Advertisement

Security of Healthcare Systems with Smart Health Records Using Cloud Technology

  • Priyanka DadhichEmail author
  • Kavita
Chapter
  • 17 Downloads
Part of the Learning and Analytics in Intelligent Systems book series (LAIS, volume 13)

Abstract

The information technology in healthcare become trustful and more reliable with the advancement in technology. The cloud computing is one of the advance information technologies which is comprises of huge and bulky computers and linked with online web and internet. This is also termed as distributed computing which transfer data from one source to another and can be access and controlled by authorized users in healthcare organization. The cloud computing and its related challenges builds a protected Electronic Health Record (EHR) in an exceedingly cloud computing setting has attracted heaps of attention healthcare business and educational community. The thought of Cloud computing is turning into a preferred data technology (IT) infrastructure for facilitating EHR or good health records sharing and integration. As advancement in technology comes with some limitation and data security, reliability and privacy are some of the hot issues which are existing in cloud computing. The proposed chapter includes various factors affecting cloud computing security and comparative analysis of existing algorithms for cloud computing security in healthcare.

Keywords

Electronic health record Information technology Cloud computing 

References

  1. 1.
    M. Masrom, A. Rahimli, W.N.B.W. Zakaria, S.M. Aljunid, Understanding the problems and benefits of using cloud computing in Malaysia healthcare sector. Int. J. Comput. Appl. 4(1) (2016). Retrieved from: https://pdfs.semanticscholar.org/7426/0a0aae6671db660f0834d3b1c8795f35d723.pdf
  2. 2.
    G. Boss, P. Malladi, D. Quan, L. Legregni, H. Hall, Cloud computing (2007). www.ibm.com/developerworks/websphere/zones/hipods/. Accessed 20 May 2010
  3. 3.
    P. Mell, T. Grance, The NIST definition of cloud computing. Natl. Inst. Stand. Technol. 53(6), 1–7 (2009)Google Scholar
  4. 4.
    R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, Y. Brandic, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25, 599–616 (2009)Google Scholar
  5. 5.
    N. John, S. Shenoy, Health cloud—healthcare as service (HaaS), in Proceedings of International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2014, pp. 1963–1966Google Scholar
  6. 6.
    K. Al-Begain, M. Zak, W. Alosaimi, C. Turyagyenda, Security of the cloud, in Emerging Research in Cloud Distributed Computing Systems, ed. by S. Bagchi (IGI Global, Hershey, PA, 2015), pp. 363-404.  https://doi.org/10.4018/978-1-4666-8213-9.ch012
  7. 7.
    R. Asija, R. Nallusamy, Healthcare SaaS based on a data model with built-in security and privacy, in Cloud Security: Concepts, Methodologies, Tools, and Applications, ed. by I. Management Association (IGI Global, Hershey, PA, 2019), pp. 744–759.  https://doi.org/10.4018/978-1-5225-8176-5.ch037
  8. 8.
    High Performance Architecture and Grid Computing International Conference, HPAGC 2011 (Chandigarh, India, July 19–20, 2011). ProceedingsGoogle Scholar
  9. 9.
    F. Stoicuta, I. Ivanciu, E. Minzat, A.B. Rus, V. Dobrota, An OpenNetInf-based cloud computing solution for cross-layer QoS: monitoring part using iOS terminals (10th International symposium on electronics and telecommunications, Timisoara, 2012), pp. 167–170Google Scholar
  10. 10.
    S. Carlin, K. Curran, Cloud computing security. Int. J. Ambient Comput. Intell. (IJACI) 3(1), 14–19 (2011).  https://doi.org/10.4018/jaci.2011010102
  11. 11.
    P.T. Vaikunth, P.S. Aithal, Cloud computing security issues—challenges and opportunities. Int. J. Manage. Technol. Soc. Sci. (IJMTS) 1(1), 33–42 (2017).  https://doi.org/10.5281/zenodo.569920
  12. 12.
    N. Sultan, Making use of cloud computing for healthcare provision: opportunities and challenges. Int. J. Inf. Manag. 34(2), 177–184 (2014). ISSN: 0268-4012Google Scholar
  13. 13.
    V.R. Pancholi, B. Patel, Enhancement of cloud computing security with secure data storage using AES (2016)Google Scholar
  14. 14.
    F. Ogigau-Neamtiu, Cloud computing security issues. J. Defense Resour. Manage. 3(2), 141–148 (2012)Google Scholar
  15. 15.
    Md. Fakhrul Alam Onik, S.S. Salman-Al-Musawi, K. Anam, N. Rashid, A secured cloud based health care data management system. Int. J. Comput. Appl. 49(12) (2012). Retrieved from: https://pdfs.semanticscholar.org/7426/0a0aae6671db660f0834d3b1c8795f35d723.pdf
