Abstract
Technology plays a vast role in all aspects of our lives. In every business, technology is helpful to fulfill the needs of the customers. Cloud computing is a technology that satisfies the demand for dynamic resources and makes it easier for jobs to work on all platforms. Cloud computing platforms on the internet provide rapid access with pay-as-you-go pricing. Many business organizations have deployed their data either fully or partially on a cloud platform. A healthcare cloud is a platform where one can easily find hospitals, doctors, clinics, pharmacies, etc. While one face of this cloud is quite beneficial, the other face is challenging because of security issues. The data are stored somewhere else; hence, they can be an attractive target for cybercriminals. This chapter provides an introduction to cloud computing and the healthcare cloud. Subsequently, security issues in cloud computing, especially in the context of the healthcare cloud, are introduced. Finally, some methods to improve cloud security for healthcare are discussed along with our proposed architecture.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kim, H., Lee, H., Kim, W., Kim, Y.: A trust evaluation model for QoS guarantee in cloud systems. Int. J. Grid Distrib. Comput. 3, 125 (2010)
Yang, Z., et al.: A collaborative trust model of firewall-through based on cloud computing. 14th International Conference on Computer Supported Cooperative Work in Design, 2010, China
Ahmed, M.: Above the trust and security in cloud computing: a notion towards innovation. IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2010, Australia
Brodkin, J.: Gartner: Seven cloud-computing security risks, InfoWorld, 2008. https://www.infoworld.com/article/2652198/security/gartner%2D%2Dseven-cloud-computing-security-risks.html. Accessed 15 July 2018
Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. Int. Conf. on Comput. Sci. Elect. Eng. 1, 647–651 (2012)
Grobauer, B., Walloschek, T., Stocker, E.: Understanding Cloud Computing Vulnerabilities. IEEE Secur. Priv. Mag. 9(2), 50–57 (2011)
Altowaijri, S., Mehmood, R., Williams, J.: A quantitative model of grid systems performance in healthcare organisations. Int. Conf. on Intellig. Syst. Model. Simulat. Liverpool, United Kingdom, pp. 431–436 (2010)
Mehmood, R., Faisal, M.A., Altowaijri, S.: Future networked healthcare systems: a review and case study. Handbook of research on redesigning the future of internet architectures, pp. 531–558, (2015)
Alazawi, Z., Alani, O., Abdljabar, M.B., Altowaijri, S., Mehmood, R.: A smart disaster management system for future cities. Proceedings of the 2014 ACM international workshop on Wireless and mobile technologies for smart cities - WiMobCity’14, Philadelphia, Pennsylvania, USA, 2014, pp. 1–10
Alazawi, Z., Abdljabar, M.B., Altowaijri, S., Vegni, A.M., Mehmood, R.: ICDMS: An Intelligent Cloud Based Disaster Management System for Vehicular Networks. In: Vinel, A., Mehmood, R., Berbineau, M., Garcia, C.R., Huang, C.-M., Chilamkurti, N. (eds.) Communication Technologies for Vehicles, vol. 7266, pp. 40–56. Springer, Berlin, Heidelberg (2012)
Alazawi, Z., Altowaijri, S., Mehmood, R., Abdljabar, M.B.: Intelligent disaster management system based on cloud-enabled vehicular networks. In 2011 11th International Conference on ITS Telecommunications, St. Petersburg, Russia, pp. 361–368 (2011)
Mehmood, R., Alam, F., Albogami, N.N., Katib, I., Albeshri, A., Altowaijri, S.M.: UTiLearn: A Personalised Ubiquitous Teaching and Learning System for Smart Societies. IEEE Access. 5, 2615–2635 (2017)
Oh, S., et al.: Architecture Design of Healthcare Software-as-a-Service Platform for Cloud-Based Clinical Decision Support Service. Healthc. Inform. Res. 21(2), 102 (2015)
