Skip navigation
Please use this identifier to cite or link to this item: http://repository.iitr.ac.in/handle/123456789/15755
Title: Detection of insider attacks in cloud based e-healthcare environment
Authors: Garkoti G.
Peddoju, Sateesh Kumar
Balasubramanian R.
Published in: Proceedings of 2014 13th International Conference on Information Technology, ICIT 2014
Abstract: In recent years, Cloud computing has been receiving great attention from various business and research organizations as it promises to provide large storage facilities and highly managed remote services. Due to its characteristics like on-demand self service, rapid elasticity, ubiquitous network access and resource pooling, it shows high potential for providing e-Healthcare solutions. It can offer various financial and functional benefits to e-Healthcare which includes providing storage flexibility for the rapidly growing healthcare data, reduced cost, better accessibility, improved quality of care and enhancement in medical research. However at the same time, it faces many technical challenges like privacy, reliability, security etc. In the Cloud based ehealthcare environment where the patient's data is transferred between entities, maintaining the security of data becomes a priority. Cryptographic techniques can only provide a secure channel of communication but it fails to provide security at end points. Security attacks may be accomplished by the malicious insider at the end points. A malicious insider may modify the patient's data resulting in a false examination. The paper provides a detective approach for such attacks in the healthcare organizations. Our work is focused with the detection of insider attacks for preventing false examination of patient's health records and assuring the accountability of data usage. Watermarking can be used for detection of modification by an insider attack but does not provide accountability of data usage. Hence our approach combines the functionalities of cryptographic techniques and watermarking together with an accountability framework for providing transparency of patient's data usage. © 2014 IEEE.
Citation: Proceedings of 2014 13th International Conference on Information Technology, ICIT 2014, (2014), 195- 200
URI: https://doi.org/10.1109/ICIT.2014.43
http://repository.iitr.ac.in/handle/123456789/15755
Issue Date: 2014
Publisher: Institute of Electrical and Electronics Engineers Inc.
Keywords: audit
Cloud
encryption
medical images
security
watermarking
ISBN: 9.78148E+12
Author Scopus IDs: 56568492200
55356151200
7103127999
Author Affiliations: Garkoti, G., Department of Computer Science and Engineering, Indian Institute of Technology Roorkee, Roorkee, 247667, India
Peddoju, S.K., Department of Computer Science and Engineering, Indian Institute of Technology Roorkee, Roorkee, 247667, India
Balasubramanian, R., Department of Computer Science and Engineering, Indian Institute of Technology Roorkee, Roorkee, 247667, India
Appears in Collections:Conference Publications [CS]

Files in This Item:
There are no files associated with this item.
Show full item record


Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.