Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry

被引:19
作者
Abrar, Hina [1 ]
Hussain, Syed Jawad [2 ]
Chaudhry, Junaid [3 ,4 ]
Saleem, Kashif [5 ,6 ]
Orgun, Mehmet A. [6 ]
Al-Muhtadi, Jalal [5 ,7 ]
Valli, Craig [4 ]
机构
[1] HITEC Univ, Dept Comp Sci & Engn, Taxila 47120, Pakistan
[2] Univ Lahore, Dept Comp Sci & Informat Technol, Lahore 53710, Pakistan
[3] Embry Riddle Aeronaut Univ, Coll Secur & Intelligence, Prescott, AZ 86305 USA
[4] Edith Cowan Univ, Secur Res Inst, Joondalup, WA 6027, Australia
[5] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 12372, Saudi Arabia
[6] Macquarie Univ, Dept Comp, Sydney, NSW 2109, Australia
[7] King Saud Univ, Coll Comp & Informat Sci, Riyadh 12372, Saudi Arabia
关键词
Clouds; cyberspace; public healthcare; risk analysis; security; SECURITY ISSUES;
D O I
10.1109/ACCESS.2018.2805919
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The task of protecting healthcare information systems (HIS) from immediate cyber security risks has been intertwined with cloud computing adoption. The data and resources of HISs are inherently shared with other systems for remote access, decision making, emergency, and other healthcare related perspectives. In the case of a multitude of requirements by multiple stakeholders, various, and diverse cloud models are being adopted across the healthcare and public health industry, which defies the real essence of sharing and using cloud computing in this domain. The misconception of security is one of the key hurdles in the adoption of cloud as a de facto standard in the healthcare and public health sector. In this paper, we demonstrate the similarity of the security aspects of the cloud computing models, by identifying the critical assets in the HIS, and by assessing their impact on the HIS. We also evaluate the risk exposure of the cloud computing models by performing a critical analysis. To the best of our knowledge, this is the first study of its kind for risk analysis of cloud computing models in order to demonstrate their suitability for the HIS.
引用
收藏
页码:19140 / 19150
页数:11
相关论文
共 45 条
[1]  
Ahmed N, 2013, J INF ASSUR SECUR, V8, P279
[2]   Rethinking Security in the Era of Cloud Computing [J].
Aikat, Jay ;
Akella, Aditya ;
Chase, Jeffrey S. ;
Juels, Ari ;
Reiter, Michael K. ;
Ristenpart, Thomas ;
Sekar, Vyas ;
Swift, Michael .
IEEE SECURITY & PRIVACY, 2017, 15 (03) :60-69
[3]   Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment [J].
Al-Muhtadi, Jalal ;
Shahzad, Basit ;
Saleem, Kashif ;
Jameel, Wasif ;
Orgun, Mehmet A. .
HEALTH INFORMATICS JOURNAL, 2019, 25 (02) :315-329
[4]   An analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman [J].
AlZadjali, Amira M. ;
Al-Badi, Ali H. ;
Ali, Saqib .
2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, :423-428
[5]  
[Anonymous], P IEEE C OP SYST ICO
[6]  
[Anonymous], CSA SEC GUID CRIT AR
[7]  
[Anonymous], CLOUD COMP RISK ASS
[8]  
[Anonymous], DATA DRIVEN SECUR
[9]  
[Anonymous], 9 IEEE GCC C EXH GCC
[10]  
[Anonymous], ENT CLOUD COMP TRANS