Ask a question from expert

Ask now

Security in Healthcare Cloud Computing Assignment

24 Pages5478 Words156 Views
   

Added on  2020-04-07

Security in Healthcare Cloud Computing Assignment

   Added on 2020-04-07

BookmarkShareRelated Documents
Running head: SECURITY IN HEALTHCARE CLOUD COMPUTINGSecurity in healthcare cloud computingName of the Student:Name of the University:Author note:
Security in Healthcare Cloud Computing Assignment_1
1SECURITY IN HEALTHCARE CLOUD COMPUTINGAbstractCloud computing becomes one of the most effective techniques followed by the organization inorder to improve entire process. However, security issues are involved with this. As healthcareorganizations look for securely integrate data as well as business structures in the cloud, it isimportant to continue driving hardware improved security technologies along with the data aswell as business structures in cloud. The innovations can further increase confidence in healthcare cloud through giving increasingly the robust methodology for better management. Thus, it isrequired to analyze the security issues and get effective methods to minimize the security issuesin the use of cloud computing in health care organizations that is achieved in the study. Keywords:Cloud computing, security issues
Security in Healthcare Cloud Computing Assignment_2
2SECURITY IN HEALTHCARE CLOUD COMPUTINGTable of ContentsIntroduction......................................................................................................................................41.1 Purpose of the study...................................................................................................................42.2 Scope of the study......................................................................................................................42.3 Background................................................................................................................................52.4 Definitions.................................................................................................................................62.5 Theories, Models and Hypothesis..............................................................................................6Methodology....................................................................................................................................72.1 Research Onion..........................................................................................................................72.2 Research approach.....................................................................................................................82.3 Research philosophy..................................................................................................................92.4 Research design.........................................................................................................................92.5 Research strategy.....................................................................................................................102.6 Data collection procedure........................................................................................................102.7 Accessibility issue...................................................................................................................102.8 Ethical consideration...............................................................................................................103. Results and discussion...............................................................................................................114. Conclusions................................................................................................................................175. Next Step and Recommendations..............................................................................................18References..........................................................................................................................19
Security in Healthcare Cloud Computing Assignment_3
3SECURITY IN HEALTHCARE CLOUD COMPUTING
Security in Healthcare Cloud Computing Assignment_4
4SECURITY IN HEALTHCARE CLOUD COMPUTINGIntroductionSeveral healthcare enterprises are implementing cloud computing in order to enhancedata analytics efficiencies as well as minimizing costs of the administration. Cloud providesaccess to health care professionals about patient information. On the other hand, patients canaccess of health care professionals as well as availed services for them. The study deals withpurpose, scope, background as well as theories, models and hypothesis related to the topic. Inaddition, methodology, findings and discussion are discussed in the paper.1.1 Purpose of the studyAs most of the health care organizations at present days are deploying cloud computingin their existing services, it becomes essential to have effective security methods in that. Cloudsecurity is considered as important for protecting privacy of the patients and comply with thelaws lied in health care (Rahimi et al., 2014). It ensures authorized access in the respectiveservices or information. However, some health care organizations have hesitation in adoptingcloud computing for complexity of the structuring cloud computing in order to comply withhealth insurance probability and Accountability Act (HIPPA). The law regulates the procedure ofprotecting private information in healthcare organizations. Along with these issues, there isresistance of adopting cloud computing for having concerns over unauthorized access to data.Moreover, patients or service holders cannot access medical records online for having networksecurity concerns. Thus, the study purposes to critically analyze the importance of security andprocess of implementation in health care cloud computing.
Security in Healthcare Cloud Computing Assignment_5
5SECURITY IN HEALTHCARE CLOUD COMPUTING2.2 Scope of the studyA successful cloud health network needs to utilize data security measures complying withthe Health Insurance Probability and Accountability Act and prevent unauthorized access. It isalso important to have authenticity of service holder’s data that can make difference in effectivehealth care. Thus, implementing cloud security would be helpful for the health care professionalsto bring trust in cloud computing and save personal data in cloud (Sultan, 2014). However,preventing unauthorized access in health care organizations is considered as critical. Thus,analyzing on the cloud security would give an opportunity to secure virtual environment so thatremote users can easily access data. In addition, multiple users can access data at a same time sothat time can be saved and service can be effective.2.3 BackgroundThe essentiality for high scale and modern security has become increasingly importantwith the emergence of cloud computing as well as moving sensitive health information outside ofthe organization. On contrary, cyber-security professionals face challenges in ensuring securityof patients’ information (Zhou et al., 2015). Additionally, making the information easilyaccessible for the clinicians is a challenge for health care professionals. In present years,healthcare enterprises have started moving storage as well as computing capabilities to cloud. Ithas been reported that cloud computing market in healthcare industry is expected to increase20.5% compound annual development rate to reach $9.48 billion by 2020. However, thepotential development does not come without security issues.As per a recent report from Skyhigh Networks, the average healthcare enterprises utilize928 cloud services. In addition, report notes that average health care staffs utilize 28 cloudservices at the time course of a day. On the other hand, the sheer number of cloud services in
Security in Healthcare Cloud Computing Assignment_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Research Methodology: A Case Study of Security Issues in Cloud Computing
|21
|4342
|218

Automatic Wireless Health Monitoring Report System
|15
|1935
|457

Healthcare Data Security and Data Masking
|22
|6117
|459

HI6008 - Business Research - Report
|13
|3053
|38

CIS5205 Information Security Management System
|15
|4840
|117

Security and GDPR issues and concerns in healthcare organizations: the case of health records databases
|65
|18570
|52