Security Aspects of Cloud Based Mobile Health Care Application

As mobile computing has become very common, a new vulnerabilities and security threads appeared. Cloud computing is a new distribution model of services for various technologies and solutions including the mobile applications. Mobile cloud computing benefits from the interconnection of these two areas. This approach brings many assets, but on the other hand, also the security risks and potential problems. This paper discuss security aspects of mobile cloud computing with a focus on the developed health care mobile application using cloud computation services. Personal data about health of the person are one of the most confidential thus need to be secured against different types of threats. Proposed solution is based on the smartphone as a client gathering data and the cloud servers as a computational platform for data storage and analysing.

[1]  Mário M. Freire,et al.  Security issues in cloud environments: a survey , 2014, International Journal of Information Security.

[2]  Dongho Won,et al.  Security Issues and Threats According to the Attribute of Cloud Computing , 2012 .

[3]  Petr Tucník,et al.  Mobile Monitoring System for Elder People Healthcare and AAL , 2013, Intelligent Environments.

[4]  Jia Weihua,et al.  Research on the Security Issues of Cloud Computing , 2013 .

[5]  Federico Mancini,et al.  Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings , 2012, ESSoS.

[6]  Tai-hoon Kim,et al.  Computer Applications for Security, Control and System Engineering , 2012, Communications in Computer and Information Science.

[7]  Jonathan Wood,et al.  Authentication, Authorization and Accounting (AAA) Transport Profile , 2003, RFC.

[8]  Monica Borda,et al.  Secure Mobile-Cloud Framework - Implementation on the Mobile Device , 2013 .

[9]  Úlfar Erlingsson,et al.  Engineering Secure Software and Systems , 2011, Lecture Notes in Computer Science.

[10]  G. Padmavathi,et al.  Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism , 2012 .

[11]  Tereza Otcenásková,et al.  A proposal for a computer-based framework of support for public health in the management of biological incidents: the Czech Republic experience , 2012, Perspectives in public health.

[12]  Haralambos Mouratidis,et al.  A framework to support selection of cloud providers based on security and privacy requirements , 2013, J. Syst. Softw..

[13]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[14]  Zhenyu Du,et al.  Intelligence Computation and Evolutionary Computation , 2013 .

[15]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[16]  Minho Kim,et al.  A Mobile Device-Based Virtualization Technique for M2M Communication in Cloud Computing Security , 2012 .

[17]  Mukesh Singhal,et al.  Collaboration in multicloud computing environments: Framework and security issues , 2013, Computer.

[18]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.