NETWORK AND CLOUD SECURITY ASSIGNMENT

Verified

Added on  2022/09/18

|16
|4469
|35
Assignment
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: NETWORK AND CLOUD SECURITY
NETWORK AND CLOUD SECURITY
Enter the name of the Student:
Enter the name of the University:
Author note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1NETWORK AND CLOUD SECURITY
Table of Contents
1. Introduction............................................................................................................................2
2. Research Methodology...........................................................................................................2
3. Current Status of Cloud Computing.......................................................................................2
4. Potential benefits of Cloud Computing..................................................................................2
5. Potential security issues associated with Cloud Computing..................................................2
6. Proposals for the secure implementation of Cloud Computing (Discussion of Findings).....2
7. Critical Reflection, Project Management and Professional Issues.........................................2
7.1. Project Evaluation...........................................................................................................2
7.2. Project Management........................................................................................................2
7.3. Ethical Issues...................................................................................................................2
8. References..............................................................................................................................2
Document Page
2NETWORK AND CLOUD SECURITY
1. Introduction
The Ashford and St Peter's Hospitals NHS Foundation Trust is the greatest provider of the
critical hospital services in Surry also serves the population of around 410000 no of people
over the North West Surrey and some parts of the Hounslow. In this organization, the data of
the patient and the details of the medicine and the equipment that are used in the medical help
is need to be stored by the use of cloud computing. So the literature review is done for
implementation of the successful cloud computing system in this healthcare organization.
2. Research Methodology
The research methodology which is chosen for this is the Systematic Literature Review. The
Systematic Literature Review (SLR) recognizes, selects also critically appraises the research
to the answer a properly formulated question. This should monitor the appropriate described
protocol or the plan in which first all the criteria is appropriately and clearly explained after
that the review is accompanied (Rittinghouse and Ransome 2016). This is the complete,
transparent search that is directed over numerous databases also the grey literature which can
replicate and regenerated by some other researchers. This includes planning a search strategy
of the good thought out the search that has a definite concentration or the answers a definite
question. This review can recognize the type of information searched, evaluated also reported
within recognized timeframes. The terms of search, the strategies of search that are
containing the names of the database, platforms also the search dates and bounds all the need
to be involved in this review. So this Systematic Literature Reviews aim to address the
problems by recognizing, critically evaluating also integrating all the findings of all the high
quality and relevant individual studies that can address on or more than one questions of
r5easearch.
Document Page
3NETWORK AND CLOUD SECURITY
There are seven main principles present behind this Systematic Literature Reviews
which are Transparency, Clarity, Integration, Focus, Equality, Accessibility and Coverage.
The Systematic Literature Review may accomplish some things which are as follows:
i) It can establish to in which range the current research has advanced in the direction of
clarifying a specific problem.
ii) It can identify, contradictions, relations, inconsistencies and gaps in this systematic
literature also discover the reasons for these for instance by suggesting a new theory or
conceptualisation that accounts for this discrepancy.
iii) It can formulate the common statements or the primary theory such as decide a valid point
instead of summarizing all these points that everyone else has completed.
iv) It can comment on, estimate, outspread or develop a theory.
v) In doing all these things, it can deliver the implications for the practice and the policy.
vi) Also, it can describe the directions for future research.
Though the systematic review is the piece of research in right of its own and by the nature is
capable to address greatly wider questions than the single experimental studies ever can for
instances uncovering the connections amongst several practical findings. The main stages of
to conduct the systematic research review are Scoping, Planning, Searching or Identification,
Screening and Eligibility.
3. Current Status of Cloud Computing
The introduction of cloud computing also the business models of this have been
specific of major changes that can impact not only the industry of computer but also some
others and the healthcare sector is the major one. This cloud has the infrastructure built so
that the customers can organize and run the applications created by them. Also, they have

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4NETWORK AND CLOUD SECURITY
dissimilar platforms with numerous operating systems so that the customers can build, then
test, and finally deploy all their applications in the virtual servers. Additionally, this cloud
delivers extremely scalable environment for effectively handling the entire load. In the
meantime the infrastructure also the platforms are built already and they are available. The
customers and the organizations can save a lot meanwhile they do not have to maintain them
or devote to them.
