Next generation cyber security solution for an eHealth organization

eHealth organizations are a major target for hackers as they hold wealth of information. Current cyber security solutions for eHealth organizations are not comprehensive and only protect certain security layer. Therefore; the need for a next generation cyber security solution is increasing, a solution that is smart, scalable and adoptable to challenges. The wide spread of security tools and advancing technology have provided the needed infrastructure to create a comprehensive eHealth security solution. Connecting the right security tools together to ensure the overall security without affecting the network performance and user productivity is hard and requires special setup. The network layer is a major target for any eHealth organization, this research has indicated several network security metrics that need to be considered when designing and managing network security for an eHealth organization. The ultimate goal of this research is to identify the limitations in the current eHealth organization cyber security solutions specially the network layer and propose a next generation cyber security solution for eHealth organizations.

[1]  Jason Chong Lee,et al.  Integrating scenario-based usability engineering and agile software development , 2010 .

[2]  Noboru Sonehara,et al.  Privacy-aware access to Patient-controlled Personal Health Records in emergency situations , 2009, 2009 3rd International Conference on Pervasive Computing Technologies for Healthcare.

[3]  Salvatore J. Stolfo,et al.  Measuring Drive-by Download Defense in Depth , 2014, RAID.

[4]  Xuemin Shen,et al.  SPS: Secure personal health information sharing with patient-centric access control in cloud computing , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[5]  Abeer Alsadoon,et al.  Enhanced e-health framework for security and privacy in healthcare system , 2016, 2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC).

[6]  Maryam Ahmadi,et al.  Security Requirements and Solutions in Electronic Health Records: Lessons Learned from a Comparative Study , 2010, Journal of Medical Systems.

[7]  Khalid Khan,et al.  Integrating usability engineering and agile software development: A literature review , 2010, 2010 International Conference On Computer Design and Applications.

[8]  Tony R. Sahama,et al.  Network security metrics and performance for healthcare systems management , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).

[9]  Adel Taweel,et al.  Privacy-Aware Agent-Oriented Architecture for Distributed eHealth Systems , 2014, OTM Workshops.

[10]  Alexandru Soceanu,et al.  Managing the Privacy and Security of eHealth Data , 2015, 2015 20th International Conference on Control Systems and Computer Science.

[11]  Joseph G. Tront,et al.  Advancing the defense in depth model , 2012, 2012 7th International Conference on System of Systems Engineering (SoSE).

[12]  D. Scott McCrickard,et al.  Towards Extreme(ly) Usable Software: Exploring Tensions Between Usability and Agile Software Development , 2007, Agile 2007 (AGILE 2007).

[13]  Jean-Noel Colin,et al.  Towards purpose enforcement model for privacy-aware usage control policy in distributed healthcare , 2013, Int. J. Secur. Networks.

[14]  Shelly Sachdeva,et al.  A Model of Privacy and Security for Electronic Health Records , 2014, DNIS.

[15]  Masoud Hayeri Khyavi,et al.  Conceptual Model for Security in Next Generation Network , 2016, 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA).

[16]  Ling Liu,et al.  Security Models and Requirements for Healthcare Application Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[17]  Salvatore J. Stolfo,et al.  Measuring Security , 2011, IEEE Security & Privacy.