Cloud Computing Framework for e-Health Security Requirements and Security Policy Rules Case Study: A European Cloud-Based Health System

被引:1
作者
Georgiou, Dimitra [1 ]
Lambrinoudakis, Costas [1 ]
机构
[1] Univ Piraeus, Sch Informat & Commun Technol, Dept Digital Syst, Syst Secur Lab, Piraeus, Greece
来源
TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2020 | 2020年 / 12395卷
关键词
Cloud computing; e-Health; Security; Requirements; Policy rules;
D O I
10.1007/978-3-030-58986-8_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The final few years, Information and Communication Technology (ICT) have delivered the concept of central enterprise model in e-health. Healthcare is increasingly being supported via IT functions and new technologies, such as Cloud Computing. But sharing sensitive private data in Cloud Computing can be risky, when an unauthorized person gets access to this information and uses this in a different way than those supposed by the Providers. Numerous nations are sharp to go their typical health care services to the modern innovation of Cloud Computing, in order to move forward the first-class of care and to limit the cost. In any case, these possibilities introduce new safety risks and require a special treatment of safety issues, which cannot be ignored. Our work focuses on analyzing the challenges when using Cloud Computing in e-health systems and on moderation of these risks. In this paper, we present a list of the main security requirements that have to be viewed when migrating an e-health system to a SaaS Cloud Computing environment by means of each Health-care Providers and Cloud Service Providers and at the same time we propose some basic provisions to mitigate the significant risks.
引用
收藏
页码:17 / 31
页数:15
相关论文
共 50 条
[21]   Security Framework for Agent-Based Cloud Computing [J].
Venkateshwaran, K. ;
Malviya, Anu ;
Dikshit, Utkarsha ;
Venkatesan, S. .
INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2015, 3 (03) :35-42
[22]   Spirals Health: A Comprehensive Web-based Cloud-based e-Health Platform [J].
Singh, Tanvi .
2021 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER TECHNOLOGIES AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2021, :33-37
[23]   Policy Based Management for Security in Cloud Computing [J].
Waller, Adrian ;
Sandy, Ian ;
Power, Eamonn ;
Aivaloglou, Efthimia ;
Skianis, Charalampos ;
Munoz, Antonio ;
Mana, Antonio .
SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 :130-+
[24]   Security Design and Implementation of the Cloud-based Online System [J].
Chen, Wei ;
Shang, Yuting .
2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR EDUCATION (ICTE 2016), 2016, :233-236
[25]   Access Control Model for E-Health in a Cloud-Based Environment for HIV Patients in South Africa [J].
Azeez, Nureni Ayofe ;
Van der Vyver, Charles .
2018 IST-AFRICA WEEK CONFERENCE (IST-AFRICA), 2018,
[26]   SPT: Security Policy Translator for Network Security Functions in Cloud-Based Security Services [J].
Lingga, Patrick ;
Jeong, Jaehoon ;
Yang, Jinhyuk ;
Kim, Jeonghyeon .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) :5156-5169
[27]   Multi-Agent Solution for a Cloud-based e-Health Application [J].
Toader, Cosmin ;
Popescu, Nirvana ;
Ciobanu, Vlad .
2018 22ND INTERNATIONAL CONFERENCE ON SYSTEM THEORY, CONTROL AND COMPUTING (ICSTCC), 2018, :683-690
[28]   A Robust Security Framework for Cloud-based Logistics Services [J].
Srinivasan, Kathiravan ;
Gupta, Takshi ;
Agarwal, Punjal ;
Nema, Anant .
PROCEEDINGS OF 4TH IEEE INTERNATIONAL CONFERENCE ON APPLIED SYSTEM INNOVATION 2018 ( IEEE ICASI 2018 ), 2018, :162-165
[29]   Information Security Risks Impacting Cloud-based Personal Health Records [J].
Mxoli, Avuya ;
Mostert-Phipps, Nicky ;
Gerber, Mariana .
PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION SYSTEMS MANAGEMENT (ECISM 2017), 2017, :208-216
[30]   Information security risk measures for Cloud-based Personal Health Records [J].
Mxoli, Avuya ;
Gerber, Mariana ;
Mostert-Phipps, Nicky .
2014 INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2014), 2014, :187-193