Preview

Cloud Computing Healthcare Systems

Powerful Essays
Open Document
Open Document
2415 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cloud Computing Healthcare Systems
Towson University
Applied Information Technology

Research Paper
Advanced Encryption Standard (AES) Protecting Cloud Computing Healthcare Data

Information Technology Infrastructure
AIT 600.103
Dr. Raza Hasan
Fall 2014

UjwalRai 12-04-14

Abstract Healthcare organizations are tremendously adapting cloud computing system to their organization for storing sensitive information as well as applications. The efficiencies and cost-savings made possible by cloud environments directly support the need to slow the growth of healthcare costs. As cloud computing has created convenient, effective, and more efficient healthcare services to the people, the security level for protected health information has been listed on the top risk in cloud computing infrastructure. Millions of users are using the Cloud for various purposes, therefore healthcare and cloud service providers need to focus on adapting highly secure and protected data encryption algorithm in order to assure security of their personal or health related information stored in the cloud. Advanced Encryption Standard (AES) is the safest and protected algorithm recommended by American Medical Association that healthcare provider need to adapt for the patients’ health related information. AES has been integrated by Intel into their software and hardware for healthcare information security.

Introduction
Cloud computing is a new computing model that lets an organization pay for only the resources they need, when they are needed. In cloud computing, the data, resources and applications exist on a “cloud” of Web servers, which creates a highly flexible environment for different units of an organization. Cloud Computing has been a new model for healthcare service and medical organizations to improve the delivery of healthcare service. It has enabled them to operate with greater efficiency, cost-effectiveness, and agility.
Though, healthcare is a highly regulated environment, and has



Cited: Cloud Security Alliance. (2010, 03). Top Threats to Cloud Computing. Retrieved 12 03, 2014, from https://cloudsecurityalliance.org: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf Federal Information Processing Standards Publication 197. (2001, 11 26). Announcing the ADVANCED ENCRYPTION STANDARD (AES). Retrieved 12 1, 2014, from csrc.nist.gov: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf Hitachi Data Systems. (2012, 05). How to Improve Healthcare with Cloud Computing. Retrieved 12 3, 2014, from http://docs.media.bitpipe.com/io_10x/io_108673/item_650544/cloud%20computing%20wp.pdf Intel IT Center. (2013, 01). Healthcare Cloud Security. Retrieved 12 3, 2014, from www.intel.com: http://www.intel.com/content/dam/www/public/us/en/documents/solution-briefs/cloud-computing-securing-cloud-financial-brief.pdf Kaner, J. (2013, 02 27). 5 Steps to Ensuring Hospital Data Security. Retrieved 12 3, 2014, from http://www.beckershospitalreview.com/: http://www.beckershospitalreview.com/healthcare-information-technology/5-steps-to-ensuring-hospital-data-security.html Penchalaiah, P. N. (2010). Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES). International Journal on Computer Science and Engineering, 1641-1645. Sachdev, A. (2013). Enhanching Cloud Computing Security using AES Algorithm. Internaltional Journal of Computer Applications, 19-23.

You May Also Find These Documents Helpful

  • Good Essays

    Hlth430 Unit 4 Project 1

    • 764 Words
    • 4 Pages

    There are a number of business challenges in healthcare such as service quality, safety, rising costs, a severe shortage of skilled staff in order to meet the needs of patients with a complex burden of illness. To meet the challenges in front of us, will require a shift from acute care to more preventive and long-term chronic care management. This new care model must be supported by interoperable health information technology and a more patient-centric care system. www.cisco.com/web/strategy/docs/healthcare/07CS1034_HC_Whitepaper_r5.pdf…

    • 764 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Patton-Fuller Rfp Cmgt554

    • 4696 Words
    • 19 Pages

    The following document shall serve as the RFP (Request for Project) for the Patton-Fuller Community Hospital. Team A has researched the hospital’s current IT systems seeking ways to ensure many years of continued success and compliance with the very best practices in the IT community today. Specific areas such as networking architecture design and the future proofing of the design for speed, accuracy, and security of the system shall be discussed as part of this RFP. Special consideration was given to the sensitive nature of the security surrounding patient information while proposing changes.…

    • 4696 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    Cmgt 554 Week4

    • 1618 Words
    • 7 Pages

    References: Apollo Group, Inc. (2013). Patton-Fuller Community Hospital. Information Systems Overview. Retrieved from CMGT/554 – IT Infrastructure…

    • 1618 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Anyone with a laptop or tablet could access the network and with only few basic network utilities could access all the servers and all the patient information. Most of these facilities are not implementing any Network Security because of the cost associated with it. “Most healthcare organizations nationwide, some 61 percent to be exact, reported a security related incident in the form of security breach, data loss or unplanned downtime at least once this past year, according to a new health IT report by MeriTalk, a public-private organization working to improve government information technology. These security events cost U.S. hospitals an estimated $1.6 billion each year. Breaking it down by incident, hospitals should expect to hand over on average $810,000 per security breach, which occurs at nearly one in five healthcare organizations nationwide” (healthcareitnews.com). I hope that with this project I can make clear the benefits of securing the network and the steps we need to take to set up and secure the…

