Security in Cloud-Computing-Based Mobile Health

@article{Albuquerque2016SecurityIC,
  title={Security in Cloud-Computing-Based Mobile Health},
  author={Silas L. Albuquerque and Paulo R. L. Gondim},
  journal={IT Professional},
  year={2016},
  volume={18},
  pages={37-44}
}
Cloud computing as a current trend is used, most simply, to remotely store information, but can also enable the execution of distributed mobile systems in a cloud-computing environment. Its application in the mobile health (m-health) field provides several benefits and improves the work of professionals and health organizations. However, the vulnerabilities of the infrastructure involved in cloud-computing-based m-health systems must be of constant concern to IT professionals. This article… 

Figures and Tables from this paper

Data security issues in the realm of mobile cloud computing: A survey
TLDR
The aim of this survey is to identify potential data security issues, and analyse and present some pioneering security mechanisms and finally suggest some future directions for better data security with MCC.
Security challenges and solutions using healthcare cloud computing
TLDR
According to the review, data security, availability, and integrity, as well as information confidentiality and network security, were the major challenges in cloud security.
Security in Cloud Computing-Based Mobile Commerce
TLDR
By incorporating cloud computing in mobile commerce will give lots of advantage for business industry as well as the user with lower cost and high benefits, security, flexibility, scalability, mobility, and efficiency.
Secure Authentication Protocol for Efficient Computational Offloading Service in the Mobile Cloud Computing
TLDR
New security protocol to authenticate mobile and cloud server with zero knowledge proof of authentication to verify the communication entities and recommends to offload the service is proposed.
On the cybersecurity of m-Health IoT systems with LED bitslice implementation
TLDR
A novel security framework for m-Health IoT security is proposed using the concept of moving target defense (MTD), which allows the m- health system to dynamically change its cryptographic keys to increase uncertainty on an attacker and secure the data.
A Two-tier Security Solution for Storing Data Across Public Cloud
TLDR
The proposed OwnData model to provide privacy and confidentiality to the user data successfully secures data in an encrypted format and only the owner of the data can have access to the original data shared across the cloud.
New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing
TLDR
A new authentication scheme is proposed to provide novel security to the mobile cloud services that will verify the user and service provider without transmitting the password using the Zero-knowledge proof based authentication protocol.
Exploring the need for a suitable privacy framework for mHealth when managing chronic diseases
TLDR
The paper argues that a new privacy framework is needed for mHealth in the context of managing chronic diseases, and compares the existing privacy frameworks applicable to mHealth to find their suitability for enabling adequate privacy.
Causal Analysis of Software Development Attributes for Cloud Applications: A Health Insurance Solution Case
TLDR
A cloud-based health insurance solution that enables consumers to purchase packages online with the objective of identifying attributes in the context of the development process while analyzing the association among the attributes.
Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study
TLDR
Results suggest that the existing research on security and privacy of m/uHealth systems primarily focuses on select group of control families (compliant with NIST800-53), protection of systems and information, access control, authentication, individual participation, and privacy authorisation.
...
...

References

SHOWING 1-10 OF 21 REFERENCES
Cloud Computing for Enhanced Mobile Health Applications
  • M. Nkosi, F. Mekuria
  • Computer Science
    2010 IEEE Second International Conference on Cloud Computing Technology and Science
  • 2010
TLDR
A cloud computing framework to relieve mobile devices from executing heavier multimedia and security algorithms in delivering mobile health services is described, which intends to provide multimedia sensor signal processing & security as a service to mobile devices.
Security and privacy in mobile cloud computing
TLDR
By deeply analyzing the security and privacy issues from three aspects: mobile terminal, mobile network and cloud, the currentSecurity and privacy approaches for mobile cloud computing are given.
A survey of mobile cloud computing: architecture, applications, and approaches
TLDR
A survey of MCC is given, which helps general readers have an overview of the MCC including the definition, architecture, and applications and the issues, existing solutions, and approaches are presented.
A Secure Authentication Scheme of Health Care Based on the Cloud
TLDR
This work proposes a secure authentication scheme of health care based on the cloud that can help the patient and the caregiver transmit the private health information via secure authentication.
Addressing cloud computing security issues
A Survey of Mobile Cloud Computing Application Models
TLDR
The mobile cloud architecture, offloading decision affecting entities, application models classification, the latest mobile cloud application models, their critical analysis and future research directions are presented.
Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks
TLDR
This paper proposes an innovative architecture for collecting and accessing large amount of data generated by medical sensor networks and proposes an effective and flexible security mechanism that guarantees confidentiality, integrity as well as fine grained access control to outsourced medical data.
Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
TLDR
This work proposes to integrate key management from pseudorandom number generator for unlinkability, a secure indexing method for privacy-preserving keyword search, and integrate the concept of attribute-based encryption with threshold signing for providing role-based access control with auditability to prevent potential misbehavior.
A Light Review of Data Security and Privacy Approaches Applicable to E-Health Systems
TLDR
This paper will review data security and privacy approaches that can enable successful integration of wireless communication with e-health applications.
...
...