scholarly journals Improving Individual Acceptance of Health Clouds through Confidentiality Assurance

2016 ◽  
Vol 07 (04) ◽  
pp. 983-993 ◽  
Author(s):  
Benjamin Fabian ◽  
Rüdiger Zarnekow ◽  
Tatiana Ermakova

SummaryBackground Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns.ObjectivesThis study examines the effect of confidentiality assurance in a cloud-computing environment on individuals’ willingness to accept the infrastructure for inter-organizational sharing of medical data.MethodsWe empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it.ResultsOur results indicate the importance of confidentiality assurance in individuals’ acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals’ acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.Citation: Ermakova T, Fabian B, Zarnekow R. Improving individual acceptance of health clouds through confidentiality assurance.

Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


2020 ◽  
Vol 8 (1) ◽  
pp. 91-102 ◽  
Author(s):  
Can Sayginer ◽  
Tuncay Ercan

Purpose of the study: This study aims to investigate the internal and external factors for CC adoption decisions of companies in Izmir, Turkey using a combination of DOI and TOE models. Methodology: This is a confirmatory survey of businesses, forming a questionnaire for 176 IT decision-makers of non-cloud or cloud user businesses in the city of Izmir in Turkey. SmartPLS 3.0 software is used to assess the determinants affecting cloud computing adoption. Main Findings: The study identified relative advantage, compatibility, complexity, and top management support, using security and privacy concerns and cost savings as mediating variables of relative advantage for CC adoption. The survey results indicated that complexity and top management supports are significantly important for efficient CC adoption. The model explained 41.2 percent of CC adoption. Applications of this study: The study is believed to be useful in fields including business development for most sectors, computing, cloud providers as well as researchers on business administration, sales, marketing, and IT infrastructure. Particularly this study and the suggested framework will help companies and businesses adopt CC appropriately. Moreover, as suggested in the study, governments can use such frameworks when encouraging cloud providers to support companies in their decision making and transition periods for CC adoption. Novelty/Originality of this study: This study will undoubtedly contribute to the decision making processes of the companies for CC adoption. Through the integrated in-depth analysis of the factors that affect the adoption decisions in an industrial region of Turkey, the study will also provide valuable data for the researchers and businesses within similar company personas.


2016 ◽  
Vol 9 (3) ◽  
pp. 157 ◽  
Author(s):  
Esmaeil Mehraeen ◽  
Marjan Ghazisaeedi ◽  
Jebraeil Farzi ◽  
Saghar Mirshekari

<p><strong>BACKGROUND:</strong> Healthcare data are very sensitive records that should not be made available to unauthorized people in order for protecting patient's information security. However, in progressed technologies as cloud computing which are vulnerable to cyber gaps that pose an adverse impact on the security and privacy of patients’ electronic health records and in these situations, security challenges of the wireless networks need to be carefully understood and considered. Recently, security concerns in cloud computing environment are a matter of challenge with rising importance.</p><p><strong>OBJECTIVE:</strong> In this study a systematic review to investigate the security challenges in cloud computing was carried out. We focused mainly on healthcare cloud computing security with an organized review of 210 full text articles published between 2000 and 2015.</p><p><strong>METHOD:</strong> A systematic literature review was conducted including PubMed, Science direct, Embase, ProQuest, Web of science, Cochrane, Emerald, and Scopus databases.</p><p><strong>FINDINGS:</strong> Using the strategies described, 666 references retrieved (for research question one 365, research question two 201, and research question three 100 references).</p><p><strong>IMPROVEMENTS:</strong> Review of articles showed that for ensuring healthcare data security, it is important to provide authentication, authorization and access control within cloud's virtualized network. Issues such as identity management and access control, Internet-based access, authentication and authorization and cybercriminals are major concerns in healthcare cloud computing. To manage these issues<strong> </strong>many involved events such as Hybrid Execution Model, VCC-SSF, sHype Hypervisor Security Architecture, Identity Management, and Resource Isolation approaches<em> </em>have to be defined for using cloud computing threat management processes.</p>