The Healthcare industry is one of those businesses which usually prevented
outsourcing mostly because of the concerns of security and privacy. The privacy and also the
medical records of the member are extremely sensitive also the businesses that spend the
millions to protect them when following the guidelines that are central regulated. Though, the
costs of rising medical may change the process this business is implemented.
The cloud computing can play a vital role in comprising the costs of healthcare
integration, improving the resources and escorting in the new period of innovations (Ali,
Khan and Vasilakos 2015). The current movement goal in the direction of accessing the
information anytime and anywhere that can achieve whenever moving all the information of
healthcare to the cloud. This new model of delivery can create healthcare more proficient and
effective also at the lower cost to the budgets of technology. There are also present some
privacy and the security risks in this cloud computing, but even though the organization of
healthcare can positively take the advantage of this solution of cloud computing and carry
incredible benefits for instances the help to recover the quality of service for the patient and
decrease complete costs of the healthcare.
4. Potential benefits of Cloud Computing
The cloud computing gets the new model of business that allows numerous
advantages which would advantage the common community of the healthcare (Almorsy,
Document Page
5NETWORK AND CLOUD SECURITY
Grundy and Müller 2016). By assuming this cloud in the medical services both the patients
and the organizations of healthcare would attain a vast benefit in the quality of service of
patient, association between the healthcare organizations in addition to the decreases in the
cost of IT in the companies of healthcare.
This proposed collaborative approach allows the services of healthcare to interoperate
amongst them to offer the rapid also effectual response serving to advance the patient quality
of the service over the distribution of the information through this organization of healthcare.
As a result, the Ashford and St Peter’s Hospitals NHS Foundation Trust, imaging centres,
clinics, pharmacies also the insurance companies can proficiently share the medical records
of the patient, the information of the prescription, test results, X rays, the references of the
physician, availability of the physicians and many more which can access anywhere also
everywhere by the authorized individuals (Marinescu 2017). All of this information would
use to the decisions, gaining improved diagnosis and the treatments to create the better
results, scheduling the appointments of the physicians, fast-moving the approval of the
insurance and many more that extremely recovers quality of service for the patient.
Whenever moving to this cloud, there is also the most significant helpful factor for the
organizations of healthcare that is the costs of IT. By implementing this cloud model, all of
the organization's processes of organizations will migrate to the remote infrastructure of
cloud computing wherever all the procedures will perform and also store. The new model of
“pay-as-you-go” permits the organizations to pay simply for what they are used, so, there is
no motive to acquire the luxurious infrastructure of hardware, the licenses of software or to
keep in site staff for security, replications and maintenance for the reason that the providers
of cloud computing take care of this.
Document Page
6NETWORK AND CLOUD SECURITY
Human life is priceless and the resources of medical are limited, as a result, the
services of healthcare accepted in the cloud providers who equal the concept of cost-effective
wherever the patients also the organizations of health take the benefits of this innovative
technology by enlightening the quality of service for the patients over the distributed platform
of highly integrated, organizing of the procedures of medical in addition to decreasing the
investment of IT infrastructure or the maintenance costs that points to the better environment
of healthcare.
5. Potential security issues associated with Cloud Computing
While this cloud performs for presenting numerous benefits then this also performs
for presenting the distinct risks to the organizations of healthcare concerning the privacy also
the security. This is most significant which these providers of cloud service completely
comprehend these concerns of security in the public clouds and also report them, for instance,
the healthcare organization fulfil with privacy rules named HIPAA that is set by the
centralized regulations. Ensuring the security on keeping the records of medical health and
protecting them will be the greatest essential jobs for them meanwhile the cloud computing
appears to be future for this determination. This information of health records also requires to
make centrally available while it is still supporting tall these guidelines of privacy (Sultan
2014). The Cloud Security Alliance that is published a list of all the best practices which
should implement in this cloud to accomplish extreme security in this models of Service as a
Platform that is SaaP also Platform as a Service that is PaaS (Griebel et al. 2015). This
alliance recommends that by following these processes of security will deliver robust security
in contradiction of the potential threats in both the clouds of private and public. This is
suggested to execute many layers of verification to sufficiently secure the data records of
health for instances the validating user login, the capabilities of administration to assign the

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7NETWORK AND CLOUD SECURITY
proper freedoms to users also the groups, applying the creation also encryption of strong
passwords, encoded the data exchange.
