Skip to main content

Security Aspects of Cloud Based Mobile Health Care Application

  • Conference paper
  • First Online:
Book cover Nature of Computation and Communication (ICTCC 2014)

Abstract

As mobile computing has become very common, a new vulnerabilities and security threads appeared. Cloud computing is a new distribution model of services for various technologies and solutions including the mobile applications. Mobile cloud computing benefits from the interconnection of these two areas. This approach brings many assets, but on the other hand, also the security risks and potential problems. This paper discuss security aspects of mobile cloud computing with a focus on the developed health care mobile application using cloud computation services. Personal data about health of the person are one of the most confidential thus need to be secured against different types of threats. Proposed solution is based on the smartphone as a client gathering data and the cloud servers as a computational platform for data storage and analysing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hřebíček, J. a kol.: Scientific computing in mathematical biology, MU (2012). http://www.iba.muni.cz/res/file/ucebnice/hrebicek-vedecke-vypocty.pdf

  2. Bureš, V., Otčenášková, T., Čech, P., Antoš, K.: A Proposal for a Computer-Based Framework of Support for Public Health in the Management of Biological Incidents: the Czech Republic Experience. Perspectives in Public Health 132(6), 292–298 (2012). doi:10.1177/1757913912444260. ISSN: 1757-9139

    Article  Google Scholar 

  3. Allan, R.: Cloud and Web 2.0 resources for supporting research (2012). http://tyne.dl.ac.uk/NWGrid/Clouds/

  4. Bureš, V., Brunet-Thornton, R.: Knowledge management: the czech situation, possible solutions and the necessity for further research. In: Proceedings of the 6th International Conference on Intellectual Capital and Knowledge Management, McGill University, Montréal, Canada, pp. 95–102 (2009). ISBN: 978-1-906638-45-0

    Google Scholar 

  5. Chirag, M., Dhiren, P., Bhavesh, B., Avi, P., Muttukrishnan, R.: A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing 63(2), 561–592 (2013). doi:10.1007/s11227-012-0831-5. ISSN: 0920-8542

    Article  Google Scholar 

  6. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(1), 1–11 (2011). http://dx.doi.org/10.1016/j.jnca.2010.07.006. ISSN: 1084-8045

    Article  Google Scholar 

  7. Hashizume, K., Rosado, D.G., Fernández-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. Journal of Internet Services and Applications 4(5) (2013). doi: 10.1186/1869-0238-4-5. ISSN: 1867-4828

  8. Fernandes Diogo, A.B., Soares Liliana, F.B., Gomes João, V., Freire Mário, M., Inácio Pedro, R.M.: Security issues in cloud environments: a survey. International Journal of Information Security (2013). doi: 10.1007/s10207-013-0208-7. ISSN: 1615-5262

  9. Lee, H., Kim, J., Lee, Y., Won, D.: Security issues and threats according to the attribute of cloud computing. In: Kim, T., Stoica, A., Fang, W., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., Kang, B.-H. (eds.) SecTech, CA, CES3 2012. CCIS, vol. 339, pp. 101–108. Springer, Heidelberg (2012). doi:10.1007/978-3-642-35264-5_14. ISSN: 978-3-642-35264-5

    Chapter  Google Scholar 

  10. Weihua, J., Shibing, S.: Research on the security issues of cloud computing. In: Du, Z. (ed.) Intelligence Computation and Evolutionary Computation. AISC, vol. 180, pp. 845–848. Springer, Heidelberg (2013). doi:10.1007/978-3-642-31656-2_115. ISSN: 2194-5357

    Chapter  Google Scholar 

  11. Mouratidis, H., Islam, S., Kalloniatis, Ch., Gritzalis, S.: A framework to support selection of cloud providers based on security and privacy requirements. Journal of Systems and Software 86(9), 2276–2293 (2013). http://dx.doi.org/10.1016/j.jss.2013.03.011. ISSN: 0164-1212

    Article  Google Scholar 

  12. Sujithra, M., Padmavathi, G.: Mobile device security: A survey on mobile device threats, vulnerabilities and their defensive mechanism. International Journal of Computer Applications 56(14) (2012). doi:http://dx.doi.org/10.5120/8960-3163. ISSN: 09758887

  13. Cagalaban, G., Kim, S., Kim, M.: A mobile device-based virtualization technique for M2M communication in cloud computing security. In: Kim, T., et al. (eds.) SecTech, CA, CES3 2012. CCIS, vol. 339, pp. 160–167. Springer, Heidelberg (2012). doi:10.1007/978-3-642-35264-5_23. ISSN: 18650929

    Chapter  Google Scholar 

  14. Singhal, M., Chandrasekhar, S., Ge, T., Sandhu, R., Krishnan, R., Ahn, G.J., Bertino, E.: Collaboration in Multicloud Computing Environments: Framework and Security Issues. Computer 46(2), 76–84 (2013). ISSN: 0018-9162, WOS:000314943300019

    Article  Google Scholar 

  15. Popa, D., Boudaoud, K., Borda, M.: Secure mobile-cloud framework - implementation on the mobile device. Acta Technica Napocensis 54(4), 7–12 (2013). ISSN: 12216542

    Google Scholar 

  16. Wood, J., Aboba, B.: RFC 3539 - Authentication, Authorization and Accounting (AAA) Transport Profile (2003). http://tools.ietf.org/html/rfc3539

  17. Singhal, M., Chandrasekhar, S., Ge, T., Sandhu, R., Krishnan, R., Ahn, G.J., Bertino, E.: Collaboration in Multicloud Computing Environments: Framework and Security Issues. Computer 46(2), 76–84 (2013). ISSN: 0018-9162, WOS:000314943300019

    Article  Google Scholar 

  18. Gejibo, S., Mancini, F., Mughal, K.A., Valvik, R., Klungsøyr, J.: Challenges in implementing an end-to-end secure protocol for Java ME-based mobile data collection in low-budget settings. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol. 7159, pp. 38–45. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  19. European Union Agency for Network and Information Security. Cloud Computing Risk Assessment — ENISA (2009). http://www.enisa.europa.eu/activities/risk-management/files/deliverables/cloud-computing-risk-assessment

  20. Brodkin, J.: Gartner: Seven cloud-computing security risks. Infoworld, 1–3 (2008)

    Google Scholar 

  21. Suba, P., Tucnik, P.: Mobile monitoring system for elder people healthcare and AAL. In: Conference on Intelligent Environments, vol. 17, pp. 403–414 (2013). doi:10.3233/978-1-61499-286-8-403

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vladimir Sobeslav .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Cimler, R., Matyska, J., Balik, L., Horalek, J., Sobeslav, V. (2015). Security Aspects of Cloud Based Mobile Health Care Application. In: Vinh, P., Vassev, E., Hinchey, M. (eds) Nature of Computation and Communication. ICTCC 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 144. Springer, Cham. https://doi.org/10.1007/978-3-319-15392-6_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15392-6_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15391-9

  • Online ISBN: 978-3-319-15392-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics