2014 IEEE 16th International Conference on E-Health Networking, Applications and Services (Healthcom) 2014
DOI: 10.1109/healthcom.2014.7001843
|View full text |Cite
|
Sign up to set email alerts
|

Security aspects of e-Health systems migration to the cloud

Abstract: Abstract-As adoption of e-health solutions advances, new computing paradigms -such as cloud computing -bring the potential to improve efficiency in managing medical health records and help reduce costs. However, these opportunities introduce new security risks which can not be ignored. Based on our experience with deploying part of the Swedish electronic health records management system in an infrastructure cloud, we make an overview of major requirements that must be considered when migrating e-health systems… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
2

Relationship

4
4

Authors

Journals

citations
Cited by 28 publications
(19 citation statements)
references
References 12 publications
(13 reference statements)
0
19
0
Order By: Relevance
“…While cloud computing has exploded in popularity in recent years thanks to the potential efficiency and cost savings of outsourcing the management of data and applications, a number of vulnerabilities that led to various attacks have left many potential users worried [15]. As a result, experts in the field argued that 120 new technologies are needed in order to create trusted cloud services [16,17] services that will eventually eradicate the suspicion of users for cloud computing by providing the necessary security guarantees.…”
Section: Why Searchable Encryption Squarely Fits the Cloudmentioning
confidence: 99%
“…While cloud computing has exploded in popularity in recent years thanks to the potential efficiency and cost savings of outsourcing the management of data and applications, a number of vulnerabilities that led to various attacks have left many potential users worried [15]. As a result, experts in the field argued that 120 new technologies are needed in order to create trusted cloud services [16,17] services that will eventually eradicate the suspicion of users for cloud computing by providing the necessary security guarantees.…”
Section: Why Searchable Encryption Squarely Fits the Cloudmentioning
confidence: 99%
“…First, we present a list of core security requirements and challenges that must be considered when migrating to a cloud environment. These security requirements were derived based on our experience with migrating existing applications to a private Infrastructure-as-aService (IaaS) cloud [30]. We extend this guide by discussing important attack vector characteristics for cloud environments that will pave the way for providing tighter security when building cloud services.…”
Section: Our Contributionmentioning
confidence: 99%
“…However, organizations that work with sensitive data, such as health records, require complete control over the physical storage location and data access. As a result, storing sensitive data in the cloud complicates adherence to regulatory compliance laws, since such data may fall under different regulations depending on where it is physically stored [80]. Governance is a set of activities that are conducted to execute strategy, proper implementation of policies and procedures, relation between policies, assessing policies in practice, assessing and updating policies and providing frameworks to observe regulations in an organization [48].…”
Section: Data Warehouse and Physical Infrastructure Security (Governancmentioning
confidence: 99%