Abstract
The acceptance of internet as a ubiquitous mechanism for ICT activities has revolutionized e-applications. Cloud computing is a new discipline to exploit the virtual environment over the internet for applications. Cloud service providers offer large infrastructure, computing power and software services configurable by the client at low upfront cost. But the vulnerability of cyber domain has led to serious security concerns of the clients regarding services and data management. Cyber security mechanisms have evolved in the past two decades to handle these problems at data transport and operation levels. To enhance user confidence in cloud computing, end to end security, data integrity, proof of retrievablity (POR), third party audit (TPA) along with forensic methods have been proposed. The security solutions offered by trusted platform group (TPG) can be used for cloud computing through integration with trusted platform modules (TPM) embedded in the client and server machines. The scheme addresses the physical security concerns posed by the portable data access units like mobiles, notebooks, iPADs and laptops. In this paper we proposed a cyber security solution for telemedicine over the cloud architectures based on available resources.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abu Bakar, A., Andul Rahman, R.I.: Secure Access Protocol using Group Based Access Control (GBAC) scheme. J. Info. Sec. Res. 1, 19–32 (2010)
Cloud Security Alliance : Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 (2009), doi: https://cloudsecurityalliance.org/guidance/csaguide.pdf
ENISA - European Network and Information Security Agency report: Cloud Computing, risks and recommendations for information security (2009)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications (2010), doi:10.1016/j.jnca.2010.07.006
Zhang, J., Wang, X.: A Novel Access Control Strategy for Distributed Data Systems. J. Digital Info. Mgmt. 8, 291–297 (2010)
Hiroshi, C.S.: Cloud Computing Based on Service Oriented Platform. Fujitsu Sci. Tech. J. 45, 283–289 (2009)
Bowers, K.D., Juels, A., Oprea, A.: HAIL A High-Availability and Integrity Layer for Cloud Storage. RSA Laboratories, Cambridge
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In: European Symposium on Research in Computer Security - ESORICS, pp. 355–370 (2009), doi:10.1007/978-3-642-04444-1_22
Juels, A., Kaliski, B.: PORs: Proofs of Retrievability for Large Files. In: ACM CCS, pp. 584–597 (2007)
Harris, R.: Arriving at an antiforensic concensus. Examining how to define and control the anti-forensics problem. Digital Investigation 3, 44–49 (2006), doi:10.1016/j.diin.2006.06.005
Santos, N., Gummadi, K.P., Rodrigues, R.: Towards Trusted Cloud Computing. In: HotCloud 2009, Workshop on Topics in Cloud Computing (2009), doi:10.1.1.149.2162
Bajikar, S.: Trusted Platform Module (TPM) based security on notebook PCs – White paper. Intel corporation, Mobile Platforms Group (2002)
Chow, R., Golle, P., Jakobsson, M., Masuoka, R., Molina, J.: Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. In: CCSW 2009, Chicago, Illinois, USA (2009)
Ahmed, S., Qadir, A., Asad, R.: Security in large Scale Distributed Systems (Computational Grids: Critique and Solutions). In: HONET 2005, Int’l Symp., Islamabad, Pakistan (2005)
Ahmed, S., Mahmood, P.: Architecture for Grid Enhanced Operating System. In: HONET 2007, Int’l Symp., Dubai, UAE (2007)
Ahmed, S.: Grid Services Architecture for Archiving and Presentation of Medical Images. In: HONET 2007, Int’l Symp., Dubai, UAE (2007)
Ahmed, S., Raja, M.Y.A.: Tackling Cloud Security Issues and Forensics Model. In: HONET 2010, Int’l Symp., Proc. IEEE Xplore, Cairo, Egypt., pp. 190–195 (2011), doi:10.1109/HONET.2010.5715771
Protecting Personal Health Information in Research: Understanding the HIPPA Privacy Rule, Department of Health and Human Services, USA, NIH Publication Number 03-5388, http://www.hhs.gov/ocr/hippa
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services (2009), http://aws.amazon.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ahmed, S., Abdullah, A., Raja, M.Y.A. (2012). Cyber Security: Vulnerabilities and Solutions for Telemedicine over Cloud Architectures. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30507-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-30507-8_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30506-1
Online ISBN: 978-3-642-30507-8
eBook Packages: Computer ScienceComputer Science (R0)