Additionally, think through the associated authentication that gives the authentication
to all the organizations that are used the SaaS. As the user, the organizations of healthcare
must confirm that the cloud provider of them applies all these measures of security
(Calabrese and Cannataro 2015). As of the amount of all the personal information accessible
in these records of health, this could be the objective for all the hackers also the malicious
users and use all these for their benefits. Insecure APIs also the free interface can be very
easy aims for all these users. Another security practice is the enforcement of breach
notification that is the law in some of the states.
All the backup services and policies of disaster recovery positively perform to be
additional robust also the providers of the cloud are prepared than centres of the local data
centres which the organizations can maintain (Kumari et al. 2018). The bigger cloud
providers like Amazon EC2 and Google App Engines make manage many copies of all the
data at several locations also procedures of data retrieval. So in this event of any type of data
loss, this can restore without severe damage. The data can more effortlessly and extensively
available also more reliable than that of the confidentially maintained the data centres. In this
view, all the storages of cloud data can consider for determined the data storages by this
health organization that is Ashford and St Peter’s Hospitals NHS Foundation Trust.
Designing also executing the model of community cloud can be an additional methodology to
make an additional interrelated network of these providers of healthcare also the
organizations for mitigating several concerns regarding security. The infrastructure of cloud
can share through the payers and additional entities of healthcare and request definite needs
and policies of security (Ali et al. 2018). This situation may develop the applications on
substructure which will assist in the distribution of the information in a protected
Document Page
8NETWORK AND CLOUD SECURITY
environment and rapidly. This model is a little bit dissimilar from the model of public cloud
then again this will permit all the organizations to address the changes of security definite to
their requirements (Haufe, Dzombeta and Brandis 2014). Meanwhile, the images, data and
additional records that will be available inside the community pharmacies, payers and
physicians can implement the tasks for example counselling, diagnose earlier there
decreasing the costs for everybody involved.
6. Proposals for the secure implementation of Cloud Computing
(Discussion of Findings)
This organization is required to recognize and manage numerous activities with the
intention of the function effectually also efficiently. Any activity that is used the resources
needs to manage to permit the alteration of the inputs into the outputs by using the set of
interconnected or interrelating actions which is similarly recognized as the process (Mohit et
al. 2017). It can also be said that the procedure is the set of interconnected or intermingling
actions that can convert the inputs into the outputs (Darwish et al. 2019). This segment
defines the planned process framework that is designed to monitor the efforts of the
information security in common in addition to the identification of the core processes of
ISMS for cloud computing in healthcare.
Whenever managing the information security of this health care organization named
Ashford and St Peter's Hospitals NHS Foundation that is used the cloud computing required
to think through additional alongside these essential procedures, the risk assessment also the
risk treatment (Jula, Sundararajan and Othman 2014). This organization that following the
ISMS processes, it appeared to be predominantly significant.
i) Requirements Management Process:
Document Page
9NETWORK AND CLOUD SECURITY
Mainly for the healthcare, the proper security of the personal data is required to
confirm in view of the distinct legal also compliance necessities such as the laws of data
protection and the specific requirements of health care (Hu and Bai 2014). Also the questions
such as “who keeps the data?” should answer in this framework.
ii) The process of Control Outsourced Processes:
It is assumed that the cloud computing in the several models is the method of
outsourcing of the services of information computing which is the procedure for controlling
these outsourced procedures is important to the information security (Iyawa, Herselman and
Botha 2016). As recognized from the classic outsourcing, the compliance of this service
provider with distinct necessities should be reviewed regularly while using the cloud services.
The improved practice of different also altering providers of subservice is frequently used to
upsurge the elasticity of this service facility for keeping this constantly in line with demand.
