08448380779 Call Girls In Civil Lines Women Seeking Men
Securing the E-Health Cloud
1. Securing the E-Health Cloud
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
1st ACM International Health Informatics Symposium (IHI 2010)
Arlington,Virginia, USA, 11-12 November 2010
Freitag, 12. November 2010
2. Introduction
Buzzwords of the year:
E-Health
Cloud Computing
Freitag, 12. November 2010
3. Introduction
Put together: E-Health Cloud
Freitag, 12. November 2010
4. Introduction
Put together: E-Health Cloud
First idea: a paper with both buzzwords (cool!)
Freitag, 12. November 2010
5. Introduction
Put together: E-Health Cloud
First idea: a paper with both buzzwords (cool!)
Seriously: What about security & privacy?
Freitag, 12. November 2010
6. Outline
• E-Health Cloud Models
• Security & Privacy Problem Areas
• Security Architecture for Privacy Domains
Freitag, 12. November 2010
9. Simple E-Health Cloud
Examples:
• Patients need to manage complex access rights
• Patients don‘t understand security implications ...
• Privacy: server provider can gain access to data in PHRs
Freitag, 12. November 2010
23. Advanced E-Health Cloud
Examples:
• Europe
Healthcare
- Germany, Austria,
Netherlands, ...
Telematics
Boundary
• Asia
- Taiwan, ...
Freitag, 12. November 2010
24. Advanced E-Health Cloud
Examples:
• Europe
Healthcare
- Germany, Austria,
Netherlands, ...
Telematics
Boundary
• Asia
- Taiwan, ...
Huh! Pretty complex.
Must be secure, right?
Freitag, 12. November 2010
25. Security Problem Areas
• Data Storage and Processing
• Data centers: unauthorized information leakage
• Platform security: vulnerable to malware
• Mobile storage (USB memory sticks)
• Infrastructure Management
• Cryptographic keys, certificates
• Hardware / software components
• Usability and User Experience
• Smartcard PIN (when unconscious?)
• Time consuming
Freitag, 12. November 2010
26. Security Problem Areas
• Data Storage and Processing
• Data centers: unauthorized information leakage
• Platform security: vulnerable to malware
• Mobile storage (USB memory sticks)
• Infrastructure Management
• Cryptographic keys, certificates
• Hardware / software components
• Usability and User Experience
• Smartcard PIN (when unconscious?)
• Time consuming
Freitag, 12. November 2010