Abstract
Biosurveillance is very complex, and it complements traditional public health surveillance to provide both early warning of infectious disease events and leads to situational awareness as well as to signaling any potential threat for using biological agents as weapons of mass destruction. Biosurveillance requires close cooperation and rapid information-sharing among many healthcare partners including primary care units and the biosurveillance hubs. Achieving improvements in this direction has become a bipartisan top priority for governments and institutions. Currently there are many national and international centers envisioned as clouds for intelligence on biological threats, however security obstacles have hindered their progress. This article investigates the requirements for a biosurveillance secure cloud. The investigation identifies the major security components needed to build a trusted environment for cloud based biosurveillance system through the integration of the public health enterprise private cloud with public clouds based on the Distributed OSGi framework along with a distributed authentication service. The trusted environment allows biosurveillance to be conducted over primary care private clouds including patient information from the electronic medical records.
Article PDF
Similar content being viewed by others
References
Balachandra RK, Ramakrishna PV, Rakshit A (2009) Cloud security issues. In: 2009 IEEE international conference on services computing, 26 October 2009, pp 517–520
Bertino E et al (2006) Secure knowledge management: confidentiality, trust, and privacy. IEEE Trans Syst Man Cybern, Part A, Syst Humans 36(3)
Bradley CA et al (2005) BioSense: implementation of a national early event detection and situational awareness system. Morb Mortal Wkly Rep, CDC Surveill Summ 54(Suppl):11–20
Brock M, Goscinski A (2010) Toward a framework for cloud security. In: Algorithms and architectures for parallel processing. LNCS, vol 6082/2010. Springer, Berlin, pp 254–263
Campbell A (2006) The SARS Commission. Final Report, Toronto, Ontario Ministry of Health and Long-Term Care. Available Online: www.health.gov.on.ca/
Chow R et al (2009) Controlling data in the cloud: outsourcing computation without outsourcing control. In: ACM CCSW’09 conference, Chicago, Illinois, USA, November 13, 2009
Espino JU et al (2004) The RODS open source project: removing a barrier to syndromic surveillance. Stud Health Technol Inf 107(Pt 2):1192–1196
Hang C, Can C (2010) Research and application of distributed OSGi for cloud computing. In: Int conference on computational intelligence and software engineering CiSE 2010
Heiser J, Nicolett M (2008) Assessing the security risks of cloud computing. Gartner Association, ID Number: G00157782
Housley R et al (2002) Internet X.509 public key infrastructure certificate and Certificate Revocation List (CRL) Profile. RFC3280
Panorama Project (2007) IBM Pan-Canadian public health communicable disease surveillance and management project
Kaufman L (2009) Data security in the world of cloud computing. IEEE Secur Priv 7(4):61–64
Lombardo L, Burkom H, Pavlin J (2004) ESSENCE II and the framework for evaluating syndromic surveillance systems. CDC 53(Suppl):159–165
McDonald L et al (2007) Evaluation of a systematic emergency department chief complaint system for near real-time public health surveillance. J Adv Dis Surveill 2:206
Mohammed S, Servos D, Fiaidhi J (2010) HCX: a distributed OSGi based web interaction system for sharing health records in the cloud. In: 2010 IEEEWICACM international conference on web intelligence and intelligent agent technology
Mohammed S, Servos D, Fiaidhi J (2011) Developing a secure distributed OSGI cloud computing infrastructure for sharing health records. In: AIS 2011—international conference on autonomous and intelligent systems, Burnaby, BC, Canada, 22–24 June 2011
Mostashari F, Hartman J (2003) Syndromic surveillance. J Urban Health Bull NY Acad Med 80(2), Suppl (1)
Naylor D (2003) National Advisory Committee on SARS and public health learning from SARS. Health Canada, Ottawa
Neuman BC et al (1994) Kerberos: an authentication service for computer networks. IEEE Commun Mag 32:33–38
Nyulas C et al (2008) An ontology-driven framework for deploying JADE agent systems. In: IEEE/WIC/ACM int conf on web intelligence and intelligent agent technology (WI-IAT’08)
OASIS Open (2009) Assertions and protocols for the OASIS security assertion markup language (SAML) V2.0—Errata Composite, December 2009
Reis B et al (2007) AEGIS: a robust and scalable real-time public health surveillance system. J Am Med Inform Assoc 14(5):581–588
Shen Z, Tong Q (2010) The security of cloud computing system enabled by trusted computing technology. In: 2nd International conference on signal processing systems (ICSPS)
Walker D (2003) Ontario expert panel on SARS. Ministry of Health, Toronto
Youseff L, Butrico M, Da Silva D (2008) Towards a unified ontology of cloud computing. In: IEEE Proc grid computing environments workshop (GCE)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, Th., Mohammed, S. Toward designing a secure biosurveillance cloud. J Supercomput 65, 61–70 (2013). https://doi.org/10.1007/s11227-011-0709-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-011-0709-y