Author(s):  
Janardan Kulkarni ◽  
Jay Prajapati ◽  
Sakshi Patel

A Cloud is a type of analogous and scattered system consisting of a collection of inter-connected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources “ . cloud computing is the dynamic provisioning of IT capabilities (hardware, software, or services) from third parties over a network. However this technology is still in its initial stages of development, as it suffers from threats and vulnerabilities that prevent the users from trusting it. Various malicious activities from illegal users have threatened this technology such as data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result into damaging or illegal access of critical and confidential data of users. This article is in order to describe the impact of those vulnerabilities and threats to create awareness among organisations and users so that they can Adopt this technology with trust And form a trusted provider Who has trusted security policies. Here we have defined cloud-specific vulnerabilities, cloud feature vulnerabilities and propose a reference vulnerabilities architecture of cloud computing and threats related cloud computing. Cloud security and privacy plays an important role to avoid cloud threats .Cloud Privacy Concerns the expression of or devotion to various legal and non- legal norms regarding the right to private life. Cloud Security Concerns the confidentiality, ease of use and reliability of data or information. As the development of cloud computing, issue of security has become a top priority. In this article we are going to discuss about the Characteristics of vulnerabilities , cloud vulnerabilities and cloud threats , Also how we can overcome or avoid them and keep our data safe.


Cloud Computing is a robust, less cost, and an effective platform for providing services. Nowadays, it is applied in various services such as consumer business or Information Technology (IT) carried over the Internet. This cloud computing has some risks of security because, the services which are required for its effective compilation is outsources often by the third party providers. This makes the cloud computing more hard to maintain and monitor the security and privacy of data and also its support. This sudden change in the process of storing data towards the cloud computing technology improved the concerns about different issues in security and also the various threats present in this cloud storage. In the concept of security in cloud storage, various threats and challenges are noted by recent researchers. Hence, an effective framework of providing security is required. The main aim of this paper is to analyze various issues in securing the cloud data threats present in the cloud storage and to propose a novel methodology to secure it. This paper also identifies the most crucial components that can be incorporated in the already existing security measures while designing the storage systems based on cloud. This study also provides us to identify all the available solutions for the challenges of security and privacy in cloud storage.


Blockchain refers to a distributed ledger technology that represents an innovation in recording and sharing information without the need for a trusted third party. Blockchain technology offers new tools for security and privacy concerns. Marching towards digitization and analytics, this technology emerges as a promising solution for authentication and authorization issues. It sounds so amazing that this technology that originated with cryptocurrencies could not only be applied in digital contracts, financial and public records, and property ownership but also in medicine, education, science and so on. The use case of this technology springs up in every possible direction. This article first analyses the need for this breakthrough technology and explains how this technology works. This work presents a review on various types of blockchain, the consensus mechanisms used, their advantages and limitations. It provides an overview on the various use cases of this technology. This work mainly focuses on its application in Healthcare. The goal of this article is to analyze the usage of Blockchain technology in various fields of Healthcare such as Electronic Health Record, Health Insurance, Biomedical Research, Drug Supply, Medical Education, Remote Patient Monitoring, Interoperability, Location Sharing etc., It investigates the current research trends and finds the gaps and limitations of these approaches. Moreover, it proposes some enhancements to fill in the gaps in the present approach. This work also analyses the importance of Wearable Internet of Things (IoT) devices in HealthCare and the integration of these devices with Blockchain. Finally, this work concludes by comparing Blockchain 3.0 with previous versions.


