Security aspects of e-health systems migration to the cloud

Michalas, A., Paladi, N. and Gehrmann, C. 2014. Security aspects of e-health systems migration to the cloud. 16th IEEE International Conference on E-health Networking, Application & Services (Healthcom). Natal, Brazil 15 Oct 2014 IEEE . doi:10.1109/HealthCom.2014.7001843

TitleSecurity aspects of e-health systems migration to the cloud
AuthorsMichalas, A., Paladi, N. and Gehrmann, C.
TypeConference paper
Abstract

As adoption of e-health solutions advances, new computing paradigms - such as cloud computing - bring the potential to improve efficiency in managing medical health records and help reduce costs. However, these opportunities introduce new security risks which can not be ignored. Based on our experience with deploying part of the Swedish electronic health records management system in an infrastructure cloud, we make an overview of major requirements that must be considered when migrating e-health systems to the cloud. Furthermore, we describe in-depth a new attack vector inherent to cloud deployments and present a novel data confidentiality and integrity protection mechanism for infrastructure clouds. This contribution aims to encourage exchange of best practices and lessons learned in migrating public e-health systems to the cloud.

Keywordse-Health
Security
Cloud Computing
EHR Protection
Storage Protection
Year2014
Conference16th IEEE International Conference on E-health Networking, Application & Services (Healthcom)
PublisherIEEE
Publisher's versionMichalas_etal_Healthcom_2014.pdf
Publication dates
PublishedJan 2015
Book title2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom)
ISBN9781479966448
Digital Object Identifier (DOI)doi:10.1109/HealthCom.2014.7001843
Web address (URL) of conference proceedingshttp://ieeexplore.ieee.org/xpl/http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6992842

Related outputs

Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
Bakas, A. and Michalas, A. 2019. Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX. 15th EAI International Conference on Security and Privacy in Communication Networks (SecureComm’19). Orlando, United States 25 Jul - 23 Oct 2019 Springer.

The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing
Michalas, A. 2019. The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing. 34th ACM/SIGAPP Symposium on Applied Computing (SAC'19). Limassol, Cyprus 08 - 12 Apr 2019 ACM. doi:10.1145/3297280.3297297

Towards Secure Cloud Orchestration for Multi-Cloud Deployments
Paladi, N., Michalas, A. and Dang, H. 2018. Towards Secure Cloud Orchestration for Multi-Cloud Deployments. The 5th Workshop on CrossCloud Infrastructures & Platforms. Porto, Portugal 23 - 26 Apr 2018 ACM.

MemTri: A Memory Forensics Triage Tool using Bayesian Network and Volatility
Michalas, A. and Murray, R. 2017. MemTri: A Memory Forensics Triage Tool using Bayesian Network and Volatility. The 9th ACM CCS International Workshop on Managing Insider Security Threats (MIST’17) in Conjunction with ACM CCS 2017. Dallas, TX, USA 30 Oct - 03 Nov 2017 ACM. doi:10.1145/3139923.3139926

A Survey on Design and Implementation of Protected Searchable Data in the Cloud
Dowsley, R., Michalas, A., Nagel, M. and Paladi, N. 2017. A Survey on Design and Implementation of Protected Searchable Data in the Cloud. Computer Science Review. 26, pp. 17-30. doi:10.1016/j.cosrev.2017.08.001

Middle Man: An Efficient Two-Factor Authentication Framework
Costa, J. and Michalas, A. 2017. Middle Man: An Efficient Two-Factor Authentication Framework. 3rd IEEE International Conference On Computing, Communication, Control And Automation. Pune, India 17 - 18 Aug 2017 IEEE . doi:10.1109/ICCUBEA.2017.8463686

HealthShare: Using Attribute-Based Encryption for Secure Data Sharing Between Multiple Clouds
Michalas, A. and Weingarten, N. 2017. HealthShare: Using Attribute-Based Encryption for Secure Data Sharing Between Multiple Clouds. Proceedings of the 30th IEEE International Symposium on Computer-Based Medical Systems (CBMS’17). Thessaloniki, Greece 22 - 24 Jun 2017 IEEE . doi:10.1109/CBMS.017.30

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services
Verginadis, Y., Michalas, A., Gouvas, P., Schiefer, G., Hübsch, G. and Paraskakis, I. 2017. PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services. Journal of Grid Computing. 15 (2), pp. 219-234. doi:10.1007/s10723-017-9394-2

Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation
Yigzaw, KY., Michalas, A. and Bellika, J.G. 2017. Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation. BMC Medical Informatics and Decision Making. doi:10.1186/s12911-016-0389-x

Providing User Security Guarantees in Public Infrastructure Clouds
Paladi, N., Gehrmann, C. and Michalas, A. 2017. Providing User Security Guarantees in Public Infrastructure Clouds. IEEE Transactions on Cloud Computing. 5 (3), pp. 405-419. doi:10.1109/TCC.2016.2525991

Mem Tri: Memory Forensics Triage Tool
Michalas, A. and Murray, R 2016. Mem Tri: Memory Forensics Triage Tool. Cyber Security Group, University of Westminster.

