• DocumentCode
    259997
  • Title

    Detection of Insider Attacks in Cloud Based e-Healthcare Environment

  • Author

    Garkoti, Gaurav ; Peddoju, Sateesh K. ; Balasubramanian, R.

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Indian Inst. of Technol. Roorkee, Roorkee, India
  • fYear
    2014
  • fDate
    22-24 Dec. 2014
  • Firstpage
    195
  • Lastpage
    200
  • Abstract
    In recent years, Cloud computing has been receiving great attention from various business and research organizations as it promises to provide large storage facilities and highly managed remote services. Due to its characteristics like on-demand self service, rapid elasticity, ubiquitous network access and resource pooling, it shows high potential for providing e-Healthcare solutions. It can offer various financial and functional benefits to e-Healthcare which includes providing storage flexibility for the rapidly growing healthcare data, reduced cost, better accessibility, improved quality of care and enhancement in medical research. However at the same time, it faces many technical challenges like privacy, reliability, security etc. In the Cloud based ehealthcare environment where the patient´s data is transferred between entities, maintaining the security of data becomes a priority. Cryptographic techniques can only provide a secure channel of communication but it fails to provide security at end points. Security attacks may be accomplished by the malicious insider at the end points. A malicious insider may modify the patient´s data resulting in a false examination. The paper provides a detective approach for such attacks in the healthcare organizations. Our work is focused with the detection of insider attacks for preventing false examination of patient´s health records and assuring the accountability of data usage. Watermarking can be used for detection of modification by an insider attack but does not provide accountability of data usage. Hence our approach combines the functionalities of cryptographic techniques and watermarking together with an accountability framework for providing transparency of patient´s data usage.
  • Keywords
    cloud computing; cryptography; electronic health records; health care; watermarking; cloud based e-healthcare environment; cloud computing; cryptographic techniques; data usage accountability; malicious insider attack detection; medical research; on-demand self service; patient health records; remote services; research organizations; resource pooling; secure communication channel; ubiquitous network access; watermarking; Cloud computing; Medical diagnostic imaging; Medical services; Organizations; Watermarking; Cloud; audit; encryption; medical images; security; watermarking;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Technology (ICIT), 2014 International Conference on
  • Conference_Location
    Bhubaneswar
  • Print_ISBN
    978-1-4799-8083-3
  • Type

    conf

  • DOI
    10.1109/ICIT.2014.43
  • Filename
    7033321