Author(s):  
D. N. Kartheek ◽  
Bharath Bhushan

The inherent features of internet of things (IoT) devices, like limited computational power and storage, lead to a novel platform to efficiently process data. Fog computing came into picture to bridge the gap between IoT devices and data centres. The main purpose of fog computing is to speed up the computing processing. Cloud computing is not feasible for many IoT applications; therefore, fog computing is a perfect alternative. Fog computing is suitable for many IoT services as it has many extensive benefits such as reduced latency, decreased bandwidth, and enhanced security. However, the characteristics of fog raise new security and privacy issues. The existing security and privacy measures of cloud computing cannot be directly applied to fog computing. This chapter gives an overview of current security and privacy concerns, especially for the fog computing. This survey mainly focuses on ongoing research, security challenges, and trends in security and privacy issues for fog computing.


2019 ◽  
Vol 16 (10) ◽  
pp. 4320-4327 ◽  
Author(s):  
Anees Ara

The Cyber physical systems (CPS) are integration of tightly coupled resource constrained physical and computational systems,which have several real time critical care applications. These systems depend on sensors to sense the physical environment. To overcome the limitations of computational power, CPS are supported by cloud computing systems as their backend. The enablement of cloud support to cyber physical cloud computing systemshave seamless advantages of improved efficiency, in same way this leads to major security and privacy concerns. These systems have decentralized and heterogeneous infrastructure and to fulfill all the security requirements, it is certainly a very complex task. In this paper we propose a generalized system model for securing different types of cloud based cyber physical systems, adversary model and holistic literature review of various CPS services, attacks, security challenges and the security schemes that can be applied to overcome a given attacks. At the end of the paper we discuss a case study on securing Medical CPS and compare the applicability of security schemes in this scenario.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Wenmin Li ◽  
Shuo Zhang ◽  
Qi Su ◽  
Qiaoyan Wen ◽  
Yang Chen

Telecare medical information systems (TMIS) enable patients to access healthcare delivery services conveniently. With the explosive development occurring in cloud computing and services, storage of personal medical and health information outsourcing to cloud infrastructure has been a potential alternative. However, this has entailed many considerable security and privacy issues. In order to address the security loopholes, we propose a promising solution satisfying the requirements of cloud computing scenarios for telemedical systems. The proposed scheme could provide both data confidentiality and message authenticity while preserving anonymity. Furthermore, the formal security proof demonstrates that the proposed scheme is resistant to various attacks. The performance comparisons show the proposal’s workability and it is well suited to adoption in telemedical services.


2018 ◽  
Vol 14 (3) ◽  
pp. 128-145 ◽  
Author(s):  
Mbarek Marwan ◽  
Ali Kartit ◽  
Hassan Ouahmane

Healthcare sector is under pressure to reduce costs while delivering high quality of care services. This situation requires that clinical staff, equipment and IT tools to be used more equitably, judiciously and efficiently. In this sense, collaborative systems have the ability to provide opportunities for healthcare organizations to share resources and create a collaborative working environment. The lack of interoperability between dissimilar systems and operating costs are the major obstacle to the implementation of this concept. Fortunately, cloud computing has great potential for addressing interoperability issues and significantly reducing operating costs. Since the laws and regulations prohibit the disclosure of health information, it is necessary to carry out a comprehensive study on security and privacy issues in cloud computing. Based on their analysis of these constraints, the authors propose a simple and efficient method that enables secure collaboration between healthcare institutions. For this reason, they propose Secure Multi-party Computation (SMC) protocols to ensure compliance with data protection legislation. Specifically, the authors use Paillier scheme to protect medical data against unauthorized usage when outsourcing computations to a public cloud. Another useful feature of this algorithm is the possibility to perform arithmetic operations over encrypted data without access to the original data. In fact, the Paillier algorithm is an efficient homomorphic encryption that supports addition operations on ciphertexts. Based on the simulation results, the proposed framework helps healthcare organizations to successfully evaluate a public function directly on encrypted data without revealing their private inputs. Consequently, the proposed collaborative application ensures privacy of medical data while completing a task.


Sign in / Sign up

Export Citation Format

Share Document