{"title":"Towards healthcare data security in cloud computing","authors":"H. Elmogazy, Omaima Bamasak","doi":"10.1109/ICITST.2013.6750223","DOIUrl":null,"url":null,"abstract":"Healthcare data has stringent security requirements for confidentiality, availability to authorized users, and traceability of access. The focus of this study is to investigate on these requirements and propose a solution for healthcare cloud providers that will help in protecting patient' data they host, which is of high importance. The focus will be on specific cloud computing healthcare security concerns and how cloud homomorphic encryption with splitting key and key delegation can help in meeting healthcare regulatory requirements. The suggested technique is based on FHE algorithm with key delegation to ensure data confidentiality, authentication, integrity, and availability in a multi-level hierarchical order. This will enable the healthcare provider to apply/omit any access rule in any order, especially in medical research environment.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2013.6750223","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16
Abstract
Healthcare data has stringent security requirements for confidentiality, availability to authorized users, and traceability of access. The focus of this study is to investigate on these requirements and propose a solution for healthcare cloud providers that will help in protecting patient' data they host, which is of high importance. The focus will be on specific cloud computing healthcare security concerns and how cloud homomorphic encryption with splitting key and key delegation can help in meeting healthcare regulatory requirements. The suggested technique is based on FHE algorithm with key delegation to ensure data confidentiality, authentication, integrity, and availability in a multi-level hierarchical order. This will enable the healthcare provider to apply/omit any access rule in any order, especially in medical research environment.