Skip to main content

An Architecture to Improve the Security of Cloud Computing in the Healthcare Sector

  • Chapter
  • First Online:
Smart Infrastructure and Applications

Part of the book series: EAI/Springer Innovations in Communication and Computing ((EAISICC))

Abstract

Technology plays a vast role in all aspects of our lives. In every business, technology is helpful to fulfill the needs of the customers. Cloud computing is a technology that satisfies the demand for dynamic resources and makes it easier for jobs to work on all platforms. Cloud computing platforms on the internet provide rapid access with pay-as-you-go pricing. Many business organizations have deployed their data either fully or partially on a cloud platform. A healthcare cloud is a platform where one can easily find hospitals, doctors, clinics, pharmacies, etc. While one face of this cloud is quite beneficial, the other face is challenging because of security issues. The data are stored somewhere else; hence, they can be an attractive target for cybercriminals. This chapter provides an introduction to cloud computing and the healthcare cloud. Subsequently, security issues in cloud computing, especially in the context of the healthcare cloud, are introduced. Finally, some methods to improve cloud security for healthcare are discussed along with our proposed architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kim, H., Lee, H., Kim, W., Kim, Y.: A trust evaluation model for QoS guarantee in cloud systems. Int. J. Grid Distrib. Comput. 3, 125 (2010)

    Google Scholar 

  2. Yang, Z., et al.: A collaborative trust model of firewall-through based on cloud computing. 14th International Conference on Computer Supported Cooperative Work in Design, 2010, China

    Google Scholar 

  3. Ahmed, M.: Above the trust and security in cloud computing: a notion towards innovation. IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2010, Australia

    Google Scholar 

  4. Brodkin, J.: Gartner: Seven cloud-computing security risks, InfoWorld, 2008. https://www.infoworld.com/article/2652198/security/gartner%2D%2Dseven-cloud-computing-security-risks.html. Accessed 15 July 2018

  5. Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. Int. Conf. on Comput. Sci. Elect. Eng. 1, 647–651 (2012)

    Google Scholar 

  6. Grobauer, B., Walloschek, T., Stocker, E.: Understanding Cloud Computing Vulnerabilities. IEEE Secur. Priv. Mag. 9(2), 50–57 (2011)

    Article  Google Scholar 

  7. Altowaijri, S., Mehmood, R., Williams, J.: A quantitative model of grid systems performance in healthcare organisations. Int. Conf. on Intellig. Syst. Model. Simulat. Liverpool, United Kingdom, pp. 431–436 (2010)

    Google Scholar 

  8. Mehmood, R., Faisal, M.A., Altowaijri, S.: Future networked healthcare systems: a review and case study. Handbook of research on redesigning the future of internet architectures, pp. 531–558, (2015)

    Chapter  Google Scholar 

  9. Alazawi, Z., Alani, O., Abdljabar, M.B., Altowaijri, S., Mehmood, R.: A smart disaster management system for future cities. Proceedings of the 2014 ACM international workshop on Wireless and mobile technologies for smart cities - WiMobCity’14, Philadelphia, Pennsylvania, USA, 2014, pp. 1–10

    Google Scholar 

  10. Alazawi, Z., Abdljabar, M.B., Altowaijri, S., Vegni, A.M., Mehmood, R.: ICDMS: An Intelligent Cloud Based Disaster Management System for Vehicular Networks. In: Vinel, A., Mehmood, R., Berbineau, M., Garcia, C.R., Huang, C.-M., Chilamkurti, N. (eds.) Communication Technologies for Vehicles, vol. 7266, pp. 40–56. Springer, Berlin, Heidelberg (2012)

    Chapter  Google Scholar 

  11. Alazawi, Z., Altowaijri, S., Mehmood, R., Abdljabar, M.B.: Intelligent disaster management system based on cloud-enabled vehicular networks. In 2011 11th International Conference on ITS Telecommunications, St. Petersburg, Russia, pp. 361–368 (2011)

    Google Scholar 

  12. Mehmood, R., Alam, F., Albogami, N.N., Katib, I., Albeshri, A., Altowaijri, S.M.: UTiLearn: A Personalised Ubiquitous Teaching and Learning System for Smart Societies. IEEE Access. 5, 2615–2635 (2017)

    Article  Google Scholar 

  13. Oh, S., et al.: Architecture Design of Healthcare Software-as-a-Service Platform for Cloud-Based Clinical Decision Support Service. Healthc. Inform. Res. 21(2), 102 (2015)

