Reliance on cryptography of cloud computing in Healthcare Information Management, lessons for Ghana Health Service.

Reliance on cryptography of cloud computing in Healthcare Information Management, lessons for Ghana Health Service.

Cloud Computing is considered as the next logical step in emerging technology for prosperous resource outsourcing, information sharing in Physician-Patient relationship and a platform for research development. The fast drift of Ghana’s healthcare facilities into cloud computing for finding treatment to humanity’s major illnesses has called for a pragmatic understanding of its security deterrence techniques. Studies in cryptographic discipline of Ghana’s healthcare require a working understanding of the security issues by Healthcare Administrators. Healthcare data leaked outside to unauthorized users tarnishes the image of such individual, healthcare facility and the Ghanaian populace. This paradigm shift requires a strong and efficient security system among healthcare facilities to avoid the erosion of trust. Our review is motivated by these contemporary technologies to explore it adoptions, utilization and provision of security strategies in this innovation. Much emphasis were placed on network, interfaces, data, virtualization, legal, compliance and governance as key areas of security challenges in cloud computing. Relevant literatures were discussed to highlight their prominent findings. The contributions presented are relevant in providing a practical framework for enhancing security in other disciplines as well.

___

  • [1] Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and challenges. International Journal of Information Management, 34(2), 177–184. https://doi.org/10.1016/j.ijinfomgt.2013.12.011
  • [2] Regalado, A. 2010, “Who coined the term ‘Cloud Computing’?”, The Business Technology Forum, http://www.thebusinesstechnologyforum.com/2011/10/whocoined-the-term-cloud-computing/ (Accessed on: 4 December, 2017).
  • [3] Isaac Akuamoah-Boateng Adueni, J. B. Hayfron-Acquah, J. K. P. (2016). Developing a Common Cloud Platform to Manage Ghana ’ s Healthcare System . Case Study of Ghana Health Service ( GHS ). Journal of Communications Technology, Electronics and Computer Science, Issue 4, 2016 ISSN 2457-905X, 4(4), 6–10.
  • [4] Al-Rashedi, A. A. (2014). E-Government Based on Cloud Computing and Service- Oriented Architecture. International Journal of Computer and Electrical Engineering, 6(3), 201–206. https://doi.org/10.7763/IJCEE.2014.V6.822
  • [5] Sultan, N. A. (2011). Reaching for the “cloud”: How SMEs can manage. International Journal of Information Management, 31(3), 272–278. https://doi.org/10.1016/j.ijinfomgt.2010.08.001
  • [6] Basu, S., Andrews, J., Kishore, S., Panjabi, R., & Stuckler, D. (2012). Comparative performance of private and public healthcare systems in low- and middle-income countries: A systematic review. PLoS Medicine, 9(6), 19. https://doi.org/10.1371/journal.pmed.1001244
  • [7] Kruse, C. S., Smith, B., Vanderlinden, H., & Nealand, A. (2017). Security Techniques for the Electronic Health Records. https://doi.org/10.1007/s10916-017-0778-4
  • [8] Achampong, E. K. (2012). The State of Information and Communication Technology and Health Informatics in Ghana. Online Journal of Public Health Informatics, 4(2), 1– 13. https://doi.org/10.5210/ojphi.v4i2.4191
  • [9] Samaras, E. A., & Samaras, G. M. (2016). Confronting systemic challenges in interoperable medical device safety, security & usability. Journal of Biomedical Informatics, 63, 226–234. https://doi.org/10.1016/j.jbi.2016.08.024
  • [10] Ahuja, S. P., Mani, S., & Zambrano, J. (2012). A Survey of the State of Cloud Computing in Healthcare. Network and Communication Technologies, 1(2), 12–19. https://doi.org/10.5539/nct.v1n2p12
  • [11] Bossert, T. J. (2002). Decentralization of health systems in Ghana, Zambia, Uganda and the Philippines: a comparative analysis of decision space. Health Policy and Planning, 17(1), 14–31. https://doi.org/10.1093/heapol/17.1.14
  • [12] Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology. National Institute of Standards and Technology, Information Technology Laboratory, 145, 7. https://doi.org/10.1136/emj.2010.096966
  • [13] Katz, R., Goldstein P. & Yanosky. R. 2010. “Cloud Computing in Higher”. http://net.educause.edu/section_params/conf/CCW10/highere d.pdf.
  • [14] Habib, S. M., Hauke, S., Ries, S., & Mühlhäuser, M. (2012). Trust as a facilitator in cloud computing: A survey. Journal of Cloud Computing, 1(1), 1–18. https://doi.org/10.1186/2192-113X-1-19
  • [15] Al-Ruithe, M., Benkhelifa, E., & Hameed, K. (2017). Current State of Cloud Computing Adoption - An Empirical Study in Major Public Sector Organizations of Saudi Arabia (KSA). Procedia Computer Science, 110, 378–385. https://doi.org/10.1016/j.procs.2017.06.080.
  • [16] Ramireddy, S., Raghu, T. S., Chakraborthy, R., & Rao, H. R. (2010). Privacy and Security Practices in the Arena of Cloud Computing.
  • [17] Kissi, J., Dai, B., Boamah, K. K. B., Owusu-Marfo, J., & Asare, I. (2018). Integrated Cloud Based Platform for Managıng Employees Pensıon Schemes; Case of Ghana. Australian Journal of Economics and Management Sciences, 8(1).
