Skip to main content

Cyber Security: Vulnerabilities and Solutions for Telemedicine over Cloud Architectures

  • Conference paper
Networked Digital Technologies (NDT 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 293))

Included in the following conference series:

Abstract

The acceptance of internet as a ubiquitous mechanism for ICT activities has revolutionized e-applications. Cloud computing is a new discipline to exploit the virtual environment over the internet for applications. Cloud service providers offer large infrastructure, computing power and software services configurable by the client at low upfront cost. But the vulnerability of cyber domain has led to serious security concerns of the clients regarding services and data management. Cyber security mechanisms have evolved in the past two decades to handle these problems at data transport and operation levels. To enhance user confidence in cloud computing, end to end security, data integrity, proof of retrievablity (POR), third party audit (TPA) along with forensic methods have been proposed. The security solutions offered by trusted platform group (TPG) can be used for cloud computing through integration with trusted platform modules (TPM) embedded in the client and server machines. The scheme addresses the physical security concerns posed by the portable data access units like mobiles, notebooks, iPADs and laptops. In this paper we proposed a cyber security solution for telemedicine over the cloud architectures based on available resources.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abu Bakar, A., Andul Rahman, R.I.: Secure Access Protocol using Group Based Access Control (GBAC) scheme. J. Info. Sec. Res. 1, 19–32 (2010)

    Google Scholar 

  2. Cloud Security Alliance : Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 (2009), doi: https://cloudsecurityalliance.org/guidance/csaguide.pdf

  3. ENISA - European Network and Information Security Agency report: Cloud Computing, risks and recommendations for information security (2009)

    Google Scholar 

  4. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications (2010), doi:10.1016/j.jnca.2010.07.006

    Google Scholar 

  5. Zhang, J., Wang, X.: A Novel Access Control Strategy for Distributed Data Systems. J. Digital Info. Mgmt. 8, 291–297 (2010)

    Google Scholar 

  6. Hiroshi, C.S.: Cloud Computing Based on Service Oriented Platform. Fujitsu Sci. Tech. J. 45, 283–289 (2009)

    Google Scholar 

  7. Bowers, K.D., Juels, A., Oprea, A.: HAIL A High-Availability and Integrity Layer for Cloud Storage. RSA Laboratories, Cambridge

    Google Scholar 

  8. Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In: European Symposium on Research in Computer Security - ESORICS, pp. 355–370 (2009), doi:10.1007/978-3-642-04444-1_22

    Google Scholar 

  9. Juels, A., Kaliski, B.: PORs: Proofs of Retrievability for Large Files. In: ACM CCS, pp. 584–597 (2007)

    Google Scholar 

  10. Harris, R.: Arriving at an antiforensic concensus. Examining how to define and control the anti-forensics problem. Digital Investigation 3, 44–49 (2006), doi:10.1016/j.diin.2006.06.005

    Google Scholar 

  11. Santos, N., Gummadi, K.P., Rodrigues, R.: Towards Trusted Cloud Computing. In: HotCloud 2009, Workshop on Topics in Cloud Computing (2009), doi:10.1.1.149.2162

    Google Scholar 

  12. TCG, https://www.trustedcomputinggroup.org

  13. Bajikar, S.: Trusted Platform Module (TPM) based security on notebook PCs – White paper. Intel corporation, Mobile Platforms Group (2002)

    Google Scholar 

  14. Chow, R., Golle, P., Jakobsson, M., Masuoka, R., Molina, J.: Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. In: CCSW 2009, Chicago, Illinois, USA (2009)

    Google Scholar 

  15. Ahmed, S., Qadir, A., Asad, R.: Security in large Scale Distributed Systems (Computational Grids: Critique and Solutions). In: HONET 2005, Int’l Symp., Islamabad, Pakistan (2005)

    Google Scholar 

  16. Ahmed, S., Mahmood, P.: Architecture for Grid Enhanced Operating System. In: HONET 2007, Int’l Symp., Dubai, UAE (2007)

    Google Scholar 

  17. Ahmed, S.: Grid Services Architecture for Archiving and Presentation of Medical Images. In: HONET 2007, Int’l Symp., Dubai, UAE (2007)

    Google Scholar 

  18. Ahmed, S., Raja, M.Y.A.: Tackling Cloud Security Issues and Forensics Model. In: HONET 2010, Int’l Symp., Proc. IEEE Xplore, Cairo, Egypt., pp. 190–195 (2011), doi:10.1109/HONET.2010.5715771

    Google Scholar 

  19. Protecting Personal Health Information in Research: Understanding the HIPPA Privacy Rule, Department of Health and Human Services, USA, NIH Publication Number 03-5388, http://www.hhs.gov/ocr/hippa

  20. Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services (2009), http://aws.amazon.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ahmed, S., Abdullah, A., Raja, M.Y.A. (2012). Cyber Security: Vulnerabilities and Solutions for Telemedicine over Cloud Architectures. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30507-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30507-8_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30506-1

  • Online ISBN: 978-3-642-30507-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics