Abstract
Technology is already affecting every aspect of life, and our health is no exception. Artificial intelligence (AI) has become one of the most emerging technologies over the last few years in almost every environment. New technological advances such as cloud computing provide benefits and have changed the way we store, access and exchange information. Especially, in the Healthcare IT sector, cloud-based systems offer great potential, from many perspectives, including improved medical diagnosis, accurate and faster prediction and cost-effective management treatment. In an attempt to assist cloud providers and healthcare organizations to secure their cloud-based environment and to adopt the appropriate measures for data protection, we present an overview of the security and privacy requirements of cloud-based healthcare systems. Specifically, this chapter starts with the presentation of the reported threats in cloud-based health systems, continues with the identified objectives and assets and concludes with measures for the mitigation of the identified threats. Due to the fact, migration into cloud-based healthcare systems, in most cases, implies that data subjects lose control of their data, many scientists have raised their worries about this. It is therefore needed to re-consider security, privacy and trust requirements, in the context of cloud computing. This chapter makes concrete recommendations for improving the protection level of cloud-based health organizations, cloud providers, hospitals and patients.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Mell, P., Grance, T.: The NIST definition of cloud computing. Nat. Inst. Std. Technol. 53(6), 50 (2009)
Mell, P., Grance, T.: The NIST definition of cloud computing (2011)
Lupşe, O.S., Vida, M.M., Tivadar, L.S.: Cloud computing and interoperability in healthcare information systems. In INTELLI 2012: the first international conference on intelligent systems and applications (2012)
Hassan, T., James, B.D., Gail-Joon, A.: Security and privacy challenges in cloud computing environments. IEEE J. Mag. 8(6), 32–39 (2010)
Takabi, H., Joshi, J., Ahn, G.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. Mag. 8(6), 24–31 (2011)
Georgiou, D.: Security policies for cloud computing. Ph.D. University of Piraeus, Piraeus, Greece. http://dione.lib.unipi.gr/xmlui/bitstream/handle/unipi/11007/Georgiou_Dimitra.pdf?sequence=1&isAllowed=y (2018)
Cloud Security Alliance: The Notorious nine: cloud computing top threats in 2013. http://www.cloudsecurityalliance.org/topthreats/ (2013). Accessed 2013
Cloud Security Alliance: Top threats to cloud computing: deep dive 2018. https://downloads.cloudsecurityalliance.org/assets/research/top-threats/top-threats-to-cloud-computing-deep-dive.pdf,Accessed (2018), 30 September 2018
ENISA: Threat landscape report 2018 15 top cyber threats and trends. https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2018 (2018). Accessed 25 March 2018
ISACA: Security considerations for cloud computing https://www.isaca.org/bookstore/Pages/Product-Detail.aspx?Product_code=SCC (2012). Accessed 25 November 2018
Georgiou, D., Lambrinoudakis, C.: A security policy for cloud providers. In Proceedings of the 9th international conference on internet monitoring and protection, ICIMP, pp. 13–21 (2014)
Georgiou, D., Lambrinoudakis, C.: Cloud computing security requirements and a methodology for their auditing. In International Conference on e-Democracy, pp. 51–61. Springer, Cham (2015)
Georgiou, D., Lambrinoudakis, C.: Security policy rules and required procedures for two crucial cloud computing threats. Int. J. Electron. Gov. 9(3–4), 385–403 (2017)
Ryser, J., Glinz, M.: SCENT—a method employing scenarios to systematically derive test cases for system test, Technical Report 2000.03, Institut für Informatik, University of Zurich (2000)
Health Insurance Portability and Accountability Act: Healthcare data breach report. https://www.hipaajournal.com/january-2019-healthcare-data-breach-report/ (2019). Accessed 23 Jan 2019
Alex, M.-H.K.: Opportunities and challenges of cloud computing to improve health care services. J. Med. Internet Res. (2011)
Abdul Manan, I.A.: Opportunities and threats of cloud computing in healthcare. Int. J. Comput. Appl. 10(2), 0975–887 (2014)
Abbas, A., Khan, M., Ali, M., Khan, S., Yang, L.: A cloud based framework for identification of influential health experts from Twitter. In Proceedings of the 15th International Conference on Scalable Computing and Communications (ScalCom), Beijing, China, pp. 831–838 (2015)
Velte, A.T., Velte, T.J., Elsenpeter, R.C., Elsenpeter, R.C.: Cloud computing: a practical approach, p. 44. McGraw-Hill, New York (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer-Verlag GmbH Germany, part of Springer Nature
About this chapter
Cite this chapter
Georgiou, D., Lambrinoudakis, C. (2020). Security and Privacy Issues for Intelligent Cloud-Based Health Systems. In: Maglogiannis, I., Brahnam, S., Jain, L. (eds) Advanced Computational Intelligence in Healthcare-7. Studies in Computational Intelligence, vol 891. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-61114-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-662-61114-2_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-61112-8
Online ISBN: 978-3-662-61114-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)