  • [18] West, B. C. (2014). Factors that Influence Application Migration to Cloud Computing in Government Organizations: a Conjoint Approach, 1–90. Retrieved from http://scholarworks.gsu.edu/bus_admin_diss/40
  • [19] Amron, M. T., Ibrahim, R., & Chuprat, S. (2017). A Review on Cloud Computing Acceptance Factors. Procedia Computer Science, 124, 639–646. https://doi.org/10.1016/j.procs.2017.12.200
  • [20] Abouelmehdi, K., Beni-hssane, A., Khaloufi, H., & Nationale, E. (2017). ScienceDirect Big data security and privacy in healthcare : A Review Big data security and privacy in healthcare:Procedia Computer Science, 113, 73– 80. https://doi.org/10.1016/j.procs.2017.08.292.
  • [21] Sultan, N., & Sultan, Z. (2012). The application of utility ICT in healthcare management and life science research: A new market for a disruptive innovation. The European Academy of Management Conference EURAM, (JUNE 2012), 6–8.
  • [22] Marketing, C. (2011). Cloud Computing : Building a New Foundation for Healthcare. White Paper, 12. Retrieved from http://www-05.ibm.com/de/healthcare/literature/cloudnew-foundation-for-hv.pdf
  • [23] Yan, L., Rong, C., & Zhao, G. (2009). Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based. Cloud Computing, 5931, 167–177. https://doi.org/10.1007/978-3-642-10665-1_15
  • [24] Jain, P. (2012). Security Issues and their Solution in Cloud Computing. International Journal of Computing & Business Research ISSN (Online, 2229–6166.
  • [25] Chadwick, D. W., & Casenove, M. (2011). Security APIs for my private cloud: Granting access to anyone, from anywhere at any time. Proceedings - 2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011, 792–798. https://doi.org/10.1109/CloudCom.2011.122
  • [26] Kabachinski, J. (2011). What’s the forecast for cloud computing in healthcare? Biomedical Instrumentation and Technology, 45(2), 146–150. https://doi.org/10.2345/0899- 8205-45.2.146
  • [27] Williams, S. O., Olatunji, O. M., & Olayinka, O. O. (2014). Cloud Based Framework for Efficient Management of Research Data, 1–6
  • [28] Cline, R. J., & Haynes, K. M. (2001). Consumer health information seeking on the Internet: the state of the art. Health Education Research, 16(6), 671–692. https://doi.org/10.1093/her/16.6.671
  • [29] Kowal, P., Chatterji, S., Naidoo, N., Biritwum, R., Fan, W., Ridaura, R. L., … Newell, M. L. (2012). Data resource profile: The world health organization study on global ageing and adult health (SAGE). International Journal of Epidemiology, 41(6), 1639–1649. https://doi.org/10.1093/ije/dys210
  • [30] Ghana Health Service 2016 Annual Report, (June, 2017).
  • [31] District Health Information Management System, 2018.
  • [32] Nyanator, F., Kutzin, J., & Nyonator, F. (1999). Health for some? The effects of user fees in the Volta Region of Ghana. Health Policy and Planning, 14(4), 329–341.
  • [33] Brandic, I., Dustdar, S., Anstett, T., Schumm, D., Leymann, F., & Konrad, R. (2010). Compliant Cloud Computing (C3): Architecture and language support for userdriven compliance management in Clouds. Proceedings - 2010 IEEE 3rd International Conference on Cloud Computing, CLOUD 2010, (i), 244–251. https://doi.org/10.1109/CLOUD.2010.42
  • [34] Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592. https://doi.org/10.1016/j.future.2010.12.006
  • [35] Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. Lo. (2009). On technical security issues in cloud computing. CLOUD 2009 - 2009 IEEE International Conference on Cloud Computing, 109–116. https://doi.org/10.1109/CLOUD.2009.60
  • [36] Gonzalez, N., Miers, C., Redigolo, F., Carvalho, T., Simplicio, M., Naslund, M., & Pourzandi, M. (2011). A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing. 2011 IEEE Third International Conference on Cloud Computing Technology and Science,231–238. https://doi.org/10.1109/CloudCom.2011.39.
  • [37] Jadeja, Y., & Modi, K. (2012). Cloud computing - Concepts, architecture and challenges. 2012 International Conference on Computing, Electronics and Electrical Technologies, ICCEET 2012,877–880. https://doi.org/10.1109/ICCEET.2012.6203873
  • [38] Han, Y. (2011). Cloud Computing: Case Studies and Total Costs of Ownership. Information Technology & Libraries, 30(December), 198–206. https://doi.org/Article
  • [39] Haufe, K., & Colomo-palacios, R. (2016). Security Management Standards : A Mapping. Procedia - Procedia Computer Science, 100(1877),755–761. https://doi.org/10.1016/j.procs.2016.09.221
  • [40] Nicanfar, H., Liu, Q., TalebiFard, P., Cai, W., Leung, V. C. M., Mello, F. L. De, Alliance, C. S. (2016). State-ofThe-Art of cloud computing cyber-security. Proceedings of 2015 IEEE World Conference on Complex Systems, WCCS 2015, 3(4),0–176. https://doi.org/10.1109/ICoCS.2015.7483283
  • [41] Sadeghi, A. R., Schneider, T., & Winandy, M. (2010). Token-based cloud computing: Secure outsourcing of data and arbitrary computations with lower latency. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6101 LNCS, 417–429. https://doi.org/10.1007/978-3-642- 13869-0_30
  • [42] Pearson, S. (2009). Taking Account of Privacy when Designing Cloud Computing Services 2 . Why is it important to take privacy into. Challenges of Cloud Computing, 2009. CLOUD’,44–52. https://doi.org/10.1109/CLOUD.2009.5071532