The Security Challenges in Healthcare Cloud Computing

被引:0
|
作者
Alsuwaidani, Talal [1 ]
机构
[1] Univ Qassim, Buraydah, Saudi Arabia
关键词
Healthcare cloud computing; Security; Healthcare infrastructure; Cloud computing challenges;
D O I
10.22937/IJCSNS.2022.22.3.96
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Healthcare data is one of the most sensitive data that should be protected, and its accessibility must not be available for everyone. There are several available methods of saving this type of data, including cloud computing technology. Cloud computing has become one of the leading information technologies that allow more effective computing by centralizing data storage. Recently, one of the most critical challenges facing the cloud computing environment is the security concerns, which has become a challenging issue at present and therefore has been given increasing attention. Thus, this study involves understanding the challenges facing cloud security and how to overcome them, besides the relationship between the infrastructures and maintaining healthcare data security. In this study, 20 published studies between 2013 and 2021 have been reviewed and analyzed in order to obtain the desired outcomes. This study showed that using cloud computing systems in healthcare could expose patient-sensitive data to theft or be accessed by unauthorized persons. Also, this technology involves some challenges such as legal amenabilities, lack of control, trust, consistency, and quality, besides the asset issues, data sharing, availability, secrecy and recovery, geographical data location, as well as unauthorized data access. Furthermore, this study provides several methods to preserve health information security in the cloud system.
引用
收藏
页码:731 / 737
页数:7
相关论文
共 50 条
  • [1] Cloud computing : security challenges
    Bouayad, Anas
    Blilat, Asmae
    el Houda Mejhed, Nour
    El Ghazi, Mohammed
    [J]. 2012 COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST'12), 2012, : 26 - 31
  • [2] Challenges and Security in Cloud Computing
    Chang, Hyokyung
    Choi, Euiin
    [J]. COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 214 - 217
  • [3] Cloud Computing and Security Challenges
    Yu, Huiming
    Powell, Nakia
    Stembridge, Dexter
    Yuan, Xiaohong
    [J]. PROCEEDINGS OF THE 50TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE, 2012,
  • [4] Security Issues in Cloud Computing for Healthcare
    Daman, Repu
    Tripathi, Manish M.
    Mishra, Saroj K.
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 1231 - 1236
  • [5] A Survey of Security Challenges in Cloud Computing
    El Moctar, Cheikh Brahim Ould Mohamed
    Konate, Karim
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 843 - 849
  • [6] An Analysis of Security Challenges in Cloud Computing
    Parekh, Disha H.
    Sridaran, R.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (01) : 38 - 46
  • [7] Security Challenges in Vehicular Cloud Computing
    Yan, Gongjun
    Wen, Ding
    Olariu, Stephan
    Weigle, Michele C.
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2013, 14 (01) : 284 - 294
  • [8] Recent security challenges in cloud computing
    Subramanian, Nalini
    Jeyaraj, Andrews
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 71 : 28 - 42
  • [9] Security challenges in the distributed cloud computing
    Nwobodo, Ikechukwu
    Jahankhani, Hossein
    Edoh, Aloysius
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (01) : 38 - 51
  • [10] Security and Privacy Challenges in Cloud Computing
    Abdullah, Salasiah
    Abu Bakar, Khairul Azmi
    [J]. PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC), 2018,