manage their data efficiently. Besides, it allows users to outsource the storage process by using virtual storage systems instead of local ones. Despite its significant impact in healthcare domain, adopting this paradigm to save medical data on remote servers poses serious challenges, especially security risks. Currently, various cryptographic techniques have been used to ensure data confidentiality and to avoid data disclosure. Globally, this model uses traditional cryptosystems such as AES, RSA to address security issues in cloud storage. As far as we know, there are only a few works in literature that deal with availability and data recovery in cloud computing. In general, the classical approach which is based on backup or replication is not suitable for cloud environment due to the highly dynamic nature of this model. The intent of this work is to enhance the reliability of cloud storage in order to meet security requirements. In this study, we propose a novel method based on Shamir's Secret Share Scheme and multi-cloud concept to avoid data loss and unauthorized access. More precisely, this technique seeks to divide consumers' data into several portions using Shamir's Secret Share to prevent privacy disclosure. Based on these considerations, we store these created portions in different nodes to minimize security risks, particularly internal attacks. To sum up, this method is designed to ensure fault-tolerance, which is the main subject of this study. In fact, we need just certain shares to reconstruct the secret data rather than using all parts. The experimental results are in accordance with the theoretical assumptions behind this model, and hence, confirm that the proposed framework provides necessary measures for preventing data loss in cloud storage.
引用
收藏
页码:214 / 219
页数:6
相关论文
共 16 条
[1]  
Abbas A., 2015, MED DATA PRIVACY HDB, P389, DOI DOI 10.1007/978-3-319-23633-9_15
[2]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[3]  
[Anonymous], 2010, Proceedings of the 1st ACM symposium on Cloud computing
[4]  
[Anonymous], 2015, INT C IND ENG OP MAN
[5]  
[Anonymous], 2013, Open web application security project: Data validation
[6]  
[Anonymous], 2009, COMPUTER INFORM SCI
[7]  
Bessani Alysson, 2011, EUROSYS 11, V9
[8]  
Bowers KD, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P187
[9]  
Cachin C., 2010, RES REPORT, V3783
[10]  
Chih-Ching Thien, 2002, Computers & Graphics, V26, P765, DOI 10.1016/S0097-8493(02)00131-0