Skip to main content

Security of Healthcare Systems with Smart Health Records Using Cloud Technology

  • Chapter
  • First Online:
Machine Learning with Health Care Perspective

Part of the book series: Learning and Analytics in Intelligent Systems ((LAIS,volume 13))

Abstract

The information technology in healthcare become trustful and more reliable with the advancement in technology. The cloud computing is one of the advance information technologies which is comprises of huge and bulky computers and linked with online web and internet. This is also termed as distributed computing which transfer data from one source to another and can be access and controlled by authorized users in healthcare organization. The cloud computing and its related challenges builds a protected Electronic Health Record (EHR) in an exceedingly cloud computing setting has attracted heaps of attention healthcare business and educational community. The thought of Cloud computing is turning into a preferred data technology (IT) infrastructure for facilitating EHR or good health records sharing and integration. As advancement in technology comes with some limitation and data security, reliability and privacy are some of the hot issues which are existing in cloud computing. The proposed chapter includes various factors affecting cloud computing security and comparative analysis of existing algorithms for cloud computing security in healthcare.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Masrom, A. Rahimli, W.N.B.W. Zakaria, S.M. Aljunid, Understanding the problems and benefits of using cloud computing in Malaysia healthcare sector. Int. J. Comput. Appl. 4(1) (2016). Retrieved from: https://pdfs.semanticscholar.org/7426/0a0aae6671db660f0834d3b1c8795f35d723.pdf

  2. G. Boss, P. Malladi, D. Quan, L. Legregni, H. Hall, Cloud computing (2007). www.ibm.com/developerworks/websphere/zones/hipods/. Accessed 20 May 2010

  3. P. Mell, T. Grance, The NIST definition of cloud computing. Natl. Inst. Stand. Technol. 53(6), 1–7 (2009)

    Google Scholar 

  4. R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, Y. Brandic, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25, 599–616 (2009)

    Google Scholar 

  5. N. John, S. Shenoy, Health cloud—healthcare as service (HaaS), in Proceedings of International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2014, pp. 1963–1966

    Google Scholar 

  6. K. Al-Begain, M. Zak, W. Alosaimi, C. Turyagyenda, Security of the cloud, in Emerging Research in Cloud Distributed Computing Systems, ed. by S. Bagchi (IGI Global, Hershey, PA, 2015), pp. 363-404. https://doi.org/10.4018/978-1-4666-8213-9.ch012

  7. R. Asija, R. Nallusamy, Healthcare SaaS based on a data model with built-in security and privacy, in Cloud Security: Concepts, Methodologies, Tools, and Applications, ed. by I. Management Association (IGI Global, Hershey, PA, 2019), pp. 744–759. https://doi.org/10.4018/978-1-5225-8176-5.ch037

  8. High Performance Architecture and Grid Computing International Conference, HPAGC 2011 (Chandigarh, India, July 19–20, 2011). Proceedings

    Google Scholar 

  9. F. Stoicuta, I. Ivanciu, E. Minzat, A.B. Rus, V. Dobrota, An OpenNetInf-based cloud computing solution for cross-layer QoS: monitoring part using iOS terminals (10th International symposium on electronics and telecommunications, Timisoara, 2012), pp. 167–170

    Google Scholar 

  10. S. Carlin, K. Curran, Cloud computing security. Int. J. Ambient Comput. Intell. (IJACI) 3(1), 14–19 (2011). https://doi.org/10.4018/jaci.2011010102

  11. P.T. Vaikunth, P.S. Aithal, Cloud computing security issues—challenges and opportunities. Int. J. Manage. Technol. Soc. Sci. (IJMTS) 1(1), 33–42 (2017). https://doi.org/10.5281/zenodo.569920

  12. N. Sultan, Making use of cloud computing for healthcare provision: opportunities and challenges. Int. J. Inf. Manag. 34(2), 177–184 (2014). ISSN: 0268-4012

    Google Scholar 

  13. V.R. Pancholi, B. Patel, Enhancement of cloud computing security with secure data storage using AES (2016)

    Google Scholar 

  14. F. Ogigau-Neamtiu, Cloud computing security issues. J. Defense Resour. Manage. 3(2), 141–148 (2012)

    Google Scholar 

  15. Md. Fakhrul Alam Onik, S.S. Salman-Al-Musawi, K. Anam, N. Rashid, A secured cloud based health care data management system. Int. J. Comput. Appl. 49(12) (2012). Retrieved from: https://pdfs.semanticscholar.org/7426/0a0aae6671db660f0834d3b1c8795f35d723.pdf

  16. S. Kannan, S. Ramakrishnan, Performance analysis of cloud computing in healthcare system using tandem queues. Int. J. Intell. Eng. Syst. 10(4) (2017). Retrieved from: http://oaji.net/articles/2017/3603-1498897498.pdf

  17. M. Panhwar, S. Ali Khuhro, G. Panhwar, Ghazala, K. Ali, SACA, A Study of Symmetric and Asymmetric Cryptographic Algorithms (2019)

