Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review

作者: Afsheen Ahmed , Rabia Latif , Seemab Latif , Haider Abbas , Farrukh Aslam Khan

DOI: 10.1007/S11042-017-5540-X

关键词:

摘要: The emergence of Internet Things (IoT) has introduced smart objects as the fundamental building blocks for developing a cyber-physical universal environment. IoTs have innumerable daily life applications. healthcare industry particularly been benefited due to provision ubiquitous health monitoring, emergency response services, electronic medical billing, etc. Since IoT devices possess limited storage and processing power, therefore these intelligent are unable efficiently provide e-health facilities, or process store enormous amount collected data. merged with Cloud Computing technology in Multi-Cloud form that basically helps cover limitations by offering secure on-demand shared pool resources i.e., networks, servers, storage, applications, etc., deliver effective well-organized amenities. Although framework based on integration is contributing towards better patient care, yet contrary, it challenging privacy reliability patients’ information. purpose this systematic literature review identify top security threat evaluate existing techniques used combat attack their applicability e-Healthcare

参考文章(43)
Awantika Awantika, Neha rawat, Poonam rawat, Ratnesh Srivastava, Shikha Singh, Binay Kumar Pandey, Cloud Computing Attacks: A Discussion With Solutions ieee international conference on cloud computing technology and science. ,vol. 1, pp. 1- 8 ,(2014) , 10.15764/MCCC.2014.01001
Muhammad Inam ul Haq, The major security challenges to cloud computing. University of Borås/School of Business and IT. ,(2013)
Wei Na, Internet of Things Based on the Cloud Computing Architecture international conference on measuring technology and mechatronics automation. pp. 585- 587 ,(2015) , 10.1109/ICMTMA.2015.147
Jiang Rui, Sun Danpeng, Architecture Design of the Internet of Things Based on Cloud Computing international conference on measuring technology and mechatronics automation. pp. 206- 209 ,(2015) , 10.1109/ICMTMA.2015.57
Miltiadis Kandias, Nikos Virvilis, Dimitris Gritzalis, The Insider Threat in Cloud Computing critical information infrastructures security. pp. 93- 103 ,(2011) , 10.1007/978-3-642-41476-3_8
T Gunasekhar, K Thirupathi Rao, V Krishna Reddy, P Sai Kiran, B Thirumala Rao, Mitigation of Insider Attacks through Multi-Cloud International Journal of Electrical and Computer Engineering. ,vol. 5, pp. 136- 141 ,(2015) , 10.11591/IJECE.V5I1.PP136-141
S. M. Riazul Islam, Daehan Kwak, Md Humaun Kabir, Mahmud Hossain, Kyung-Sup Kwak, The Internet of Things for Health Care: A Comprehensive Survey IEEE Access. ,vol. 3, pp. 678- 708 ,(2015) , 10.1109/ACCESS.2015.2437951
Martin Hershkowitz, The “Insider” Threat Journal of Police Crisis Negotiations. ,vol. 7, pp. 103- 111 ,(2007) , 10.1300/J173V07N01_06
Zulkefli Mohd Yusop, Jemal H. Abawajy, Analysis of Insiders Attack Mitigation Strategies Procedia - Social and Behavioral Sciences. ,vol. 129, pp. 611- 618 ,(2014) , 10.1016/J.SBSPRO.2014.06.002
Hanim Eken, Security threats and solutions in cloud computing world congress on internet security. pp. 139- 143 ,(2013) , 10.1109/WORLDCIS.2013.6751034