  16. 16.
    S. Kannan, S. Ramakrishnan, Performance analysis of cloud computing in healthcare system using tandem queues. Int. J. Intell. Eng. Syst. 10(4) (2017). Retrieved from: http://oaji.net/articles/2017/3603-1498897498.pdf
  17. 17.
    M. Panhwar, S. Ali Khuhro, G. Panhwar, Ghazala, K. Ali, SACA, A Study of Symmetric and Asymmetric Cryptographic Algorithms (2019)Google Scholar
  18. 18.
    A. Er. Pansotra, S. Er. Preet Singh, Cloud security algorithms. Int. J. Secur. Appl. 9(10), 353–360 (2015)Google Scholar
  19. 19.
    Y. Al-Issa, M. Ashraf Ottom, A. Tamrawi, eHealth cloud security challenges: a survey. J. Healthc. Eng. 2019, 1–15 (2019)Google Scholar
  20. 20.
    E. Jaul, J. Barron, Age-related diseases and clinical and public health implications for the 85 years old and over population. Front. Public Health 5, 335 (2017).  https://doi.org/10.3389/fpubh.2017.00335
  21. 21.
    R. Anitha, S. Mukherjee, Data security in cloud for health care applications, in Advances in Computer Science and its Applications, vol 279, ed. by H. Jeong, M.S. Obaidat, N. Yen, J. Park (Springer, Berlin, Heidelberg, 2014), Lecture Notes in Electrical EngineeringMathSciNetGoogle Scholar
  22. 22.
    M. Alsanea, J. Barth, Factors affecting the adoption of cloud computing in the government sector: a case study of Saudi Arabia. Int. J. Cloud Comput. Serv. Sci. x(x), 1–16 (2014).  https://doi.org/10.11591/closer.v3i6.6811 
  23. 23.
    R. Amponsah, J. Panford, J. Hayfron-Acquah, Factors affecting cloud computing adoption in a developing country–ghana: using extended unified theory of acceptance and use of technology (UTAUT2) model. Int. Res. J. Eng. Technol. (2016)Google Scholar
  24. 24.
    M. Ahmadi, N. Aslani, Capabilities and advantages of cloud computing in the implementation of electronic health record. Acta Informatica Med. 26(1), 24–28 (2018).  https://doi.org/10.5455/aim.2018.26.24-28
  25. 25.
    A.M. Kadhum, M.K. Hasan, Assessing the determinants of cloud computing services for utilizing health information systems: a case study. Int. J. Adv. Sci. Eng. Inform. Technol. 7, 503–510 (2017)Google Scholar
  26. 26.
    A. Meri et al., Success factors affecting the healthcare professionals to utilize cloud computing services. Asia-Pacific J. Inf. Technol. Multimed. 6(2), 31–42 (2017). e-ISSN: 2289-2192Google Scholar
  27. 27.
    M.H.M. Zaharuddin, R.A. Rahman, M. Kassim, Technical comparison analysis of encryption algorithm on site-to-site IPSec VPN, International Conference on Computer Applications and Industrial Electronics, Kuala Lumpur, 2010, pp. 641–645.  https://doi.org/10.1109/ICCAIE.2010.5735013
  28. 28.
    J.O. Grabbe, The DES algorithm illustrated, 2010.Google Scholar
  29. 29.
    Federal information processing standards publication (FIPS 197), Advanced Encryption Standard (AES), 2001.Google Scholar
  30. 30.
    S.K. Rahimi, F.S. Haug, Distributed database management systems: a practical approachGoogle Scholar
  31. 31.
    D. Mukhopadhyay, B.A. Forouzan, Cryptography and network security, 2nd edn. (Mcgraw Hill Education, 2011)Google Scholar
  32. 32.
    G. Singh, S. Kinger, Integrating AES, DES, and 3-DES encryption algorithms for enhanced data security. Int. J. Sci. Eng. Res. 4(7) (2013)Google Scholar
  33. 33.
    S. Bansal, G. Jagdev, Analyzing working of DES and AES algorithms in cloud security. Int. J. Res. Stud. Comput. Sci. Eng. (IJRSCSE) 4(3), 1–9 (2017). ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online). http://dx.doi.org/10.20431/2349-4859.0403001
  34. 34.
    K. Arul Jothy, K. Sivakumar, M.J. Delsey, Enhancing the security of the cloud computing with triple AES, PGP over SSL algorithms. IJESRT Int. J. Eng. Sci. Res. Technol. 7 (2018) ISSN: 2277-9655Google Scholar
  35. 35.
    N.N. Pathak, M. Nagori, Enhanced security for multi cloud storage using AES algorithm. Int. J. Comput. Sci. Inf. Technol. 6(6) (2015). ISSN: 0975-9646Google Scholar
  36. 36.
    Data encryption standard (DES). Retrieved from: https://www.geeksforgeeks.org/data-encryption-standard-des-set-1/
  37. 37.
    P. Gowthami, M. Nishanthi, B. Indhumathi, M. Navaneethakrishnan, An aggregated aes algorithm for preventing keyleakage problem in cloud computing. Int. J. Recent Res. Sci. Eng. Technol. 5(4) (2017, April)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Jayoti Vidyapeeth Women’s UniversityJaipurIndia

Personalised recommendations