Therefore, the altering subservice providers also the services in addition to the location of
computing are typically non-apparent for all the consumer (Ali et al. 2018). The complicated
subservice providers, countries and locations in which all the information computing is
completed in addition to definite requirements of security and procedures should define in the
agreement between the selected healthcare organization and service provider of cloud.
iii) Information Security Incident Management Process:
Aimed at all the important or instructive events, the elementary data which are what,
when, where, who, risk, also the consequences should log with the intention of that this can
pass on to applicable people or inform, so that they can mention also take all the essential
local action (Roehrs et al. 2017). Because of various involved parties who are using cloud
computing incident management procedures for totally involved parties also the interfaces

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10NETWORK AND CLOUD SECURITY
should define for confirming proper information of this healthcare organization by means of
cloud computing of applicable events.
7. Critical Reflection, Project Management and Professional Issues
7.1. Project Evaluation
The project has been effective as it has been completed following all the requirements
of the selected healthcare organization. The objectives of the proposed project have been met
that analyses the literature about cloud computing in this healthcare sector with the
challenges, issues also the benefits. The proposal of the conceptual framework by which the
secure execution of cloud computing is done in this organization is discussed in this project
(Benslimane et al. 2014). For this project, the selected healthcare organization is Ashford and
St Peter’s Hospitals NHS Foundation Trust. Also, all this strategies of the security are
discussed in this project that can be helpful for this organization to the successful
implementation of the cloud computing
7.2. Project Management
Each project is required for some processes to complete it. The PMBOK guide has divided
these processes into five steps which are Initiating, Planning, Executing, Monitoring and
Closing (Kerzner 2017). From these above steps, in this project, the first three that is the
Initiating, Planning and Executing are followed.
In the Initiating steps, this project is conceptualized also the feasibility of this is
determined. In this step, the goal of the project is decided also the project scope is defined.
After that, all the stakeholders and the potential risks are identified and the calculated budget
and the timeline are produced.
The next step is planning. In this step, the manager of this project is created the
blueprint for guiding the whole project from the ideation via completion (Meredith, Mantel Jr
Document Page
11NETWORK AND CLOUD SECURITY
and Shafer 2017). The blueprint is mapped out the scope, required resources for making
deliverables, projected time and the financial commitments, the strategy of communication
for confirming the stakeholders are preserved advanced also involved, execution the plan and
finally the proposal for continuing maintenance of this proposed project of the selected
healthcare organization.
The next and final step for this above project is Executing. In this phase, the manager
of the project is executed the proposed planning which he is planned in the previous step in
the blueprint of this project (Wager, Lee and Glaser 2017). Also, manager can finalise the
team members on the ground.
7.3. Ethical Issues
The cloud computing is permitted the users to access the services of on-demand in
pay-as-you-go style from any angle of the world. In contrast, this cloud computing indicates
to revealing numerous ethical issues essential in aggressive both the services also the data
from local servers into the data centres that be appropriate to the outward party.
According to the BCS code of conduct, it is the accountability of professionals to
confirm Public Interest And work in that direction (Dove et al. 2015). It includes protecting
the security and privacy of people by ensuring that public data is collected according to
security guidelines and ensure that there is no illegal access to this data. Violation of security
and privacy is also considered as a serious issue in the context of the BCS code of conduct.
The product that is been offered in this project is a security framework for implementing
Cloud Computing in Healthcare sector. Therefore it needs for ensuring that data that is
collected about a patient for providing them quality Medical Services Are properly secured.
However, sometimes organisations share their medical data with third parties without the
Document Page
12NETWORK AND CLOUD SECURITY
permission of data owner. Therefore it is a breach of honesty and this is a significant ethical
issue for this project.
Along with that, some organisations store there medical data in the public cloud rather
than opting for a secured private cloud model. In this public cloud as cloud storage is shared
between different organisations (Sen 2015). It is not easy to ensure that illegal access to data
is always restricted and in that context even effective Cloud Security framework is not
capable of ensuring data security and privacy as well (de Bruin and Floridi 2017). Therefore
Even if the proposed security Framework that is provided in this project Is designed properly
but if organisations Are not capable of implementing the framework according to proper
security guidelines then it might lead to a data breach which will affect public security and
privacy, therefore, It is a significant ethical issue according to BCS code of conduct as well.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13NETWORK AND CLOUD SECURITY
8. References
Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities
and challenges. Information sciences, 305, pp.357-383.