    Google Scholar 

  18. A. Er. Pansotra, S. Er. Preet Singh, Cloud security algorithms. Int. J. Secur. Appl. 9(10), 353–360 (2015)

    Google Scholar 

  19. Y. Al-Issa, M. Ashraf Ottom, A. Tamrawi, eHealth cloud security challenges: a survey. J. Healthc. Eng. 2019, 1–15 (2019)

    Google Scholar 

  20. E. Jaul, J. Barron, Age-related diseases and clinical and public health implications for the 85 years old and over population. Front. Public Health 5, 335 (2017). https://doi.org/10.3389/fpubh.2017.00335

  21. R. Anitha, S. Mukherjee, Data security in cloud for health care applications, in Advances in Computer Science and its Applications, vol 279, ed. by H. Jeong, M.S. Obaidat, N. Yen, J. Park (Springer, Berlin, Heidelberg, 2014), Lecture Notes in Electrical Engineering

    MathSciNet  Google Scholar 

  22. M. Alsanea, J. Barth, Factors affecting the adoption of cloud computing in the government sector: a case study of Saudi Arabia. Int. J. Cloud Comput. Serv. Sci. x(x), 1–16 (2014). https://doi.org/10.11591/closer.v3i6.6811 

  23. R. Amponsah, J. Panford, J. Hayfron-Acquah, Factors affecting cloud computing adoption in a developing country–ghana: using extended unified theory of acceptance and use of technology (UTAUT2) model. Int. Res. J. Eng. Technol. (2016)

    Google Scholar 

  24. M. Ahmadi, N. Aslani, Capabilities and advantages of cloud computing in the implementation of electronic health record. Acta Informatica Med. 26(1), 24–28 (2018). https://doi.org/10.5455/aim.2018.26.24-28

  25. A.M. Kadhum, M.K. Hasan, Assessing the determinants of cloud computing services for utilizing health information systems: a case study. Int. J. Adv. Sci. Eng. Inform. Technol. 7, 503–510 (2017)

    Google Scholar 

  26. A. Meri et al., Success factors affecting the healthcare professionals to utilize cloud computing services. Asia-Pacific J. Inf. Technol. Multimed. 6(2), 31–42 (2017). e-ISSN: 2289-2192

    Google Scholar 

  27. M.H.M. Zaharuddin, R.A. Rahman, M. Kassim, Technical comparison analysis of encryption algorithm on site-to-site IPSec VPN, International Conference on Computer Applications and Industrial Electronics, Kuala Lumpur, 2010, pp. 641–645. https://doi.org/10.1109/ICCAIE.2010.5735013

  28. J.O. Grabbe, The DES algorithm illustrated, 2010.

    Google Scholar 

  29. Federal information processing standards publication (FIPS 197), Advanced Encryption Standard (AES), 2001.

    Google Scholar 

  30. S.K. Rahimi, F.S. Haug, Distributed database management systems: a practical approach

    Google Scholar 

  31. D. Mukhopadhyay, B.A. Forouzan, Cryptography and network security, 2nd edn. (Mcgraw Hill Education, 2011)

    Google Scholar 

  32. G. Singh, S. Kinger, Integrating AES, DES, and 3-DES encryption algorithms for enhanced data security. Int. J. Sci. Eng. Res. 4(7) (2013)

    Google Scholar 

  33. S. Bansal, G. Jagdev, Analyzing working of DES and AES algorithms in cloud security. Int. J. Res. Stud. Comput. Sci. Eng. (IJRSCSE) 4(3), 1–9 (2017). ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online). http://dx.doi.org/10.20431/2349-4859.0403001

  34. K. Arul Jothy, K. Sivakumar, M.J. Delsey, Enhancing the security of the cloud computing with triple AES, PGP over SSL algorithms. IJESRT Int. J. Eng. Sci. Res. Technol. 7 (2018) ISSN: 2277-9655

    Google Scholar 

  35. N.N. Pathak, M. Nagori, Enhanced security for multi cloud storage using AES algorithm. Int. J. Comput. Sci. Inf. Technol. 6(6) (2015). ISSN: 0975-9646

    Google Scholar 

  36. Data encryption standard (DES). Retrieved from: https://www.geeksforgeeks.org/data-encryption-standard-des-set-1/

  37. P. Gowthami, M. Nishanthi, B. Indhumathi, M. Navaneethakrishnan, An aggregated aes algorithm for preventing keyleakage problem in cloud computing. Int. J. Recent Res. Sci. Eng. Technol. 5(4) (2017, April)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priyanka Dadhich .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Dadhich, P., Kavita (2020). Security of Healthcare Systems with Smart Health Records Using Cloud Technology. In: Jain, V., Chatterjee, J. (eds) Machine Learning with Health Care Perspective. Learning and Analytics in Intelligent Systems, vol 13. Springer, Cham. https://doi.org/10.1007/978-3-030-40850-3_9

Download citation

Publish with us

Policies and ethics