Open Access Open Access  Restricted Access Subscription or Fee Access

Secured Cloud Based Healthcare System for Transformation Infrastructure

P. Anbumani, N.M. Abroja

Abstract


The use of Cloud Computing in healthcare system increased rapidly because it reduces the cost and accessibility of data. The major factor in the cloud environment is to ensure the security of data in healthcare system. The healthcare system uses cloud computing, as an user often stores sensitive information and classified medical data with cloud service providers. Dealing with “single-cloud” is far more vulnerable to failure of service unavailability. Storing the data in single-cloud, there is a possibility of malicious insiders. So due to this reason it is less popular in healthcare, as medical healthcare systems needs security. For security concern an advanced model is “multi-cloud”. This paper provides insecurity in single-cloud has received more focus from researchers in terms of security vulnerabilities rather than a   multi- cloud environment.


Keywords


Byzantine Protocols, Depsky, Multi-Clouds, Secret Sharing Scheme.

Full Text:

PDF

References


Issa M.khalil, Abdallah khreishah and Muhammed Azeem; “Cloud Computing Security: A survey”, Computers 2014, 3(1), 1-35; doi: 10.3390/computers301001

National Institute of standards and Technology, NIST Definition of cloud computing, Sept 2011.

Diogo A. B. Fernandes .Liliana F.B.Soares. Joao V.Gomes .Mario M. Freire.Pedro R.M.Inacio; Security issues in cloud environments:a survey, Springer-Verlag Berlin Heidelberg 2013 Int.J.Inf.Secure.(2014) 13:113-170

Armbrust, M. et. al., (2009),”Above the clouds: A Berkeley view of Cloud Computing”, UC Berkeley EECS, Feb 2010.

Silva, Bruno MC, Joel JPC Rodrigues,Isabel de la Torre Diez, Miguel Lopez-Coronado, and Kashif Saleem.”Mobile-health: A review of current state in 2015.”Journal of biomedical informatics 56(2015):265-272.

Ramgovind, S.; Eloff, M.M.; Smith, E., “The management of security in cloud computing,” Information Security for South Africa, 2010, Vol., no., pp.1-7,2-4 Aug.2010.

Laslo Tot, Gojko Grubor and Takacs Marata; Introducing the Information Security Management System in Cloud Computing Environment, Acta Polytechnica Hungarica Vol. 12, No.3,2015.

InformationSecurityMagazine,riskstoconsider:Issue:June2009.Retrievedfromhttp://www.arma.org/press/ARMAnews/ Infosecurity.pdf

Saleem, Kashif, Abdelouahid Derhab, Jalal Al-Muhtadi, and Basit Shahzad. “Human-oriented design of secure Machine-to-Machine Communication system foe e-Healthcare society.” Computers in Human Behavior (2014).

SANS Institute, An Introduction to information system risk management http://www.sans.org/reading_room/whitepapers /auditing/an_introduction_to_information_system_risk_management_1204? Show=1204.php &cat=auditing.

L.J.Zhang and Q.Zhou, CCOA: Cloud computing open architecture 2009 IEEE Int. Conf. on Web Services (ICWS’09), July 2009, pp. 607-616.

IBM, IBM point of view: security and cloud computing, ftp://public.dhe.ibm.com/common/ssi/sa/wh/n/tiw14045usen/TIW14045 USEN-HR.PDF.

R.Chow, et al., Controlling data in the cloud: Outsourcing computation without outsourcing control. In ACM Workshop on Cloud Computing Security, 2009.

D. K. Holstein, Stouffer, K., Trust but verify critical infrastructure cyber security solutions, in HICSS 2010, pp. 1-8.

L.M.Kaufman, Data security in the world of cloud computing, IEEE Security & Privacy, vol.7, no.4, 2009, pp. 61-64.

IBM Corporation, Enterprise Security Architecture Using IBM Tivoli Security Solutions, Aug 2007.

M.Vukolic,”The Byzantine empire in the intercloud”, ACM SIGACT News, 41, 2010, pp. 105-111.

H. Abu-Libdeh, L. Princehouse and H. Weatherspoon,”RACS: a case for cloud storage diversity”, SoCC’10:Proc. 1st ACM symposium on Cloud computing, 2010, pp. 229-240.

A. Bessani, M. Correia, B. Quaresma, F.Andre and P. Sousa, “DepSky: dependable and secure storage in a cloud-of-clouds”, Eurosys’11:proc.6thconf.On Computer systems, 2011, pp. 31-46.

K.D. Bowers, A. Juels and A. Oprea, “HAIL: A high-availability and integrity layer for cloud storage”, CCS’09:Proc. 16th ACM Conf. On Computer and communications security, 2009, pp.187-198.

C. Cachin, R.Haas and M.Vukolic,”Dependable storage in the Intercloud”, Research Report RZ, 3783, 2010.

P.Kuznetsov and R.Rodrigues, “BFTW 3: why? Where? Workshop on the theory and practice of byzantine fault tolerance”, ACM SIGACT News, 40(4), 2009, pp.82-86.

M.A. AlZain and E. Pardede, “Using Multi Shares for Ensuring Privacy in Database-as-a-Service”, 44th Hawaii Intl.Conf. on System Sciences(HICSS),2011, PP.1-9.

F.Rocha and M.Correia, “Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud”, Proc. 1stIntl.Workshop of Dependability of Clouds, Data Centers and Virtual Computing Environments, 2011, pp. 1-6.

A.J. Feldman, W.P.Zeller, M.J.Freedman and E.W.Felten, “SPORC: Group collaboration using untrusted cloud resources”, OSDI, October2010, pp. 1-14.

E.Grosse, J.Howie, J.Ransome, J.Reavis and S.Schmidt, “Cloud computing roundtable”, IEEE Security & Privacy, 8(6), 2010, pp.17-23

Dr. Kumar Saurabh “Cloud Computing”, Bangalore, June, 2012.

“Cloud Computing: A Practical Approach”, Anthony T.Velte, Toby J.Velte, Ph.D., and Robert Elsempeter.

John W.Rittinghouse, James F.Ransome; “Cloud Computing Implementation, Mnagement and Security.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.