Data Privacy Challenges in Cloud Solutions for IT and Healthcare
Keywords:
Critical Success Factors (CSFs), Deep Learning, Internet of Things (IoT), AI Systems, AI-Driven, Wireless Body Area Networks, Strategies, Traditional Perimeter-Based Security, Cloud Platform, Privacy-Preserving, IT.Abstract
In contrast to conventional perimeter-based security, zero trust deployment is a challenging task that calls for a new management strategy. In order to properly plan, evaluate, and manage their zero-trust cybersecurity, organisations will benefit from having a defined set of key success factors (CSFs). Wireless Body Area Networks (WBANs) have been widely used in healthcare systems, necessitating the development of new technologies like cloud computing and the Internet of Things (IoT) that can handle the processing and storage constraints of WBANs. However, a lot of security issues and difficulties were raised by this rapid cloud migration. It has the potential to improve healthcare efficiency and quality because to its scalability, robustness, flexibility, connection, cost reduction, and high-performance qualities. But it's also critical to comprehend the unique security and privacy dangers that come with this technology. This study focusses on a cloud-based home healthcare system. It presents a number of use cases and illustrates a cloud-based architecture. In order to strengthen the cybersecurity posture of cloud-based AI systems, this research also emphasises the significance of strong encryption methods, secure cloud setups, and regulatory compliance. This study attempts to provide a thorough overview of deep learning in cloud settings and its implications for the future of AI-driven cybersecurity solutions by addressing the twin aspects of innovation and obstacles.
References
- Bennett, M., Balaouras, S., & Glenn, M. (2017). Zero Trust Security: A CIO’s Guide To Defending Their Business From Cyberattacks. F. Research.
- [8] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in EUROCRYPT, 2005, pp. 457–473. [9] L. Ibraimi, M. Petkovic, S. Nikova, P. H. Hartel, and ´ W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,” in WISA, 2009, pp. 309–323.
- L. Ibraimi, M. Asim, and M. Petkovic, “An encryption scheme ´ for a secure policy updating,” in SECRYPT, 2010, pp. 399– 408.
- L. Ibraimi, M. Asim, and M. Petkovic, “Secure management ´ of personal health records by applying attribute-based encryption,” Enschede, July 2009.
- M. Petkovic, S. Katzenbeisser, and K. Kursawe, “Rights man- ´ agement technologies: A good choice for securing electronic health records?” in Proceedings of the Information Security Solutions Europe Conference (ISSE), 2007.
- B. Bouwman, S. Mauw, and M. Petkovic, “Rights manage- ´ ment for role-based access control,” in The 5th IEEE Consumer Communications and Networking Conference (CCNC), 2008, pp. 1085–1090.
- N. P. Sheppard, R. Safavi-Naini, and M. Jafari, “A digital rights management model for healthcare,” Policies for Distributed Systems and Networks, IEEE International Workshop on, vol. 0, pp. 106–109, 2009.
- Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.
- Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13(18), 1587–1611.
- Li, J., Wang, J., Chen, Y., & Qi, D. (2014). Cybersecurity issues in modern cloud environments. Journal of Computer Security, 22(3), 241–269.
- Huang, G., Liu, Z., Van Der Maaten, L., & Weinberger, K. Q. (2017). Densely connected convolutional networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 4700–4708.
- Liu, W., Wen, Y., Yu, Z., & Yang, M. (2016). Towards deep learning frameworks for intelligent cloud applications. Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 243–250.
- Taylor, G., & Stone, P. (2009). Anomaly detection using deep autoencoders for streaming data in cloud environments. International Conference on Big Data Analytics, 34–45.
- Bowers, K., Juels, A., & Oprea, A. (2009). HAIL: A high-availability and integrity layer for cloud storage. Proceedings of the 16th ACM Conference on Computer and Communications Security, 187–198.
- Abbas QE, Sung-Bong J. A survey of blockchain and its applications. In2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC) 2019 Feb 11 (pp. 001-003). IEEE.
- Aujla GS, Jindal A. A decoupled blockchain approach for edge-envisioned IoT-based healthcare monitoring. IEEE Journal on Selected Areas in Communications. 2020 Sep 3;39(2):491-9.
- Ferrag MA, Derdour M, Mukherjee M, Derhab A, Maglaras L, Janicke H. Blockchain technologies for the internet of things: Research issues and challenges. IEEE Internet of Things Journal. 2018 Nov 22;6(2):2188-204.
- Ruby Annette, J., W. Aisha Banu, and P. Subash Chandran. "Classification and Comparison of Cloud Renderfarm Services for Recommender Systems." Innovative Data Communication Technologies and Application: ICIDCA 2019. Springer International Publishing, 2020.
- Ruby Annette J, W. Aisha Banu, and P. Subash Chandran. "Rendering-as-a-Service: Taxonomy and Comparison". Procedia Computer Science 50 (2015): 276-281, Elsevier.
- Ruby Annette J, Banu A. Sriram,“Cloud Broker for Reputation-Enhanced and QoS based IaaS Service Selection”. InProc. of Int. Conf. on Advances in Communication, Network, and Computing, CNC, Elsevier 2014 (pp. 815-824).
- Cao S, Zhang G, Liu P, Zhang X, Neri F. Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain. Information Sciences. 2019 Jun 1; 485:427-40.
- Soni S, Bhushan B. A comprehensive survey on blockchain: working, security analysis, privacy threats and potential applications. In2019 2nd international conference on intelligent computing, instrumentation and control technologies (ICICICT) 2019 Jul 5 (Vol. 1, pp.922-926). IEEE.
- Soltanisehat L, Alizadeh R, Hao H, Choo KK. Technical, temporal, and spatial research challenges and opportunities in blockchain-based healthcare: A systematic literature review. IEEE Transactions on Engineering Management. 2020 Sep 2.
- Singh AP, Pradhan NR, Luhach AK, Agnihotri S, Jhanjhi NZ, Verma S, Ghosh U, Roy DS. A novel patient-centric architectural framework for blockchain-enabled healthcare applications. IEEE Transactions on Industrial Informatics. 2020 Nov 13;17(8):5779-89.
- Tanwar S, Parekh K, Evans R. Blockchain-based electronic healthcare record system for healthcare 4.0 applications. Journal of Information Security and Applications. 2020 Feb 1; 50:102407.
- 54. Lin, H., Shao, J., Zhang, C., and Fang, Y., CAM: Cloud-assisted privacy preserving mobile health monitoring. IEEE Trans. Inform. Forensic Sec. 8(6):985–997, 2013.
- Li, M., Yu, S., Zheng, Y., Ren, K., and Lou, W., Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1):131–143, 2013.
- Li, M., Yu, S., Ren, K., and Lou, W., Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. Lecture Notes Inst. Comput. Sci. Soc. Inform. Telecommun. Eng. 89–106, 2010.
- Castiglione, A., Pizzolante, R., De Santis, A., Carpentieri, B., Castiglione, A., and Palmieri, F., Cloud-based adaptive compression and secure management services for 3D healthcare data. Futur. Gener. Comput. Syst. 43–44:120–134, 2015.
- Thilakanathan, D., Chen, S., Nepal, S., Calvo, R., and Alem, L., A platform for secure monitoring and sharing of generic health data in the Cloud. Futur. Gener. Comput. Syst. 35:102–113, 2014.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.