Ali, O., Shrestha, A., Soar, J. and Wamba, S.F., 2018. Cloud computing-enabled healthcare
opportunities, issues, and applications: A systematic review. International Journal of
Information Management, 43, pp.146-158.
Ali, O., Shrestha, A., Soar, J. and Wamba, S.F., 2018. Cloud computing-enabled healthcare
opportunities, issues, and applications: A systematic review. International Journal of
Information Management, 43, pp.146-158.
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Benslimane, Y., Plaisent, M., Bernard, P. and Bahli, B., 2014, December. Key challenges and
opportunities in cloud computing and implications on service requirements: Evidence from a
systematic literature review. In 2014 IEEE 6th International Conference on Cloud
Computing Technology and Science (pp. 114-121). IEEE.
Calabrese, B. and Cannataro, M., 2015. Cloud computing in healthcare and biomedicine.
Scalable Computing: Practice and Experience, 16(1), pp.1-18.
Darwish, A., Hassanien, A.E., Elhoseny, M., Sangaiah, A.K. and Muhammad, K., 2019. The
impact of the hybrid platform of internet of things and cloud computing on healthcare
systems: opportunities, challenges, and open problems. Journal of Ambient Intelligence and
Humanized Computing, 10(10), pp.4151-4166.
de Bruin, B. and Floridi, L., 2017. The ethics of cloud computing. Science and engineering
ethics, 23(1), pp.21-39.
Document Page
14NETWORK AND CLOUD SECURITY
Dove, E.S., Joly, Y., Tassé, A.M. and Knoppers, B.M., 2015. Genomic cloud computing:
legal and ethical points to consider. European Journal of Human Genetics, 23(10), pp.1271-
1278.
Griebel, L., Prokosch, H.U., Köpcke, F., Toddenroth, D., Christoph, J., Leb, I., Engel, I. and
Sedlmayr, M., 2015. A scoping review of cloud computing in healthcare. BMC medical
informatics and decision making, 15(1), p.17.
Haufe, K., Dzombeta, S. and Brandis, K., 2014. Proposal for a security management in cloud
computing for health care. The Scientific World Journal, 2014.
Hu, Y. and Bai, G., 2014. A systematic literature review of cloud computing in eHealth.
arXiv preprint arXiv:1412.2494.
Iyawa, G.E., Herselman, M. and Botha, A., 2016. Digital health innovation ecosystems: From
systematic literature review to conceptual framework.
Jula, A., Sundararajan, E. and Othman, Z., 2014. Cloud computing service composition: A
systematic literature review. Expert systems with applications, 41(8), pp.3809-3824.
Kerzner, H., 2017. Project management: a systems approach to planning, scheduling, and
controlling. John Wiley & Sons.
Kumari, A., Tanwar, S., Tyagi, S. and Kumar, N., 2018. Fog computing for Healthcare 4.0
environment: Opportunities and challenges. Computers & Electrical Engineering, 72, pp.1-
13.
Marinescu, D.C., 2017. Cloud computing: theory and practice. Morgan Kaufmann.
Meredith, J.R., Mantel Jr, S.J. and Shafer, S.M., 2017. Project management: a managerial
approach. John Wiley & Sons.
Document Page
15NETWORK AND CLOUD SECURITY
Mohit, P., Amin, R., Karati, A., Biswas, G.P. and Khan, M.K., 2017. A standard mutual
authentication protocol for cloud computing based health care system. Journal of medical
systems, 41(4), p.50.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation,
management, and security. CRC press.
Roehrs, A., Da Costa, C.A., da Rosa Righi, R. and De Oliveira, K.S.F., 2017. Personal health
records: a systematic literature review. Journal of medical Internet research, 19(1), p.e13.
Sen, J., 2015. Security and privacy issues in cloud computing. In Cloud Technology:
Concepts, Methodologies, Tools, and Applications (pp. 1585-1630). IGI Global.
Sultan, N., 2014. Making use of cloud computing for healthcare provision: Opportunities and
challenges. International Journal of Information Management, 34(2), pp.177-184.
Wager, K.A., Lee, F.W. and Glaser, J.P., 2017. Health care information systems: a practical
approach for health care management. John Wiley & Sons.
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]