scholarly journals Access Control of EHR Records in a Heterogeneous Cloud Infrastructure

2021 ◽  
Vol 25 (2) ◽  
pp. 485-516
Author(s):  
Zoltán Szabó ◽  
Vilmos Bilicki

Since the advent of smartphones, IoT and cloud computing, we have seen an industry-wide requirement to integrate different healthcare applications with each other and with the cloud, connecting multiple institutions or even countries. But despite these trends, the domain of access control and security of sensitive healthcare data still raises a serious challenge for multiple developers and lacks the necessary definitions to create a general security framework addressing these issues. Taking into account newer, more special cases, such as the popular heterogeneous infrastructures with a combination of public and private clouds, fog computing, Internet of Things, the area becomes more and more complicated. In this paper we will introduce a categorization of these required policies, describe an infrastructure as a possible solution to these security challenges, and finally evaluate it with a set of policies based on real-world requirements.

2016 ◽  
Vol 9 (3) ◽  
pp. 157 ◽  
Author(s):  
Esmaeil Mehraeen ◽  
Marjan Ghazisaeedi ◽  
Jebraeil Farzi ◽  
Saghar Mirshekari

<p><strong>BACKGROUND:</strong> Healthcare data are very sensitive records that should not be made available to unauthorized people in order for protecting patient's information security. However, in progressed technologies as cloud computing which are vulnerable to cyber gaps that pose an adverse impact on the security and privacy of patients’ electronic health records and in these situations, security challenges of the wireless networks need to be carefully understood and considered. Recently, security concerns in cloud computing environment are a matter of challenge with rising importance.</p><p><strong>OBJECTIVE:</strong> In this study a systematic review to investigate the security challenges in cloud computing was carried out. We focused mainly on healthcare cloud computing security with an organized review of 210 full text articles published between 2000 and 2015.</p><p><strong>METHOD:</strong> A systematic literature review was conducted including PubMed, Science direct, Embase, ProQuest, Web of science, Cochrane, Emerald, and Scopus databases.</p><p><strong>FINDINGS:</strong> Using the strategies described, 666 references retrieved (for research question one 365, research question two 201, and research question three 100 references).</p><p><strong>IMPROVEMENTS:</strong> Review of articles showed that for ensuring healthcare data security, it is important to provide authentication, authorization and access control within cloud's virtualized network. Issues such as identity management and access control, Internet-based access, authentication and authorization and cybercriminals are major concerns in healthcare cloud computing. To manage these issues<strong> </strong>many involved events such as Hybrid Execution Model, VCC-SSF, sHype Hypervisor Security Architecture, Identity Management, and Resource Isolation approaches<em> </em>have to be defined for using cloud computing threat management processes.</p>


2018 ◽  
Vol 189 ◽  
pp. 03011
Author(s):  
Babur Hayat Malik ◽  
Faisal Mahmood ◽  
Sohail Shahzad ◽  
Muhammad Bilawal Arif ◽  
Waseem Ur Rehman Khan ◽  
...  

In Healthcare big data, data is originated from various heterogeneous sources. Numerous novel base particular healthcare applications offered to handling source of data from electronic health record (EHR) to medical images. Imaging, Electronic Health Report, technology in light of sensor and numerous different procedures created an immense measure of Healthcare data. Cloud computing development was an excellent paradigm to substantiate big data which incited find of imperceptible examples. Cloud computing is a developing new registering design intended to answer different contending administrations on the Web. Fog Computing is a design style in which arrange segments amongst devices and the cloud execute application-particular rationale. We in this paper investigate, characterize, and talk about various application of cloud and fog computing. We talk about the impact of cloud computing and fog computing on healthcare big data. Cloud base framework for Homediagnosis Service, Fog computing architecture and the justification of moving from cloud to Fog presented comprehensively in this paper.


Author(s):  
S. Karthiga Devi ◽  
B. Arputhamary

Today the volume of healthcare data generated increased rapidly because of the number of patients in each hospital increasing.  These data are most important for decision making and delivering the best care for patients. Healthcare providers are now faced with collecting, managing, storing and securing huge amounts of sensitive protected health information. As a result, an increasing number of healthcare organizations are turning to cloud based services. Cloud computing offers a viable, secure alternative to premise based healthcare solutions. The infrastructure of Cloud is characterized by a high volume storage and a high throughput. The privacy and security are the two most important concerns in cloud-based healthcare services. Healthcare organization should have electronic medical records in order to use the cloud infrastructure. This paper surveys the challenges of cloud in healthcare and benefits of cloud techniques in health care industries.


2019 ◽  
Vol 5 (4) ◽  
pp. 209-233 ◽  
Author(s):  
Jimoh Yakubu ◽  
Shafi’i Muhammad Abdulhamid ◽  
Haruna Atabo Christopher ◽  
Haruna Chiroma ◽  
Mohammed Abdullahi

Author(s):  
Nerijus Šatkauskas ◽  
Algimantas Venčkauskas ◽  
Nerijus Morkevičius ◽  
Agnius Liutkevičius

2021 ◽  
Vol 35 (1) ◽  
pp. 85-91
Author(s):  
Naga Raju Hari Manikyam ◽  
Munisamy Shyamala Devi

In the contemporary era, technological innovations like cloud computing and Internet of Things (IoT) pave way for diversified applications producing multimedia content. Especially large volumes of image data, in medical and other domains, are produced. Cloud infrastructure is widely used to reap benefits such as scalability and availability. However, security and privacy of imagery is in jeopardy when outsourced it to cloud directly. Many compression and encryption techniques came into existence to improve performance and security. Nevertheless, in the wake of emergence of quantum computing in future, there is need for more secure means with multiple transformations of data. Compressive sensing (CS) used in existing methods to improve security. However, most of the schemes suffer from the problem of inability to perform compression and encryption simultaneously besides ending up with large key size. In this paper, we proposed a framework known as Cloud Image Security Framework (CISF) leveraging outsourced image security. The framework has an underlying algorithm known as Hybrid Image Security Algorithm (HISA). It is based on compressive sensing, simultaneous sensing and encryption besides random pixel exchange to ensure multiple transformations of input image. The empirical study revealed that the CISF is more effective, secure with acceptable compression performance over the state of the art methods.


Sign in / Sign up

Export Citation Format

Share Document