Proposal for a Security Management in Cloud Computing for Health Care

被引:11
|
作者
Haufe, Knut [1 ]
Dzombeta, Srdan [1 ]
Brandis, Knud [1 ]
机构
[1] Persicon Corp, D-10117 Berlin, Germany
来源
SCIENTIFIC WORLD JOURNAL | 2014年
关键词
INFORMATION;
D O I
10.1155/2014/146970
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector. Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Security in Cloud Computing
    Sharma, Vani Dayal
    Agarwai, Somya
    Moin, Syeda Shira
    Qadeer, Mohammed Abdul
    2017 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2017, : 234 - 239
  • [32] Security aspects of ubiquitous computing in health care
    Weippl, E.
    Holzinger, A.
    Tjoa, A. M.
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2006, 123 (04): : 156 - 161
  • [33] IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing.
    Vinaja, Roberto
    JOURNAL OF GLOBAL INFORMATION TECHNOLOGY MANAGEMENT, 2013, 16 (03) : 82 - 84
  • [34] A Survey of Cloud Computing and Cloud Security
    Sui, Xin
    Sui, Yi
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 284 - 287
  • [35] Cloud computing and cloud security in China
    Zhang, Shaohe
    Jiang, Cuenyun
    Wang, Ruxin
    ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II, 2018, 1955
  • [36] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600
  • [37] SECURITY AND RISK MANAGEMENT WHEN USING CLOUD COMPUTING IT SERVICES
    Sepulveda O, Erick
    Salcedo, Octavio J.
    Gomez Vargas, Ernesto
    REDES DE INGENIERIA-ROMPIENDO LAS BARRERAS DEL CONOCIMIENTO, 2010, 1 (02): : 10 - 21
  • [38] Recent Trends on Intelligent Management Technologies for Cloud Computing and Security
    Jung, Jason J.
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (11): : 3571 - 3573
  • [39] Inclusion of Security Requirements in SLA Lifecycle Management for Cloud Computing
    Torrez Rojas, Marco Antonio
    Gonzalez, Nelson Mimura
    Sbampato, Fernando
    Redigolo, Fernando
    Melo de Brito Carvalho, Tereza Cristina
    Kim Koa Nguyen
    Cheriet, Mohamed
    2015 IEEE 2ND WORKSHOP ON EVOLVING SECURITY AND PRIVACY REQUIREMENTS ENGINEERING (ESPRE), 2015, : 7 - 12
  • [40] Fuzzy Modeling for Information Security Management Issues in Cloud Computing
    Lin, Grace T. R.
    Lin, Chih-Chieh
    Chou, C. James
    Lee, Yen-Chun
    INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2014, 16 (04) : 529 - 540