Zhang, R., Liu, L.: Security models and requirements for healthcare application clouds. 2010 IEEE 3rd International Conference on Cloud Computing, Miami, FL, USA, pp. 268–275 (2010)
Wan, J., Zou, C., Ullah, S., Lai, C.-F., Zhou, M., Wang, X.: Cloud-enabled wireless body area networks for pervasive healthcare. IEEE Netw. 27(5), 56–61 (2013)
Barton, J., et al.: Impact of cloud computing on healthcare V2.0| Object Management Group. https://www.omg.org/cloud/deliverables/impact-of-cloud-computing-on-healthcare.htm. Accessed 29 June 2018
Ahmed, M., Xiang, Y., Ali, S.: Above the trust and security in cloud computing: a notion towards innovation. In 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Hong Kong, China, pp. 723–730 (2010)
Bildosola, I., RÃo-Belver, R., Cilleruelo, E., Garechana, G.: Design and Implementation of a Cloud Computing Adoption Decision Tool: Generating a Cloud Road. PLoS One. 10(7), e0134563 (2015)
Balasubramaniam, S., Kavitha, V.: Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing. Sci. World J. 2015, 1–9 (2015)
Elizabeth, S.: HealthITSecurity, data security considerations in healthcare interoperability. HealthITSecurity. https://healthitsecurity.com/features/data-security-considerations-in-healthcare-interoperability. Accessed 24 June 2018
Saurabh: Security issues in cloud Computing. http://serl.iiit.ac.in/cs6600/saurabh.ppt. (2009). Accessed 17 June 2018
Sherry, D.: Cloud computing: security risks and compliance implications. http://media.techtarget.com/searchFinancialSecurity/downloads/FISD09_Breakout_Session5_CloudComputing_Sherry.pdf, Brown University (2009). Accessed 14 June 2018
Ryoo, J., Rizvi, S., Aiken, W., Kissell, J.: Cloud Security Auditing: Challenges and Emerging Approaches. IEEE Secur. Priv. 12(6), 68–74 (2014)
Kwon, J., Johnson, M.E.: Protecting patient data-the economic perspective of healthcare security. IEEE Secur. Priv. 13(5), 90–95 (2015)
Schoo, P., et al.: Challenges for cloud networking security. In Mobile Networks and Management, 2011, pp. 298–313
Yang, Z., Qiao, L., Liu, C., Yang, C., Wan, G.: A collaborative trust model of firewall-through based on Cloud Computing. The 2010 14th International Conference on Computer Supported Cooperative Work in Design, Shanghai, China, pp. 329–334 (2010)
Goyal, S.: 5 reasons why you should choose multi-tenant architecture for your SaaS application. Insights—Web and Mobile Development Services and Solutions, https://www.netsolutions.com/insights/5-reasons-why-you-should-choose-multi-tenant-architecture-for-your-saas-application/. Accessed 11 July 2018
Shaikh, R., Sasikumar, M.: Security Issues in Cloud Computing: A survey. Int. J. Comput. Appl. 44(19), 4–10 (2012)
Rathi, G., Abinaya, M., Deepika, M., Kavyasri, T.: Healthcare data security in cloud computing. IJIRCCE, 3(3), (2015). ISSN(Online): 2320-9801 ISSN (Print): 2320-9798
Almond, C.: A practical guide to cloud computing security, (2009). http://www.avanade.com/Documents/Research%20anad%20Insights/practicalguidetocloudcomputingsecurity574834.pdf. Accessed 11 July 2018
Chondamrongkul, N., Chondamrongkul, P.: Secure mobile cloud architecture for healthcare application. Int. J. Fut. Comput. Commun. 6(3), 77–86 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Altowaijri, S.M. (2020). An Architecture to Improve the Security of Cloud Computing in the Healthcare Sector. In: Mehmood, R., See, S., Katib, I., Chlamtac, I. (eds) Smart Infrastructure and Applications. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-13705-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-13705-2_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-13704-5
Online ISBN: 978-3-030-13705-2
eBook Packages: EngineeringEngineering (R0)