LocLess: Do You Really Care Where Your Cloud Files Are?
Michalas, A. and Yigzaw, K.Y. 2016. LocLess: Do You Really Care Where Your Cloud Files Are? Cloud Security and Data Privacy by Design (CloudSPD’16), Workshop co-located with the 9th IEEE/ACM International Conference on Utility and Cloud Computing. Luxembourg 12 - 15 Dec 2016 IEEE . doi:10.1109/CloudCom.2016.0090

Sharing in the Rain: Secure and Efficient Data Sharing for the Cloud
Michalas, A. 2016. Sharing in the Rain: Secure and Efficient Data Sharing for the Cloud. 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016). Barcelona 05 - 07 Dec 2016 IEEE . doi:10.1109/ICITST.2016.7856693

Secure and Scalable Statistical Computation of Questionnaire Data in R
Yigzaw, K.Y., Michalas, A. and Bellika, J. 2016. Secure and Scalable Statistical Computation of Questionnaire Data in R. IEEE Access. 4, pp. 4635-4645. doi:10.1109/ACCESS.2016.2599851

The Data of Things: Strategies, Patterns and Practice of Cloud-based Participatory Sensing
Michalas, A. and Giannetsos, T. 2016. The Data of Things: Strategies, Patterns and Practice of Cloud-based Participatory Sensing. International Conference on Innovations in InfoBusiness and Technology (ICIIT). Colombo, Sri Lanka 04 Mar 2016

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services
Verginadis, Y., Michalas, A., Gouvas, P., Schiefer, G., Hübsch, G. and Paraskakis, I. 2015. PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services. 5th International Conference on Cloud Computing and Services Science (CLOSER'15). Lisbon, Portugal 20 May 2015 SCITEPRESS. doi:10.5220/0005489302060213

"One of our hosts in another country": Challenges of data geolocation in cloud storage
Paladi, N. and Michalas, A. 2014. "One of our hosts in another country": Challenges of data geolocation in cloud storage. The 6th IEEE Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE). Aalborg, Denmark 11 May 2014 IEEE . doi:10.1109/VITAE.2014.6934507

The lord of the sense: A privacy preserving reputation system for participatory sensing applications
Michalas, A. and Komninos, N. 2014. The lord of the sense: A privacy preserving reputation system for participatory sensing applications. The 19th IEEE International Conference on Communications (ISCC'2014). Madeira, Portugal 23 Jun 2014 IEEE . doi:10.1109/ISCC.2014.6912480

Domain Based Storage Protection with Secure Access Control for the Cloud
Paladi, N., Michalas, A. and Gehrmann, C. 2014. Domain Based Storage Protection with Secure Access Control for the Cloud. The 2014 International Workshop on Security in Cloud Computing, held in conjunction with the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS). Kyoto, Japan 04 Jun 2014 ACM. doi:10.1145/2600075.2600082

Multi-party trust computation in decentralized environments in the presence of malicious adversaries
Dimitriou, T. and Michalas, A. 2013. Multi-party trust computation in decentralized environments in the presence of malicious adversaries. Ad Hoc Networks . 15 (2014), pp. 53-66. doi:10.1016/j.adhoc.2013.04.013

Multi-Party Trust Computation in Decentralized Environments
Dimitriou, T. and Michalas, A. 2012. Multi-Party Trust Computation in Decentralized Environments. International Conference on New Technologies, Mobility and Security (NTMS). Istanbul 07 - 10 May 2012 IEEE . doi:10.1109/NTMS.2012.6208686

Secure & Trusted Communication in Emergency Situations
Michalas, A., Bakopoulos, M., Komninos, N. and Prasad Neeli, R. 2012. Secure & Trusted Communication in Emergency Situations. Sarnoff Symposium (SARNOFF). Newark, NJ 21 - 22 May 2012 IEEE . doi:10.1109/SARNOF.2012.6222751

SecGOD - Google Docs: Now I Feel Safer!
Michalas, A. and Bakopoulos, M. 2012. SecGOD - Google Docs: Now I Feel Safer! The 7th IEEE International Conference for Internet Technology and Secured Transactions (ICITST-2012). London, UK 10 Dec 2012 IEEE .

Vulnerabilities of decentralized additive reputation systems regarding the privacy of individual votes
Michalas, A., Dimitriou, T., Giannetsos, T., Komninos, N. and Prasad Neeli, R. 2012. Vulnerabilities of decentralized additive reputation systems regarding the privacy of individual votes. Wireless Personal Communications. 66 (3), pp. 559-575. doi:10.1007/s11277-012-0734-z

Mitigate DoS and DDoS Attack in Ad Hoc Networks
Michalas, A., Komninos, N. and Prasad Neeli, R. 2011. Mitigate DoS and DDoS Attack in Ad Hoc Networks. International Journal of Digital Crime and Forensics (IJDCF). 3 (1), pp. 14-36. doi:10.4018/jdcf.2011010102

Permalink - https://westminsterresearch.westminster.ac.uk/item/98zxq/security-aspects-of-e-health-systems-migration-to-the-cloud


Share this
Tweet
Email