Skip to main content

Security and Privacy Issues for Intelligent Cloud-Based Health Systems

  • Chapter
  • First Online:
Advanced Computational Intelligence in Healthcare-7

Part of the book series: Studies in Computational Intelligence ((SCI,volume 891))

Abstract

Technology is already affecting every aspect of life, and our health is no exception. Artificial intelligence (AI) has become one of the most emerging technologies over the last few years in almost every environment. New technological advances such as cloud computing provide benefits and have changed the way we store, access and exchange information. Especially, in the Healthcare IT sector, cloud-based systems offer great potential, from many perspectives, including improved medical diagnosis, accurate and faster prediction and cost-effective management treatment. In an attempt to assist cloud providers and healthcare organizations to secure their cloud-based environment and to adopt the appropriate measures for data protection, we present an overview of the security and privacy requirements of cloud-based healthcare systems. Specifically, this chapter starts with the presentation of the reported threats in cloud-based health systems, continues with the identified objectives and assets and concludes with measures for the mitigation of the identified threats. Due to the fact, migration into cloud-based healthcare systems, in most cases, implies that data subjects lose control of their data, many scientists have raised their worries about this. It is therefore needed to re-consider security, privacy and trust requirements, in the context of cloud computing. This chapter makes concrete recommendations for improving the protection level of cloud-based health organizations, cloud providers, hospitals and patients.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mell, P., Grance, T.: The NIST definition of cloud computing. Nat. Inst. Std. Technol. 53(6), 50 (2009)

    Google Scholar 

  2. Mell, P., Grance, T.: The NIST definition of cloud computing (2011)

    Google Scholar 

  3. LupÅŸe, O.S., Vida, M.M., Tivadar, L.S.: Cloud computing and interoperability in healthcare information systems. In INTELLI 2012: the first international conference on intelligent systems and applications (2012)

    Google Scholar 

  4. Hassan, T., James, B.D., Gail-Joon, A.: Security and privacy challenges in cloud computing environments. IEEE J. Mag. 8(6), 32–39 (2010)

    Google Scholar 

  5. Takabi, H., Joshi, J., Ahn, G.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. Mag. 8(6), 24–31 (2011)

    Article  Google Scholar 

  6. Georgiou, D.: Security policies for cloud computing. Ph.D. University of Piraeus, Piraeus, Greece. http://dione.lib.unipi.gr/xmlui/bitstream/handle/unipi/11007/Georgiou_Dimitra.pdf?sequence=1&isAllowed=y (2018)

  7. Cloud Security Alliance: The Notorious nine: cloud computing top threats in 2013. http://www.cloudsecurityalliance.org/topthreats/ (2013). Accessed 2013

  8. Cloud Security Alliance: Top threats to cloud computing: deep dive 2018. https://downloads.cloudsecurityalliance.org/assets/research/top-threats/top-threats-to-cloud-computing-deep-dive.pdf,Accessed (2018), 30 September 2018

  9. ENISA: Threat landscape report 2018 15 top cyber threats and trends. https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2018 (2018). Accessed 25 March 2018

  10. ISACA: Security considerations for cloud computing https://www.isaca.org/bookstore/Pages/Product-Detail.aspx?Product_code=SCC (2012). Accessed 25 November 2018

  11. Georgiou, D., Lambrinoudakis, C.: A security policy for cloud providers. In Proceedings of the 9th international conference on internet monitoring and protection, ICIMP, pp. 13–21 (2014)

    Google Scholar 

  12. Georgiou, D., Lambrinoudakis, C.: Cloud computing security requirements and a methodology for their auditing. In International Conference on e-Democracy, pp. 51–61. Springer, Cham (2015)

    Google Scholar 

  13. Georgiou, D., Lambrinoudakis, C.: Security policy rules and required procedures for two crucial cloud computing threats. Int. J. Electron. Gov. 9(3–4), 385–403 (2017)

    Google Scholar 

  14. Ryser, J., Glinz, M.: SCENT—a method employing scenarios to systematically derive test cases for system test, Technical Report 2000.03, Institut für Informatik, University of Zurich (2000)

    Google Scholar 

  15. Health Insurance Portability and Accountability Act: Healthcare data breach report. https://www.hipaajournal.com/january-2019-healthcare-data-breach-report/ (2019). Accessed 23 Jan 2019

  16. Alex, M.-H.K.: Opportunities and challenges of cloud computing to improve health care services. J. Med. Internet Res. (2011)

    Google Scholar 

  17. Abdul Manan, I.A.: Opportunities and threats of cloud computing in healthcare. Int. J. Comput. Appl. 10(2), 0975–887 (2014)

    Google Scholar 

  18. Abbas, A., Khan, M., Ali, M., Khan, S., Yang, L.: A cloud based framework for identification of influential health experts from Twitter. In Proceedings of the 15th International Conference on Scalable Computing and Communications (ScalCom), Beijing, China, pp. 831–838 (2015)

    Google Scholar 

  19. Velte, A.T., Velte, T.J., Elsenpeter, R.C., Elsenpeter, R.C.: Cloud computing: a practical approach, p. 44. McGraw-Hill, New York (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dimitra Georgiou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer-Verlag GmbH Germany, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Georgiou, D., Lambrinoudakis, C. (2020). Security and Privacy Issues for Intelligent Cloud-Based Health Systems. In: Maglogiannis, I., Brahnam, S., Jain, L. (eds) Advanced Computational Intelligence in Healthcare-7. Studies in Computational Intelligence, vol 891. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-61114-2_9

Download citation

Publish with us

Policies and ethics