eHealth Cloud Security Challenges: A Survey

被引:84
作者
Al-Issa, Yazan [1 ]
Ottom, Mohammad Ashraf [1 ]
Tamrawi, Ahmed [1 ]
机构
[1] Yarmouk Univ, Irbid, Jordan
关键词
ACCESS-CONTROL; PRIVACY; OPPORTUNITIES;
D O I
10.1155/2019/7516035
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Cloud computing is a promising technology that is expected to transform the healthcare industry. Cloud computing has many benefits like flexibility, cost and energy savings, resource sharing, and fast deployment. In this paper, we study the use of cloud computing in the healthcare industry and different cloud security and privacy challenges. The centralization of data on the cloud raises many security and privacy concerns for individuals and healthcare providers. This centralization of data (1) provides attackers with one-stop honey-pot to steal data and intercept data in-motion and (2) moves data ownership to the cloud service providers; therefore, the individuals and healthcare providers lose control over sensitive data. As a result, security, privacy, efficiency, and scalability concerns are hindering the wide adoption of the cloud technology. In this work, we found that the state-of-the art solutions address only a subset of those concerns. Thus, there is an immediate need for a holistic solution that balances all the contradicting requirements.
引用
收藏
页数:15
相关论文
共 107 条
[61]   Security and privacy in electronic health records: A systematic literature review [J].
Luis Fernandez-Aleman, Jose ;
Carrion Senor, Inmaculada ;
Oliver Lozoya, Pedro Angel ;
Toval, Ambrosio .
JOURNAL OF BIOMEDICAL INFORMATICS, 2013, 46 (03) :541-562
[62]  
Malin B, 2007, STUD HEALTH TECHNOL, V129, P320
[63]   Protecting Medical Data in Cloud Storage Using Fault-Tolerance Mechanism [J].
Marwan, M. ;
Kartit, A. ;
Ouahmane, H. .
2017 INTERNATIONAL CONFERENCE ON SMART DIGITAL ENVIRONMENT (ICSDE'17), 2017, :214-219
[64]  
Mell P. G., 2011, RECOMMENDATIONS OF T
[65]  
Microsoft, 2017, OFF 365
[66]  
Microsoft, 2017, MICROSOFT AZURE
[67]  
Microsoft, 2007, MICR HEALTHVAULT
[68]  
Minniti M J., 2016, Healthcare Information Management Systems, P257
[69]  
Mohan A., 2010, Proceedings of the 9th Symposium on Identity and Trust on the Internet - IDTRUST '10, P37, DOI DOI 10.1145/1750389.1750395
[70]  
Moor J. H., 1997, Computers & Society, V27, P27, DOI 10.1145/270858.270866