Comprehensive Analysis: Security in Healthcare Cloud Computing (2024)

Verified

Added on  2020/04/07

|24
|5478
|156
Report
AI Summary
This report investigates the crucial role of cloud computing in healthcare, focusing on the associated security challenges and potential solutions. It begins with an abstract summarizing the core issues of cloud computing adoption in healthcare, emphasizing the need for robust security measures to protect sensitive patient data. The introduction highlights the purpose of the study, which is to analyze and address security concerns, and outlines the scope, background, and relevant theories and models. The methodology section details the research approach, philosophy, design, and strategy, including the use of the research onion and a deductive approach. The report then presents the results and discussion, analyzing the importance of cloud security in the healthcare sector, and concludes with recommendations for enhancing cloud security measures. The study underscores the importance of compliance with regulations such as HIPAA and the need for proactive strategies to mitigate risks and ensure the privacy and security of patient information in cloud environments.
Document Page
Running head: SECURITY IN HEALTHCARE CLOUD COMPUTING
Security in healthcare cloud computing
Name of the Student:
Name of the University:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1SECURITY IN HEALTHCARE CLOUD COMPUTING
Abstract
Cloud computing becomes one of the most effective techniques followed by the organization in
order to improve entire process. However, security issues are involved with this. As healthcare
organizations look for securely integrate data as well as business structures in the cloud, it is
important to continue driving hardware improved security technologies along with the data as
well as business structures in cloud. The innovations can further increase confidence in health
care cloud through giving increasingly the robust methodology for better management. Thus, it is
required to analyze the security issues and get effective methods to minimize the security issues
in the use of cloud computing in health care organizations that is achieved in the study.
Keywords:
Cloud computing, security issues
Document Page
2SECURITY IN HEALTHCARE CLOUD COMPUTING
Table of Contents
Introduction......................................................................................................................................4
1.1 Purpose of the study...................................................................................................................4
2.2 Scope of the study......................................................................................................................4
2.3 Background................................................................................................................................5
2.4 Definitions.................................................................................................................................6
2.5 Theories, Models and Hypothesis..............................................................................................6
Methodology....................................................................................................................................7
2.1 Research Onion..........................................................................................................................7
2.2 Research approach.....................................................................................................................8
2.3 Research philosophy..................................................................................................................9
2.4 Research design.........................................................................................................................9
2.5 Research strategy.....................................................................................................................10
2.6 Data collection procedure........................................................................................................10
2.7 Accessibility issue...................................................................................................................10
2.8 Ethical consideration...............................................................................................................10
3. Results and discussion...............................................................................................................11
4. Conclusions................................................................................................................................17
5. Next Step and Recommendations..............................................................................................18
References..........................................................................................................................19
Document Page
3SECURITY IN HEALTHCARE CLOUD COMPUTING
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4SECURITY IN HEALTHCARE CLOUD COMPUTING
Introduction
Several healthcare enterprises are implementing cloud computing in order to enhance
data analytics efficiencies as well as minimizing costs of the administration. Cloud provides
access to health care professionals about patient information. On the other hand, patients can
access of health care professionals as well as availed services for them. The study deals with
purpose, scope, background as well as theories, models and hypothesis related to the topic. In
addition, methodology, findings and discussion are discussed in the paper.
1.1 Purpose of the study
As most of the health care organizations at present days are deploying cloud computing
in their existing services, it becomes essential to have effective security methods in that. Cloud
security is considered as important for protecting privacy of the patients and comply with the
laws lied in health care (Rahimi et al., 2014). It ensures authorized access in the respective
services or information. However, some health care organizations have hesitation in adopting
cloud computing for complexity of the structuring cloud computing in order to comply with
health insurance probability and Accountability Act (HIPPA). The law regulates the procedure of
protecting private information in healthcare organizations. Along with these issues, there is
resistance of adopting cloud computing for having concerns over unauthorized access to data.
Moreover, patients or service holders cannot access medical records online for having network
security concerns. Thus, the study purposes to critically analyze the importance of security and
process of implementation in health care cloud computing.
