Evaluating cloud deployment models based on security in EHR system

Cloud computing contains a large amount of data and many servers. Data security is an important part of cloud computing. There are different problems in cloud such as storage and environment problems like availability, scalability and security issues like reliability and privacy. Yet, so much work has taken to solve these difficulties, there are quiet some security problems. Guaranteeing data security is an essential issue in cloud Storage. This paper analysis the study of security concerns in deployment models for healthcare systems. Different proposed models are trying to cover dissimilar security issues for healthcare systems.

[1]  Shadi Aljawarneh,et al.  Shifted Adaption Homomorphism Encryption for Mobile and Cloud Learning , 2017, Comput. Electr. Eng..

[2]  Sadie Creese,et al.  Data Protection-Aware Design for Cloud Services , 2009, CloudCom.

[3]  Reihaneh Safavi-Naini,et al.  Privacy preserving EHR system using attribute-based infrastructure , 2010, CCSW '10.

[4]  John W. Rittinghouse,et al.  Cloud Computing: Implementation, Management, and Security , 2009 .

[5]  Yao Zheng,et al.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.

[6]  Peter Kulchyski and , 2015 .

[7]  Shadi Aljawarneh,et al.  Investigations of automatic methods for detecting the polymorphic worms signatures , 2016, Future Gener. Comput. Syst..

[8]  Ramesh Govindan,et al.  Census and survey of the visible internet , 2008, IMC '08.

[9]  Shadi Aljawarneh,et al.  A resource-efficient encryption algorithm for multimedia big data , 2017, Multimedia Tools and Applications.

[10]  Ronald L. Krutz,et al.  Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .

[11]  Martin Gilje Jaatun,et al.  Deployment models: Towards eliminating security concerns from cloud computing , 2010, 2010 International Conference on High Performance Computing & Simulation.

[12]  Ahmad-Reza Sadeghi,et al.  Securing the e-health cloud , 2010, IHI.

[13]  Kai Zhao,et al.  Towards an Approach of Semantic Access Control for Cloud Computing , 2009, CloudCom.

[14]  Jon Doyle,et al.  Guardian Angel: Patient-Centered Health Information Systems , 1994 .

[15]  Siani Pearson,et al.  A Privacy Manager for Cloud Computing , 2009, CloudCom.

[16]  L. D. Dhinesh Babu,et al.  An Analysis of Security Related Issues in Cloud Computing , 2011, IC3.

[17]  Shadi Aljawarneh,et al.  Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..

[18]  R. Kalaiselvi,et al.  SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING , 2016 .

[19]  Liang Yan,et al.  Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography , 2009, CloudCom.

[20]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.

[21]  Dennis Gannon,et al.  Cloud computing architecture and application programming: DISC'09 tutorial, half day, Sept. 22nd 2009 , 2009, SIGA.

[22]  David Wetherall,et al.  Studying Black Holes in the Internet with Hubble , 2008, NSDI.

[23]  Choi Myeonggil The Security Risks of Cloud Computing , 2019, 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[24]  Kenneth D. Mandl,et al.  Indivo: a personally controlled health record for health information exchange and communication , 2007, BMC Medical Informatics Decis. Mak..

[25]  Shadi Aljawarneh,et al.  G-SPAMINE: An approach to discover temporal association patterns and trends in internet of things , 2017, Future Gener. Comput. Syst..

[26]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[27]  Yan Bai,et al.  Design and Implementation of a Secure Healthcare Social Cloud System , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).

[28]  Haider Abbas,et al.  Security concerns of cloud-based healthcare systems: A perspective of moving from single-cloud to a multi-cloud infrastructure , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).

[29]  Martin Gilje Jaatun,et al.  Privacy in a Semantic Cloud: What's Trust Got to Do with It? , 2009, CloudCom.

[30]  John S. Heidemann,et al.  Trinocular: understanding internet reliability through adaptive probing , 2013, SIGCOMM.

[31]  Krishna P. Gummadi,et al.  Improving the Reliability of Internet Paths with One-hop Source Routing , 2004, OSDI.

[32]  Huang Xiuli,et al.  Access Control of Cloud Service Based on UCON , 2009, CLOUD-II 2009.

[33]  Ítalo S. Cunha,et al.  LIFEGUARD: practical repair of persistent route failures , 2012, SIGCOMM '12.

[34]  Shadi Aljawarneh,et al.  Cloud security engineering: Early stages of SDLC , 2017, Future Gener. Comput. Syst..

[35]  Liang Zhu,et al.  The Need for End-to-End Evaluation of Cloud Availability , 2014, PAM.

[36]  Tadashi Dohi,et al.  Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes , 2009, CloudCom.

[37]  Shadi Aljawarneh,et al.  A multithreaded programming approach for multimedia big data: encryption system , 2017, Multimedia Tools and Applications.