2020
DOI: 10.1145/3386160
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Requirements for Cloud Computing in Healthcare

Abstract: Cloud computing promises essential improvements in healthcare delivery performance. However, its wide adoption in healthcare is yet to be seen, one main reason being patients’ concerns for security and privacy of their sensitive medical records. These concerns can be addressed through corresponding security and privacy requirements within the system engineering process. Despite a plethora of related research, security and privacy requirements for cloud systems and services have seldomly been investigated metho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(11 citation statements)
references
References 92 publications
0
5
0
Order By: Relevance
“…We have also found some works in the literature that report on the use of use cases, business process modeling, class diagrams, user story, user experience, design thinking, among others, for software privacy and privacy requirements' elicitation [44,48,49,[56][57][58] and have related works to software privacy and privacy requirements for cloud deployment models [46,47,59] and Internet of Things (IoT) [41,42,60,61]. This diversity of works found in several areas [43,45,62] demonstrates how important the elicitation of software privacy and privacy requirements is during the software development process and the growing concern of researchers from various fields of knowledge regarding the privacy of user data.…”
Section: Rq1 According To the Literature What Are The Methodologiementioning
confidence: 95%
“…We have also found some works in the literature that report on the use of use cases, business process modeling, class diagrams, user story, user experience, design thinking, among others, for software privacy and privacy requirements' elicitation [44,48,49,[56][57][58] and have related works to software privacy and privacy requirements for cloud deployment models [46,47,59] and Internet of Things (IoT) [41,42,60,61]. This diversity of works found in several areas [43,45,62] demonstrates how important the elicitation of software privacy and privacy requirements is during the software development process and the growing concern of researchers from various fields of knowledge regarding the privacy of user data.…”
Section: Rq1 According To the Literature What Are The Methodologiementioning
confidence: 95%
“…Step 7: stop ALGORITHM 3: Cloud Encryption Algorithm and Decryption Algorithm. 8 Computational Intelligence and Neuroscience of the proposed system is determined by using the Clinical Data Progression approach in which unique identification is required.…”
Section: F1 Score F1mentioning
confidence: 99%
“…An individual's trust in the safety and confidentiality of their medical history had a positive impact on their motivation to create an electronic health record [ 7 ]. Patients' ability to encourage health care providers to exchange their medical data by using cloud computing techniques has been [ 8 ] limited as a result of privacy issues. Antivirus tools, chief information security officers, and cloud computing are other security methods that are used, but their deployment is [ 9 ] budget-dependent.…”
Section: Introductionmentioning
confidence: 99%
“…Ermakova et al [19] surveyed the use of cloud computing technology in healthcare. The survey pointed out the importance, for GPs, to share healthcare data under a common standard system [20] – [22] .…”
Section: Introductionmentioning
confidence: 99%