Document Page
5SECURITY IN HEALTHCARE CLOUD COMPUTING
2.2 Scope of the study
A successful cloud health network needs to utilize data security measures complying with
the Health Insurance Probability and Accountability Act and prevent unauthorized access. It is
also important to have authenticity of service holder’s data that can make difference in effective
health care. Thus, implementing cloud security would be helpful for the health care professionals
to bring trust in cloud computing and save personal data in cloud (Sultan, 2014). However,
preventing unauthorized access in health care organizations is considered as critical. Thus,
analyzing on the cloud security would give an opportunity to secure virtual environment so that
remote users can easily access data. In addition, multiple users can access data at a same time so
that time can be saved and service can be effective.
2.3 Background
The essentiality for high scale and modern security has become increasingly important
with the emergence of cloud computing as well as moving sensitive health information outside of
the organization. On contrary, cyber-security professionals face challenges in ensuring security
of patients’ information (Zhou et al., 2015). Additionally, making the information easily
accessible for the clinicians is a challenge for health care professionals. In present years,
healthcare enterprises have started moving storage as well as computing capabilities to cloud. It
has been reported that cloud computing market in healthcare industry is expected to increase
20.5% compound annual development rate to reach $9.48 billion by 2020. However, the
potential development does not come without security issues.
As per a recent report from Skyhigh Networks, the average healthcare enterprises utilize
928 cloud services. In addition, report notes that average health care staffs utilize 28 cloud
services at the time course of a day. On the other hand, the sheer number of cloud services in
Document Page
6SECURITY IN HEALTHCARE CLOUD COMPUTING
utilization currently an obvious security risk. However, Skyhigh warns that only 7% of 928 cloud
services encounter its organizational security as well as compliance needs. Thus, 93% cloud
services are in security risks to healthcare organizations.
2.4 Definitions
Cloud computing is one of the practices of using a network of the remote server that is
hosted on internet to the store, manage as well as process data without having a local server.
Security issues like insure data and hacking of information can be occurred for using
cloud computing in health care organizations.
2.5 Theories, Models and Hypothesis
Theories in cloud computing
Policies on creation of privacy legislation in cloud computing is considered as important
aspect for an organization. It is believed that shape of a business needs to compatible with the
policies as per preferences of the customers (Dinh et al, 2013). The theory implies with
preferences of customers determine with the market share as well as higher market leading to
gain higher profits. The Payment Card Industry Data Security Standards is one of the instances
of self-regulation policy. In the situations where self-regulation fails with the particular laws are
developed that results other standards. It is important to develop self-regulation policy for
healthcare organizations. The sector can specify laws that are developed so that other sectors are
not hindered. In addition, the sector specific can apply to a particular sector. It does not oppose
self-regulation initiatives in different sectors.
Lian, Yen and Wang (2014) stated that Directive 95/46/EC is generally known as Data
Protection Directive. It has been implemented in October 1995. The purpose of the directive is
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7SECURITY IN HEALTHCARE CLOUD COMPUTING
harmonizing the privacy laws existed in distinctive member states of European Union providing
primary standard on privacy protection. Directive 95/46/EC identify personal or information that
are personally identifiable. On the other hand, it is important that defining of personal
information is related to identify natural person. In addition, directive 95/46/EC includes 32
article setting needs on handling personal data as well as mandating the countries. On the other
hand, directive makes implicit difference between data controller as well as data processor.
Models regarding cloud computing security
Developing cloud computing infrastructure can move sensitive data out of the
organization environment as well as to cloud. It defines professionals required to improve
security as well as update architectures in order to identify potential risks management as well as
issues related to application delivery (Haufe et al., 2014). However, cloud computing services
are ideal for corporations in order to cut capital hardware, management of data centre as well as
costs of threat management. In addition, technology can prevent various security issues of IT
professional that does not have proper comprehension of the procedure of cloud computing
infrastructure. It benefits have impact on technology. However, potential security issues of an
organization can be associated with cloud as well as procedure of avoiding the issues. Securing
devices connected to cloud need to be secured properly. The organization has clearly
comprehension of the procedure of working cloud infrastructure.
In order to steer clear cloud computing infrastructure threats as well as vulnerabilities and
ensure stable connectivity. In this perspective, it is imperative to secure domain name servers as
well as routing paths (Botta et al., 2014). Thus, implementation of DNS security environment
domains as well as endpoints is included in this process. Development of appropriate choice for
Document Page
8SECURITY IN HEALTHCARE CLOUD COMPUTING
cloud computing security is required. Prevention of denial of service technique as well as router
security techniques within an enterprise would assist thwart successful attacks and improve
security level in cloud. In this perspective, if the servers are left unsecured, infrastructure
remains susceptible to array of vulnerabilities as well as threats like DoS and evil twin attacks.
