scholarly journals Cloud-based genomics pipelines for ophthalmology: reviewed from research to clinical practice

2021 ◽  
Vol 3 (1) ◽  
pp. 101-140
Author(s):  
David C.S. Wong ◽  
Maximiliano Olivera ◽  
Jing Yu ◽  
Anita Szabo ◽  
Ismail Moghul ◽  
...  

Aim: To familiarize clinicians with clinical genomics, and to describe the potential of cloud computing for enabling the future routine use of genomics in eye hospital settings.Design: Review article exploring the potential for cloud-based genomic pipelines in eye hospitals.Methods: Narrative review of the literature relevant to clinical genomics and cloud computing, using PubMed and Google Scholar. A broad overview of these fields is provided, followed by key examples of their integration.Results: Cloud computing could benefit clinical genomics due to scalability of resources, potentially lower costs, and ease of data sharing between multiple institutions. Challenges include complex pricing of services, costs from mistakes or experimentation, data security, and privacy concerns.Conclusions and future perspectives: Clinical genomics is likely to become more routinely used in clinical practice. Currently this is delivered in highly specialist centers. In the future, cloud computing could enable delivery of clinical genomics services in non-specialist hospital settings, in a fast, cost-effective way, whilst enhancing collaboration between clinical and research teams.

2020 ◽  
Vol 9 (1) ◽  
pp. 27-39
Author(s):  
Akella Subhadra

Cloud Computing is the important buzzword in the today’s world of computer. Cloud is global platform that allows digital information to be stored and distributed at very less cost and very fast to use. In these days since the data is very big in size many users are interested to store their valuable data in the cloud .The application software and databases in cloud computing are moved to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Cloud Computing is scalable, fast, flexible, and cost-effective technology platform for IT enabled services over the internet. There are various advantages of cloud computing but ultimately cloud service users have to put their data over the cloud i.e., third party servers which are not directly controlled by the data owner Data security has consistently been a major issue in information technology In cloud computing in users perspective mainly in government ,industry and business Data security and ivacy protection issues are relevant to both hardware and software in the cloud architecture. Cloud security is becoming a key differentiator and competitive edge between cloud providers. In spite of various benefits that are provided by the cloud computing services, cloud computing service users are very much afraid about the security of their data .So this paper focuses on various issues regarding cloud computing, data security and how cloud provides data integrity, confidentiality, availability over user’s data? How data stored over cloud storage servers will be protected from attackers? Risk management of data present on the Cloud is another challenge. There is a requirement to identify the risks an organization would be taking while hosting data and services on the Cloud. In this paper, we present those issues that are preventing people from adopting the cloud and to minimize risks of these issues.


2014 ◽  
Vol 10 (7) ◽  
pp. 190903 ◽  
Author(s):  
Yunchuan Sun ◽  
Junsheng Zhang ◽  
Yongping Xiong ◽  
Guangyu Zhu

Author(s):  
Hicham Amellal ◽  
Abdelmajid Meslouhi ◽  
Abderahim El Allati ◽  
Annas El Haddadi

With the advancement of communication and information technology, the internet has become used as a platform for computing and not only a way of communications networks. Accordingly, the large spread of cloud computing led to the emergence of different privacy implications and data security complexities. In order to enhance data security in the cloud, the authors propose in this chapter the use of an encryption box, which includes different cryptosystems. In fact, this step gives the user the opportunities to encrypt data with an unknown algorithm and makes a private key before the storage of data in the host company servers. Moreover, to manage the encryption database, the authors propose a quantum approach in search based on Grover's algorithm.


Author(s):  
Amavey Tamunobarafiri ◽  
Shaun Aghili ◽  
Sergey Butakov

Cloud computing has been massively adopted in healthcare, where it attracts economic, operational, and functional advantages beneficial to insurance providers. However, according to Identity Theft Resource Centre, over twenty-five percent of data breaches in the US targeted healthcare. The HIPAA Journal reported an increase in healthcare data breaches in the US in 2016, exposing over 16 million health records. The growing incidents of cyberattacks in healthcare are compelling insurance providers to implement mitigating controls. Addressing data security and privacy issues before cloud adoption protects from monetary and reputation losses. This article provides an assessment tool for health insurance providers when adopting cloud vendor solutions. The final deliverable is a proposed framework derived from prominent cloud computing and governance sources, such as the Cloud Security Alliance, Cloud Control Matrix (CSA, CCM) v 3.0.1 and COBIT 5 Cloud Assurance.


2014 ◽  
Vol 16 (1) ◽  
pp. 39-44 ◽  
Author(s):  
Dr.P.K. Rai ◽  
◽  
R.K. Bunkar ◽  
Vivekananda Mishra

2014 ◽  
Vol 9 (12) ◽  
Author(s):  
AL-Museelem Waleed ◽  
Chunlin Li ◽  
Naji Hasan.A.H

Sign in / Sign up

Export Citation Format

Share Document