2020
DOI: 10.14569/ijacsa.2020.0111194
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice

Abstract: Healthcare organizations consist of unique activities including collaborating on patients care and emergency care. The sector also accumulates high sensitive multifaceted patients' data such as text reports, radiology images and pathological slides. The large volume of the data is often stored as Electronic Health Records (EHR) which must be frequently updated while ensuring higher percentage up-time for constant availability of patients' records. Healthcare as a critical infrastructure also needs highly skill… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 43 publications
0
0
0
Order By: Relevance
“…The STRIDE is the best technique for mitigating threats in cybersecurity, with a value of 59, followed by QTMM (57), CVSS (51), PASTA (50) and PnG (47). This corroborates the findings by Yeng et al [37], which show that STRIDE gathers high-level security requirements for cloud computing. However, Attack Tree and HTMM have the same value of 46, followed by LINDDUN (45), OCTAVE (44) and Trike (43).…”
Section: Comparative Analysis Of Threat Modeling Techniquessupporting
confidence: 92%
“…The STRIDE is the best technique for mitigating threats in cybersecurity, with a value of 59, followed by QTMM (57), CVSS (51), PASTA (50) and PnG (47). This corroborates the findings by Yeng et al [37], which show that STRIDE gathers high-level security requirements for cloud computing. However, Attack Tree and HTMM have the same value of 46, followed by LINDDUN (45), OCTAVE (44) and Trike (43).…”
Section: Comparative Analysis Of Threat Modeling Techniquessupporting
confidence: 92%
“…These models can mitigate healthcare information systems (HIS) risks and protect protected health information (PHI). While many papers about Threat Modeling in Healthcare specialize in domains like Mobile Health Systems, Electronic Health Systems [2], Medical Cyber-Physical Systems, and Cloud Computing, very few papers have information about threat taxonomies within the healthcare industry [3]. STRIDE is a well-known threat modeling system that is useful for identifying many kinds of security risks.…”
Section: Existing Workmentioning
confidence: 99%
“…The lock-in effect poses additional hazards that result in cloud users becoming dependent on the services offered by the cloud service provider, so limiting customers' flexibility in their choices [21]. In addition, the adoption of cloud computing has the potential to amplify the risk of data loss and exacerbate system downtime when utilising an inadequate cloud provider [22]. Moreover, cloud adoption could cause compliance problems if the cloud provider violates data protection and healthcare sector requirements [23], [24].…”
Section: ) the Technological Context A Relative Advantagementioning
confidence: 99%