NIT6041: Thesis - Cloud Computing Security in Healthcare

Verified

Added on  2025/04/03

|4
|361
|269
AI Summary
Desklib provides past papers and solved assignments for students. This thesis explores cloud computing security in healthcare.
Document Page
NIT6041
Thesis
Student name:
Student ID:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Abstract............................................................................................................................................2
References........................................................................................................................................3
1
Document Page
Abstract
In this report, I have mentioned the techniques for securing the patient’s data in the health sector
through cloud computing. In this online environment, where everything is operated and managed
online, so in health care sector also, terminating the health records and the information online
helps in storage, access and share data easily. With cloud computing technology, there is no need
to store the data in personal systems. The sector can get a switch to the cloud technology for
storage and operating functions. As by accessing the data online, the patient will lose control
over their personal health data. There can be many security risks in IT fields such as hacker
attacks, network breaches, system failure etc. Hence security and encryption of this data are must
so to avoid any cyber-crime or data loss. As cloud technology offers many scaled defensive
resources for securing the data on cloud. Cloud computing also offers techniques of replication
process in which various replicated blocks of the data are stored at various locations (Li, 2010).
So in case of any data loss, the original data might be extracted from these replicated blocks.
Strong encryption with management of different keys for multiple patients is also one of the core
mechanism which is offered by cloud technology. Also layer control access can be added to
enhance cloud-based services. Also trusted controls can be added with proper permissions so that
security can be enhanced at appropriate manner. Peer testing can be implemented to enhance the
security practices in the loud network (Kuo, 2011). Hence this report mentions all the security
techniques of cloud technology which ensures the data protection of all the patients from other
criminal organizations.
2
Document Page
References
Kuo, A. M. H. (2011). Opportunities and challenges of cloud computing to improve health care
services. Journal of medical Internet research, 13(3).
Li, M., Yu, S., Ren, K., & Lou, W. (2010, September). Securing personal health records in cloud
computing: Patient-centric and fine-grained data access control in multi-owner settings.
In International conference on security and privacy in communication systems (pp. 89-106).
Springer, Berlin, Heidelberg.
3
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]