    Article  Google Scholar 

  14. Zhang, R., Liu, L.: Security models and requirements for healthcare application clouds. 2010 IEEE 3rd International Conference on Cloud Computing, Miami, FL, USA, pp. 268–275 (2010)

    Google Scholar 

  15. Wan, J., Zou, C., Ullah, S., Lai, C.-F., Zhou, M., Wang, X.: Cloud-enabled wireless body area networks for pervasive healthcare. IEEE Netw. 27(5), 56–61 (2013)

    Article  Google Scholar 

  16. Barton, J., et al.: Impact of cloud computing on healthcare V2.0| Object Management Group. https://www.omg.org/cloud/deliverables/impact-of-cloud-computing-on-healthcare.htm. Accessed 29 June 2018

  17. Ahmed, M., Xiang, Y., Ali, S.: Above the trust and security in cloud computing: a notion towards innovation. In 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Hong Kong, China, pp. 723–730 (2010)

    Google Scholar 

  18. Bildosola, I., Río-Belver, R., Cilleruelo, E., Garechana, G.: Design and Implementation of a Cloud Computing Adoption Decision Tool: Generating a Cloud Road. PLoS One. 10(7), e0134563 (2015)

    Article  Google Scholar 

  19. Balasubramaniam, S., Kavitha, V.: Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing. Sci. World J. 2015, 1–9 (2015)

    Article  Google Scholar 

  20. Elizabeth, S.: HealthITSecurity, data security considerations in healthcare interoperability. HealthITSecurity. https://healthitsecurity.com/features/data-security-considerations-in-healthcare-interoperability. Accessed 24 June 2018

  21. Saurabh: Security issues in cloud Computing. http://serl.iiit.ac.in/cs6600/saurabh.ppt. (2009). Accessed 17 June 2018

  22. Sherry, D.: Cloud computing: security risks and compliance implications. http://media.techtarget.com/searchFinancialSecurity/downloads/FISD09_Breakout_Session5_CloudComputing_Sherry.pdf, Brown University (2009). Accessed 14 June 2018

  23. Ryoo, J., Rizvi, S., Aiken, W., Kissell, J.: Cloud Security Auditing: Challenges and Emerging Approaches. IEEE Secur. Priv. 12(6), 68–74 (2014)

    Article  Google Scholar 

  24. Kwon, J., Johnson, M.E.: Protecting patient data-the economic perspective of healthcare security. IEEE Secur. Priv. 13(5), 90–95 (2015)

    Article  Google Scholar 

  25. Schoo, P., et al.: Challenges for cloud networking security. In Mobile Networks and Management, 2011, pp. 298–313

    Google Scholar 

  26. Yang, Z., Qiao, L., Liu, C., Yang, C., Wan, G.: A collaborative trust model of firewall-through based on Cloud Computing. The 2010 14th International Conference on Computer Supported Cooperative Work in Design, Shanghai, China, pp. 329–334 (2010)

    Google Scholar 

  27. Goyal, S.: 5 reasons why you should choose multi-tenant architecture for your SaaS application. Insights—Web and Mobile Development Services and Solutions, https://www.netsolutions.com/insights/5-reasons-why-you-should-choose-multi-tenant-architecture-for-your-saas-application/. Accessed 11 July 2018

  28. Shaikh, R., Sasikumar, M.: Security Issues in Cloud Computing: A survey. Int. J. Comput. Appl. 44(19), 4–10 (2012)

    Google Scholar 

  29. Rathi, G., Abinaya, M., Deepika, M., Kavyasri, T.: Healthcare data security in cloud computing. IJIRCCE, 3(3), (2015). ISSN(Online): 2320-9801 ISSN (Print): 2320-9798

    Google Scholar 

  30. Almond, C.: A practical guide to cloud computing security, (2009). http://www.avanade.com/Documents/Research%20anad%20Insights/practicalguidetocloudcomputingsecurity574834.pdf. Accessed 11 July 2018

  31. Chondamrongkul, N., Chondamrongkul, P.: Secure mobile cloud architecture for healthcare application. Int. J. Fut. Comput. Commun. 6(3), 77–86 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saleh M. Altowaijri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Altowaijri, S.M. (2020). An Architecture to Improve the Security of Cloud Computing in the Healthcare Sector. In: Mehmood, R., See, S., Katib, I., Chlamtac, I. (eds) Smart Infrastructure and Applications. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-13705-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-13705-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-13704-5

  • Online ISBN: 978-3-030-13705-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics