Different institutions have embraced cloud computing technology as modern approaches to ease the complexities which result from on-premise related technologies. Internet being the home of the digital assailant, it is worth noting that our data security is important (Gao et al., 2018). Holding the facts, customer needs real-time data response, availability for the data, confidentiality, and integrity; therefore, cloud computing has become an adequate and salient technology (Usak et al.,2019). Moreover, understanding the forthrightness and real timelessness of the hospital data requires the adoption of cloud computing becomes very important.
Cloud computing has become home to most institutions, not only health facilities. Especially during the covid era, telemedicine has become a convenient mechanism for administering the drug and seeking consultation from individuals (Tian et al., 2019). Therefore, this research must adopt cloud computing in harnessing all of its activities.
Technological advancement in areas of health has made a great milestone in ensuring that efficient service delivery and proper and better customer management have been enhanced at all times (Sunyaev, 2020). Real data manipulation and data transition can be achieved and enhanced at all times. Therefore, this research fully integrates the essence of cloud computing in improving the seamless access and transmission of the data from one hospital’s premises to the cloud servers.
(Bayan O et al.,2020) |
(Liezel,2020) |
(Latha et al.,2019) |
(Syed Imran et al.,2016) |
(Hassan et al.,2020) |
(Chanapha,2020) |
|
Scalability |
Cloud computing allows complexity and flexibility. Big data can be enhanced. |
Available resources in the cloud server can store voluminous data. Leizel et.al argues, that hospital records increasingly are added new day. Therefore big data can be handled. |
Scalability and flexibility of cloud computing suit a number of companies. Changes in any hospital structure are incorporated into the hospital, by the cloud service vendors. |
Cloud service is great if the scalability of the institution is incorporated. Imran et al. |
Traditional data storage, cloud storage is best suited at all times. |
Databases lack flexibility hence cloud is more effective and reliable. |
Data loss |
The systematic cold backup may be discussed to cause loss of data when changes did not effect. |
Data loss was discussed in the entire paper. For telemedicine and self-preserving system. |
Uncertainties in data and data migration to the cloud server are risks and result in a loss when not configured well. |
Asymmetric key issues were brought out to be canvased. Data loss, |
Impersonation of the data was centered on the challenges of cloud computing and auditing. |
Data loss in on-premise infrastructure has been attributed to trusted insiders. Health records have been construed to be very vital. |
Reliability |
Cloud computing is more effective and reliable in relation to data retrieval. |
Hospital data can be controlled and available all the time. |
Privacy of transmitted data was discussed at this point. Reliability in the computation of the checksum. |
Telemedicine and self-preserving automated service can be enhanced with cloud computing. |
Secure multiparty computation is enhanced through the scheme of encryptions. |
Cloud computing in record preserving was seamless while storing and retrieving. |
Effective Backup |
Systematic backup and well-organized by the vendors. The research anticipated fog server is meant for backup. |
On-premise infrastructure applied cold backup. Health records when in the cloud it is the duty of the vendor to ensure data is updated. |
The downtime was used here and discusses at length. Issues were discussed effectively though a lot was brought out clearly. |
Cold and warm back were reviewed. Syed Imran et al. concluded that cloud servers are important. |
Backup was discussed in the context of cutting costs. |
Backs in cloud computing dominated the whole of sections III. It was noted to be very fundamental. |
Security enhancement in cloud computing. |
The L-EnCDB scheme was used. The scheme proposes a trivial mechanism for enhancing security through an encryption approach to all data stored in the data. This technique made use FPE technique and character string scheme. |
Implementation of cloud service security at the Federal University of Santa Catarina, which made use of sensor wireless networks. The proposal argued that migration to the cloud was more secure, and it proposed the use of the homomorphic technique of data computation. |
Implementation of telehealth and use of encryption to enhance the security of the data. The records were only found so that individuals who were authenticated could access their data at all times in the hospital setup and records. |
Hospital data transmitted made use of a two-factor authentication mechanism to enhance the security of the telemedicine service that needed to occur. It is worth noting that the patient’s safety is paramount as this one may have a raving effect on the lives of individuals. Other security techniques implemented effectively include and are not limited to the following: K-Anonimity and randomization and the use of the symmetric key in enhancing the security of the data. |
