Proposal for a Security Management in Cloud Computing for Health Care

被引:11
|
作者
Haufe, Knut [1 ]
Dzombeta, Srdan [1 ]
Brandis, Knud [1 ]
机构
[1] Persicon Corp, D-10117 Berlin, Germany
来源
关键词
INFORMATION;
D O I
10.1155/2014/146970
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector. Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Cloud Computing: Implementation, Management and Security
    Fitz-Gerald, Stuart J.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2010, 30 (05) : 472 - 472
  • [2] Security Risks and their Management in Cloud Computing
    Khan, Afnan Ullah
    Oriol, Manuel
    Kiran, Mariam
    Jiang, Ming
    Djemame, Karim
    [J]. 2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
  • [3] Dissection and Proposal of Multitudinal Security Threats and Menace in Cloud Computing
    Rawat, Seema
    Dhruv, Bhawna
    Kumar, Praveen
    Mittal, Payal
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 123 - 128
  • [4] Intelligent Data Management and Security in Cloud Computing
    Ogiela, Lidia
    Ogiela, Marek R.
    Ko, Hoon
    [J]. SENSORS, 2020, 20 (12) : 1 - 11
  • [5] Policy Based Management for Security in Cloud Computing
    Waller, Adrian
    Sandy, Ian
    Power, Eamonn
    Aivaloglou, Efthimia
    Skianis, Charalampos
    Munoz, Antonio
    Mana, Antonio
    [J]. SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 : 130 - +
  • [6] The Ten Commandments of Cloud Computing Security Management
    Kouatli, Issam
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 73 - 81
  • [7] Cloud computing approaches in health care
    Faridi, Farhan
    Sarwar, Huzefa
    Ahtisham, Md
    Kumar, Sarvesh
    Jamal, Khalid
    [J]. MATERIALS TODAY-PROCEEDINGS, 2022, 51 : 1217 - 1223
  • [8] Supporting Security Requirements for Resource Management in Cloud Computing
    Jhawar, Ravi
    Piuri, Vincenzo
    Samarati, Pierangela
    [J]. 15TH IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2012) / 10TH IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2012), 2012, : 170 - 177
  • [9] Analysis of security issues and management standards in Cloud Computing
    Kaur, Jagpreet
    Singh, Sunny
    Karn, Amit
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1474 - 1478
  • [10] A Method of the Cloud Computing Security Management Risk Assessment
    Wang, Hongbing
    Liu, Feng
    Liu, Heng
    [J]. ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2012, 141 : 609 - +