Hypothesis
H0: Security issues have impact over cloud computing in health care organizations
H1: Security issues do not have impact over cloud computing in healthcare organizations
Methodology
In the chapter of research, methodology for research can be defined in order to detect the
most appropriate approach in order to acquire desired results as well as outputs from the
research. Research methodology consists of theories as well as concept that can be adopted for
better analysis on the selected topic for research. Thus, implementation of research methodology
assists in comprehending the process being adopted analyzing the factors affecting on subjective
opinion related to security issues in the use of cloud computing in healthcare organizations.
2.1 Research Onion
Research onion is a structure, which assists in defining the appropriate methodology for
the research in a structural procedure. Research onion includes six layers. Each layer of the onion
assists describing the proper way of the methodology of the research. Research onion helps the
researcher to carry forward the research in appropriate direction of the research. The six layers
are philosophical stances, research approaches, strategies, selection, time horizons, techniques as
well as processes. These help the researchers conducting at the time of carrying out the research
Document Page
9SECURITY IN HEALTHCARE CLOUD COMPUTING
in proper way. The tools help to address the approaches as well as designs that are suitable for
the research.
Figure 1: Research onion
(Source: Saunders et al. 2009, p.52)
2.2 Research approach
In a research, use of exploration logic assists in taking decisions appropriate methods in
order to obtain subtle components of a point of research. Research approach is divided into two
types such as inductive and deductive approach (Mackey & Gass, 2015). Deductive approach of
a research aims to test previous theories or models of a specific research. On the other hand,
inductive research approach aims generating new theories according to collected data. The
researcher has selected deductive research approach in order to conduct the research. Deductive
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10SECURITY IN HEALTHCARE CLOUD COMPUTING
approach assists the researcher to conduct the research with appropriate use of the study. In
addition, it helps to use previous models and theories effectively.
2.3 Research philosophy
Research philosophy provides dimension as well as knowledge of the research study.
Research philosophy assists in providing primary facts, knowledge and concepts in order to
conduct the research in proper way (Taylor, Bogdan & DeVault, 2015). The major philosophical
aspect of the research is of three types such as realism, positivism as well as post positivism
philosophy. Positivism philosophy is useful to assess several philosophical aspects of research
with appropriate use of reality as well as associated philosophy.
However, positivism philosophy of research assists to cross check specific data of the
research. Post positivism philosophy assists with previous research as well as provides
knowledge of the outcomes of the data. On the other hand, realism philosophy deals with the
objective reality of the research. Positivism philosophy has been selected for clarifying the
research.
2.4 Research design
Brinkmann (2014) commented that research design is divided into two types such as
exploratory, explanatory as well as descriptive research design. It provides proper structural
purpose, which assists appropriate and definite purpose for the research. Explanatory research
assists connecting various ideas in order to understand the reasons as well as effect of the
research. Descriptive research assists conducting the entire research with more exploration and
description through putting detailed information associated with the research. Descriptive
research design has been selected in the present research in order to describe and explore the
Document Page
11SECURITY IN HEALTHCARE CLOUD COMPUTING
research topic with additional information. On the other hand, descriptive research design has
provided appropriate picture of the research through incorporating added information.
2.5 Research strategy
The research has been conducted through collecting secondary data from various books,
journals and websites (Flick, 2015). In addition, the research has utilized the strategy for
collecting essential data at the time of analyzing the collected data in order to investigate the
entire research.
2.6 Data collection procedure
In order to conduct the entire research, the research needs acquiring several types of data.
Simple random sampling method has been used for gathering of data. In addition, secondary data
are collected for doing literature review that would be helpful to get proper outcome of the
research. The researcher has gauged secondary data from frequent with health care organizations.
The researcher has selected a number of secondary sources
2.7 Accessibility issue
For the research, some issues are faced while trying to access related data in order to
conduct the research. On the other hand, some issues are faced while collecting the data. In
addition, some issues like language and accessibility issues are considered as major issues while
collecting data.
2.8 Ethical consideration
The researcher has selected prior consent with collection of data. The researcher has
maintained ethics at the time of conduction of the research. Data Protection Act 1998 has been
chevron_up_icon
1 out of 24
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]