Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Cloud Architecture for Hospital Information System

C. Menaka, R.S. Ponmagal

Abstract


Presently the users can store their information in a remote server and utilize the required services from collective computing resources dynamically without maintaining large amount of information in their local servers. This leads to the concept of cloud computing. Hospital Information system such as Telemedicine is an important application which is recently gaining momentum on cloud. As telemedicine not only promises to dramatically reduce the costs, but at the same time it makes access to care easier for patients and makes more revenue attainable for practices. Despite cloud's attractiveness, it has got tremendous security concerns including accessibility issues, user authentication, confidentiality concerns, and verification of data integrity, risk identification and mitigation, as well as insider threats from cloud provider staff. Precise identification of the patient/clinician during authentication process is a vital requirement for telemedicine cloud services as it involves sensitive physiological data. This paper proposes a secure cloud architecture which includes an authentication system for telemedicine cloud using a set of different unobtrusive physiological sensors (ECG) and web camera that continuously authenticate the identity of the user. This new type of authentication is called dynamic authentication. In the proposed Architecture auditing of the data providers are also included using third Party Auditing (TPA). 


Keywords


Authentication, Cloud, TPA, Telemedicine.

Full Text:

PDF

References


P. Mell and T. Grance,“Draft NIST working definition of cloud computing,” http://csrc.nist.gov/groups/SNS/cloud-computing/index. html, 2009.

C. Wang, S.S.M. Chow, Q. Wang, K. Ren, and W. Lou, “Toward Secure and Dependable Storage Services in Cloud Computing” , IEEE Trans. Services computing, pp 220-232.2012.

C. Wang, S.S.M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage," IEEE Trans. Computers,preprint, 2012, doi:10.1109/TC.2011.245.

M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable Secure File Sharing on Untrusted Storage,” Proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.

www.consultadr.com/technology_practice_free.php.

M. Guennoun, N. Abbad, J. Talom, Sk. Md. M. Rahman, and K. El-Khatib, “Continuous Authentication by Electrocardiogram Data”, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH 2009), ISBN: 978-1-4244-3877-8, 26-27 September, Toronto, ON, Canada, pp. 40 – 42, 2009.

M. A. Shah, R. Swaminathan, and M. Baker, “Privacy- preserving audit and extraction of digital contents,” Cryptology ePrint Archive, Report 2008/186, 2008.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at un- trusted stores,” in Proc. of CCS’07, Alexandria, VA, October 2007, pp. 598–609.

Xuefeng Liu, Yuqing Zhang, Boyang Wang, and Jingbo Yan, “Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud”, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 6, 2013.

Issa Traoré and Ahmed Awad E. Ahmed, “ Continuous Authentication Using Biometrics: Data, Models, and Metrics “ , IGI Global 2012.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.