Security Models and Requirements for Healthcare Application Clouds
- 1 July 2010
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 21596182,p. 268-275
- https://doi.org/10.1109/cloud.2010.62
Abstract
With the widespread use of electronic health record (EHR), building a secure EHR sharing environment has attracted a lot of attention in both healthcare industry and academic community. Cloud computing paradigm is one of the popular healthIT infrastructure for facilitating EHR sharing and EHR integration. In this paper we discuss important concepts related to EHR sharing and integration in healthcare clouds and analyze the arising security and privacy issues in access and management of EHRs. We describe an EHR security reference model for managing security issues in healthcare clouds, which highlights three important core components in securing an EHR cloud. We illustrate the development of the EHR security reference model through a use-case scenario and describe the corresponding security countermeasures and state of art security techniques that can be applied as basic security guards.Keywords
This publication has 11 references indexed in Scilit:
- An attribute-based authorization policy framework with dynamic conflict resolutionPublished by Association for Computing Machinery (ACM) ,2010
- Patient-centric authorization framework for sharing electronic health recordsPublished by Association for Computing Machinery (ACM) ,2009
- Inter-organizational future proof EHR systemsInternational Journal of Medical Informatics, 2008
- Group signatures with verifier-local revocationPublished by Association for Computing Machinery (ACM) ,2004
- Cryptographic access control in a distributed file systemPublished by Association for Computing Machinery (ACM) ,2003
- A time-bound cryptographic key assignment scheme for access control in a hierarchyIEEE Transactions on Knowledge and Data Engineering, 2002
- Design and implementation of the idemix anonymous credential systemPublished by Association for Computing Machinery (ACM) ,2002
- Threshold cryptographyEuropean Transactions on Telecommunications, 1994
- Group SignaturesLecture Notes in Computer Science, 1991
- Cryptographic solution to a problem of access control in a hierarchyACM Transactions on Computer Systems, 1983