    • 698 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    In today’s cyber environment everything is that the tip of society’s fingertip and healthcare is not the exception. Every organization from hospitals to the local family doctor’s office is realizing the cost savings and convenience of having a medical system in place that can store, track, audit, and maintain a patient’s history. Such technology is mutually beneficial to patients alike since searching for providers becomes much easier when login into a medical portal allows the user to find specialist of all sorts without much hassle.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    HIPPA Compliance

    • 117 Words
    • 1 Page

    HIPPA has suggested the diverse range of security implications for the hospital networks, as they need to have robust security framework to protect the integrity of patient’s record. In this regard, the most prominent security mechanisms have been identified to ensure hospital compliance with HIPPA requirements include the administrative safeguard, the technical safeguards of the hospital, as well as the physical safeguards of the hospital (HIPAA, n.d.). Therefore, in order to ensure whether or not the hospital is complying with HIPPA requirements, it is important to evaluate the administrative safeguards of the hospital, i.e., risk assessment approaches, BYOD policies, network policies, network security policies, as well as security management…

    • 117 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Over the years since the inception of HIPAA, it is hard not to notice the influence it brought on to the patients, the healthcare industry, the health information management and technology, and other entities in securing the confidentiality, security, and privacy of PHI. In addition, the HITECH Act and its HIPAA modification released in January 2013 greatly invigorated the HIPAA of 1996 (Solove, 2013). Definitely, the most important health care changes over the past couple of decades is the growing interest in health information privacy and security (Solove, 2013).…

    • 90 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Bibliography: AWS Security and Compliance Center. (2012). Retrieved February 5, 2012, from Amazon Web Services: http://aws.amazon.com/security/…

    • 4913 Words
    • 20 Pages
    Powerful Essays
  • Better Essays

    In addition to the significant operational and business efficiencies that providers can realize over time through secure, effective HIE, their ability to offer patients more personalized care will also improve. Because more vital patient information will be shared between stakeholders— including physicians, labs, clinics, hospitals, and the patients themselves—caregivers will have a more complete, more accurate picture of their patients’ health history. This should mean smarter medical decisions as well as fewer errors, unnecessary tests, and prescriptions. This increased data liquidity can also support translational research by more quickly getting critical data to and from the point of care and establishing the consent management needed to deliver care that is more…

    • 2308 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Every provider needs to access patient health records which gives the medical professional an opportunity to review prior health conditions, surgeries, and current medications. The EHR streamlines the retrieval process and allows access to information in real-time from any health care facility. Patients can often be misdiagnosed or receive a prescription with an incorrect dosage, but the new technology will help to evaluate patient health in an electronic format to reduce the regularity of medical errors and mistakes. There are potential risks with storing and accessing any data electronically, but encryption software and adding security measures will help to safeguard this information. Health informatics is designed to help providers and organizations strengthen the safety of this data through self-assessment and proper technological training. (Willison,…

    • 779 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Six main factors are integrity, dependability, availability, confidentiality, authenticity and accountability. Patient records involves very sensitive data, which should only be disclosed to authorize users, thus confidentiality of the required data is essential. Integrity and availability of the services are also important. To accomplish the desire measure of information system security, a range of security policy models have been proposed and implemented in healthcare. One of the most widely use of security policy being adopted by medical institutions to protect patients information in a EHR System is the Role Based Access Control…

    • 1704 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Researcher

    • 27977 Words
    • 112 Pages

    The Future of HIPAA in the Cloud A white paper by Frank Pasquale and Tara Adams Ragone June 30, 2013 The Future of HIPAA in the Cloud Abstract This white paper examines how cloud computing generates new privacy challenges for both healthcare providers and patients, and how American health privacy laws may be interpreted or amended to address these challenges. Given the current implementation of Meaningful Use rules for health information technology and the Omnibus HIPAA Rule in health care generally, the stage is now set for a distinctive law of “health information” to emerge.…

    • 27977 Words
    • 112 Pages
    Good Essays
  • Powerful Essays

    Common privacy standards at healthcare facilities are limiting access to medical records, organizing medical records, and encrypting medical records. Many times information can be stolen by unauthorized people, and the information can be used for identity theft and fraud. The organization of medical records and encryption of medical records can prevent unauthorized access and the misplacement of medical information. If there is a privacy breach, federal law mandates that patients have a right to know. Privacy breaches are preventable, and healthcare facilities create precautions to maintain privacy and prevent expensive…

    • 1235 Words
    • 5 Pages
    Powerful Essays

Related Topics