Title :
Detection of Insider Attacks in Cloud Based e-Healthcare Environment
Author :
Garkoti, Gaurav ; Peddoju, Sateesh K. ; Balasubramanian, R.
Author_Institution :
Dept. of Comput. Sci. & Eng., Indian Inst. of Technol. Roorkee, Roorkee, India
Abstract :
In recent years, Cloud computing has been receiving great attention from various business and research organizations as it promises to provide large storage facilities and highly managed remote services. Due to its characteristics like on-demand self service, rapid elasticity, ubiquitous network access and resource pooling, it shows high potential for providing e-Healthcare solutions. It can offer various financial and functional benefits to e-Healthcare which includes providing storage flexibility for the rapidly growing healthcare data, reduced cost, better accessibility, improved quality of care and enhancement in medical research. However at the same time, it faces many technical challenges like privacy, reliability, security etc. In the Cloud based ehealthcare environment where the patient´s data is transferred between entities, maintaining the security of data becomes a priority. Cryptographic techniques can only provide a secure channel of communication but it fails to provide security at end points. Security attacks may be accomplished by the malicious insider at the end points. A malicious insider may modify the patient´s data resulting in a false examination. The paper provides a detective approach for such attacks in the healthcare organizations. Our work is focused with the detection of insider attacks for preventing false examination of patient´s health records and assuring the accountability of data usage. Watermarking can be used for detection of modification by an insider attack but does not provide accountability of data usage. Hence our approach combines the functionalities of cryptographic techniques and watermarking together with an accountability framework for providing transparency of patient´s data usage.
Keywords :
cloud computing; cryptography; electronic health records; health care; watermarking; cloud based e-healthcare environment; cloud computing; cryptographic techniques; data usage accountability; malicious insider attack detection; medical research; on-demand self service; patient health records; remote services; research organizations; resource pooling; secure communication channel; ubiquitous network access; watermarking; Cloud computing; Medical diagnostic imaging; Medical services; Organizations; Watermarking; Cloud; audit; encryption; medical images; security; watermarking;
Conference_Titel :
Information Technology (ICIT), 2014 International Conference on
Conference_Location :
Bhubaneswar
Print_ISBN :
978-1-4799-8083-3
DOI :
10.1109/ICIT.2014.43