Abstract
As mobile computing has become very common, a new vulnerabilities and security threads appeared. Cloud computing is a new distribution model of services for various technologies and solutions including the mobile applications. Mobile cloud computing benefits from the interconnection of these two areas. This approach brings many assets, but on the other hand, also the security risks and potential problems. This paper discuss security aspects of mobile cloud computing with a focus on the developed health care mobile application using cloud computation services. Personal data about health of the person are one of the most confidential thus need to be secured against different types of threats. Proposed solution is based on the smartphone as a client gathering data and the cloud servers as a computational platform for data storage and analysing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hřebíček, J. a kol.: Scientific computing in mathematical biology, MU (2012). http://www.iba.muni.cz/res/file/ucebnice/hrebicek-vedecke-vypocty.pdf
Bureš, V., Otčenášková, T., Čech, P., Antoš, K.: A Proposal for a Computer-Based Framework of Support for Public Health in the Management of Biological Incidents: the Czech Republic Experience. Perspectives in Public Health 132(6), 292–298 (2012). doi:10.1177/1757913912444260. ISSN: 1757-9139
Allan, R.: Cloud and Web 2.0 resources for supporting research (2012). http://tyne.dl.ac.uk/NWGrid/Clouds/
Bureš, V., Brunet-Thornton, R.: Knowledge management: the czech situation, possible solutions and the necessity for further research. In: Proceedings of the 6th International Conference on Intellectual Capital and Knowledge Management, McGill University, Montréal, Canada, pp. 95–102 (2009). ISBN: 978-1-906638-45-0
Chirag, M., Dhiren, P., Bhavesh, B., Avi, P., Muttukrishnan, R.: A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing 63(2), 561–592 (2013). doi:10.1007/s11227-012-0831-5. ISSN: 0920-8542
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(1), 1–11 (2011). http://dx.doi.org/10.1016/j.jnca.2010.07.006. ISSN: 1084-8045
Hashizume, K., Rosado, D.G., Fernández-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. Journal of Internet Services and Applications 4(5) (2013). doi: 10.1186/1869-0238-4-5. ISSN: 1867-4828
Fernandes Diogo, A.B., Soares Liliana, F.B., Gomes João, V., Freire Mário, M., Inácio Pedro, R.M.: Security issues in cloud environments: a survey. International Journal of Information Security (2013). doi: 10.1007/s10207-013-0208-7. ISSN: 1615-5262
Lee, H., Kim, J., Lee, Y., Won, D.: Security issues and threats according to the attribute of cloud computing. In: Kim, T., Stoica, A., Fang, W., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., Kang, B.-H. (eds.) SecTech, CA, CES3 2012. CCIS, vol. 339, pp. 101–108. Springer, Heidelberg (2012). doi:10.1007/978-3-642-35264-5_14. ISSN: 978-3-642-35264-5
Weihua, J., Shibing, S.: Research on the security issues of cloud computing. In: Du, Z. (ed.) Intelligence Computation and Evolutionary Computation. AISC, vol. 180, pp. 845–848. Springer, Heidelberg (2013). doi:10.1007/978-3-642-31656-2_115. ISSN: 2194-5357
Mouratidis, H., Islam, S., Kalloniatis, Ch., Gritzalis, S.: A framework to support selection of cloud providers based on security and privacy requirements. Journal of Systems and Software 86(9), 2276–2293 (2013). http://dx.doi.org/10.1016/j.jss.2013.03.011. ISSN: 0164-1212
Sujithra, M., Padmavathi, G.: Mobile device security: A survey on mobile device threats, vulnerabilities and their defensive mechanism. International Journal of Computer Applications 56(14) (2012). doi:http://dx.doi.org/10.5120/8960-3163. ISSN: 09758887
Cagalaban, G., Kim, S., Kim, M.: A mobile device-based virtualization technique for M2M communication in cloud computing security. In: Kim, T., et al. (eds.) SecTech, CA, CES3 2012. CCIS, vol. 339, pp. 160–167. Springer, Heidelberg (2012). doi:10.1007/978-3-642-35264-5_23. ISSN: 18650929
Singhal, M., Chandrasekhar, S., Ge, T., Sandhu, R., Krishnan, R., Ahn, G.J., Bertino, E.: Collaboration in Multicloud Computing Environments: Framework and Security Issues. Computer 46(2), 76–84 (2013). ISSN: 0018-9162, WOS:000314943300019
Popa, D., Boudaoud, K., Borda, M.: Secure mobile-cloud framework - implementation on the mobile device. Acta Technica Napocensis 54(4), 7–12 (2013). ISSN: 12216542
Wood, J., Aboba, B.: RFC 3539 - Authentication, Authorization and Accounting (AAA) Transport Profile (2003). http://tools.ietf.org/html/rfc3539
Singhal, M., Chandrasekhar, S., Ge, T., Sandhu, R., Krishnan, R., Ahn, G.J., Bertino, E.: Collaboration in Multicloud Computing Environments: Framework and Security Issues. Computer 46(2), 76–84 (2013). ISSN: 0018-9162, WOS:000314943300019
Gejibo, S., Mancini, F., Mughal, K.A., Valvik, R., Klungsøyr, J.: Challenges in implementing an end-to-end secure protocol for Java ME-based mobile data collection in low-budget settings. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol. 7159, pp. 38–45. Springer, Heidelberg (2012)
European Union Agency for Network and Information Security. Cloud Computing Risk Assessment — ENISA (2009). http://www.enisa.europa.eu/activities/risk-management/files/deliverables/cloud-computing-risk-assessment
Brodkin, J.: Gartner: Seven cloud-computing security risks. Infoworld, 1–3 (2008)
Suba, P., Tucnik, P.: Mobile monitoring system for elder people healthcare and AAL. In: Conference on Intelligent Environments, vol. 17, pp. 403–414 (2013). doi:10.3233/978-1-61499-286-8-403
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Cimler, R., Matyska, J., Balik, L., Horalek, J., Sobeslav, V. (2015). Security Aspects of Cloud Based Mobile Health Care Application. In: Vinh, P., Vassev, E., Hinchey, M. (eds) Nature of Computation and Communication. ICTCC 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 144. Springer, Cham. https://doi.org/10.1007/978-3-319-15392-6_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-15392-6_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15391-9
Online ISBN: 978-3-319-15392-6
eBook Packages: Computer ScienceComputer Science (R0)