Cloud Computing Framework for e-Health Security Requirements and Security Policy Rules Case Study: A European Cloud-Based Health System

被引:0
|
作者
Georgiou, Dimitra [1 ]
Lambrinoudakis, Costas [1 ]
机构
[1] Univ Piraeus, Sch Informat & Commun Technol, Dept Digital Syst, Syst Secur Lab, Piraeus, Greece
来源
TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2020 | 2020年 / 12395卷
关键词
Cloud computing; e-Health; Security; Requirements; Policy rules;
D O I
10.1007/978-3-030-58986-8_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The final few years, Information and Communication Technology (ICT) have delivered the concept of central enterprise model in e-health. Healthcare is increasingly being supported via IT functions and new technologies, such as Cloud Computing. But sharing sensitive private data in Cloud Computing can be risky, when an unauthorized person gets access to this information and uses this in a different way than those supposed by the Providers. Numerous nations are sharp to go their typical health care services to the modern innovation of Cloud Computing, in order to move forward the first-class of care and to limit the cost. In any case, these possibilities introduce new safety risks and require a special treatment of safety issues, which cannot be ignored. Our work focuses on analyzing the challenges when using Cloud Computing in e-health systems and on moderation of these risks. In this paper, we present a list of the main security requirements that have to be viewed when migrating an e-health system to a SaaS Cloud Computing environment by means of each Health-care Providers and Cloud Service Providers and at the same time we propose some basic provisions to mitigate the significant risks.
引用
收藏
页码:17 / 31
页数:15
相关论文
共 50 条
  • [11] Developing an e-health system based on IoT, fog and cloud computing
    Monteiro, Kayo
    Rocha, Elisson
    Silva, Emerson
    Santos, Guto Leoni
    Santos, Wylliams
    Endo, Patricia Takako
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING COMPANION (UCC COMPANION), 2018, : 17 - 18
  • [12] A Security Framework for Cloud-Based Web Crawling System
    Li Yan
    Zhao Li
    Liu Xin-ran
    Zhang Peng
    2014 11TH WEB INFORMATION SYSTEM AND APPLICATION CONFERENCE (WISA), 2014, : 101 - 104
  • [13] A security framework for cloud-based video surveillance system
    Alsmirat, Mohammad A.
    Obaidat, Islam
    Jararweh, Yaser
    Al-Saleh, Mohammed
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (21) : 22787 - 22802
  • [14] A Cloud Computing Security Framework Based on Cloud Security Trusted Authority
    Dawoud, Mohammed M.
    Ebrahim, Gamal A.
    Youssef, Sameh A.
    INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 133 - 138
  • [15] Cloud E-health Systems: A Survay on Security Challenges and Solutions
    Kamoona, Mohammed Ali
    Altamimi, Ahmad Mousa
    2018 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2018, : 189 - 194
  • [16] A security framework for cloud-based video surveillance system
    Mohammad A. Alsmirat
    Islam Obaidat
    Yaser Jararweh
    Mohammed Al-Saleh
    Multimedia Tools and Applications, 2017, 76 : 22787 - 22802
  • [17] An agent-based framework for providing security in a cloud-based E-learning system
    Mahmoud, Adil Mahmoud Mohamed
    INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2020, 7 (07): : 19 - 24
  • [18] Security and Privacy in IoT-Cloud-Based e-Health Systems-A Comprehensive Review
    Butpheng, Chanapha
    Yeh, Kuo-Hui
    Xiong, Hu
    SYMMETRY-BASEL, 2020, 12 (07):
  • [19] Spirals Health: A Comprehensive Web-based Cloud-based e-Health Platform
    Singh, Tanvi
    2021 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER TECHNOLOGIES AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2021, : 33 - 37
  • [20] Security Framework for Agent-Based Cloud Computing
    Venkateshwaran, K.
    Malviya, Anu
    Dikshit, Utkarsha
    Venkatesan, S.
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2015, 3 (03): : 35 - 42