AES-256 encryption standard was employed in order to enhance the security of the records being transmitted across the components of the cloud. Therefore the encryption standard is being used to enhance the security of the data we had intended to achieve in tandem. |
Implemented the use of IoT cloud services. This involved analyzing the security of the sensors and actuators, which definitely offered a platform for enhancing the security of the data. Selvaraj et al. Analyzed the security requirements for the device which was implicated and the implicated of the authentication-based approach in enhancing the security of the data. |
Privacy and integrity of the data in transit. |
It employed the use Garble circuit. In this environment, user data is allowed and offered for access as the cloud is treated as a third party, and admission is guaranteed all the time. The technique offers a garbled circuit opportunity to perform computation through shared data from a portable device. This approach tends to ensure the privacy of the data even if the calculating server gets access to the data involved in the question. |
Privacy of the data in cloud computing exhibits some challenges that necessitate immediate actions. Rosado et al. (2018) argue that because cloud computing is relatively new in the technological environment, it experiences some challenges in the privacy of the network, host, and data that is being transmitted across the networks. Many scholars have argued on the effectiveness and the security of the technology of cloud computing as the paradigm was developed in a short stint of time. Therefore, the choice and the agility of the technology remain fully and emphatically limited. |
The paper focuses a little bit on the security issues of the approaches required to enhance the privacy of the data. The article supposes that the choice of the cloud you acquire matters a lot in the entire scope and paradigms of data storage. In totality, the paper does not focus on the security mechanism but emphatically on the main driven aspect of finding the best approach in enhancing and exhibiting the privacy and confidentiality of the data on storage and that is being transmitted across and over the networks. |
The paper exhibited a number of techniques in enhancing the security and privacy of data on transit and as well as the privacy of the data on the cloud server (Asymmetric and symmetric techniques have been heavily discussed and exhausted in the paper on how the security of the data can e enhanced for any institution intending to adopt cloud computing. Additionally, current practices such as intrusion detection and intrusion prevention systems have been used to enhance the privacy and security of the data. |
Homomorphic and secure multiparty computation has been involved in ensuring the security and privacy of the data can be enhanced. Research has articulated how the two schemes and algorithms can provide integrity, availability, and confidentiality of the data. Therefore mechanisms from all the research can be used in our study to enhance the real timelessness of the hospital we intend to undertake. |
The algorithm for maintaining data privacy and integrity was implemented. This led to the utilization of one of the important computation schemes in the research paper, known as secure multiparty computation. The paper proposed the use of secrets of sharing data involved by different private entities being in cloud computing. Therefore, this becomes one of the common aspects that enhances the security of the data and ought to be implemented. |
References
Al-Amri, B. O., AlZain, M. A., Al-Amri, J., Baz, M., & Masud, M. (2020). A comprehensive study of privacy preserving techniques in cloud computing environment. Advances in Science, Technology and Engineering Systems Journal, 5(2), 419-424. https://doi.org/10.25046/aj050254
Gao, F., Thiebes, S., & Sunyaev, A. (2018). Rethinking the meaning of cloud computing for health care: A taxonomic perspective and future research directions. Journal of Medical Internet Research, 20(7), e10041. https://doi.org/10.2196/10041
Kehrer, S., & Blochinger, W. (2019). Model-based generation of self-adaptive cloud services. Communications in Computer and Information Science, 40-63. https://doi.org/10.1007/978-3-030-29193-8_3
Sunyaev, A. (2020). Cloud computing. Internet Computing, 195-236.
https://doi.org/10.1007/978-3-030-34957-8_7
Rachmat, N., & Samsuryadi. (2019). Performance analysis of 256-bit AES encryption algorithm on Android smartphone. Journal of Physics: Conference Series, 1196, 012049. https://doi.org/10.1088/1742-6596/1196/1/012049
Tian, S., Yang, W., Grange, J. M., Wang, P., Huang, W., & Ye, Z. (2019). Smart healthcare: Making medical care more intelligent. Global Health Journal, 3(3), 62-65. https://doi.org/10.1016/j.glohj.2019.07.001
Tiwari, S. M., Jain, S., Abraham, A., & Shandilya, S. (2019). Secure semantic smart healthcare (S3HC). Journal of Web Engineering, 17(8), 617-646. https://doi.org/10.13052/jwe1540-9589.1782
Usak, M., Kubiatko, M., Shabbir, M. S., Viktorovna Dudnik, O., Jermsittiparsert, K., & Rajabion, L. (2019). undefined. International Journal of Communication Systems, 33(2), e4179. https://doi.org/10.1002/dac.4179