Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review

被引:0
作者
Afsheen Ahmed
Rabia Latif
Seemab Latif
Haider Abbas
Farrukh Aslam Khan
机构
[1] National University of Sciences and Technology,Center of Excellence in Information Assurance
[2] King Saud University,undefined
来源
Multimedia Tools and Applications | 2018年 / 77卷
关键词
Internet of Things; Cloud Computing; Multi-Cloud; Confidentiality; Integrity; E-Healthcare; Malicious Insiders;
D O I
暂无
中图分类号
学科分类号
摘要
The emergence of Internet of Things (IoT) has introduced smart objects as the fundamental building blocks for developing a smart cyber-physical universal environment. The IoTs have innumerable daily life applications. The healthcare industry particularly has been benefited due to the provision of ubiquitous health monitoring, emergency response services, electronic medical billing, etc. Since IoT devices possess limited storage and processing power, therefore these intelligent objects are unable to efficiently provide the e-health facilities, or process and store enormous amount of collected data. IoTs are merged with Cloud Computing technology in Multi-Cloud form that basically helps cover the limitations of IoTs by offering a secure and on-demand shared pool of resources i.e., networks, servers, storage, applications, etc., to deliver effective and well-organized e-health amenities. Although the framework based on the integration of IoT and Multi-Cloud is contributing towards better patient care, yet on the contrary, it is challenging the privacy and reliability of the patients’ information. The purpose of this systematic literature review is to identify the top security threat and to evaluate the existing security techniques used to combat this attack and their applicability in IoT and Multi-Cloud based e-Healthcare environment.
引用
收藏
页码:21947 / 21965
页数:18
相关论文
共 80 条
[1]  
Abbas H(2016)Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems Ann Telecommun 71 477-487
[2]  
Latif R(2016)Security Attacks on Cloud Computing with Possible Solutions International Journal of Advanced Research in Computer Science and Software Engineering 6 92-96
[3]  
Latif S(2015)Mitigation of Insider Attacks through Multi-Cloud International Journal of Electrical and Computer Engineering (IJECE) 5 136-141
[4]  
Masood A(2015)The Internet of Things for Health Care: A Comprehensive Survey IEEE Access 3 678-708
[5]  
Chouhan P(2011)The Insider Threat in Cloud Computing International Workshop on Information Security & Critical Infrastructure Security 2011 93-103
[6]  
Singh R(2014)A Framework to avoid Vulnerability Incidents in Cloud Computing International Journal on Advanced Computer Theory and Engineering (IJACTE) 3 12-16
[7]  
Gunasekhar T(2009)Systematic Literature Reviews in Software Engineering –A systematic literature review J Inf Softw Technol 51 7-15
[8]  
Rao KT(2015)EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network Mob Inf Syst 2015 1-13
[9]  
Reddy VK(2016)Distributed Denial of Service (DDoS) Attack Detection Using Data Mining Approach in Cloud-Assisted Wireless Body Area Networks International Journal of Ad Hoc and Ubiquitous Computing 23 24-35
[10]  
Kiran PS(2015)The Malicious Insiders Threat in the Cloud International Journal of Engineering Research and General Science 3 245-256