EconPapers    
Economics at your fingertips  
 

A Framework to Secure Medical Image Storage in Cloud Computing Environment

Mbarek Marwan, Ali Kartit and Hassan Ouahmane
Additional contact information
Mbarek Marwan: LTI Laboratory, ENSA, Chouaib Doukkali University, El Jadida, Morocco
Ali Kartit: LTI Laboratory, ENSA, Chouaib Doukkali University, El Jadida, Morocco
Hassan Ouahmane: LTI Laboratory, ENSA, Chouaib Doukkali University, El Jadida, Morocco

Journal of Electronic Commerce in Organizations (JECO), 2018, vol. 16, issue 1, 1-16

Abstract: Nowadays, modern healthcare providers create massive medical images every day because of the recent progress in imaging tools. This is generally due to the increasing number of patients demanding medical services. This has resulted in a continuous demand of a large storage space. Unfortunately, healthcare domains still use local data centers for storing medical data and managing business processes. This has significant negative impacts on operating costs associated with licensing fees and maintenance. To overcome these challenges, healthcare organizations are interested in adopting cloud storage rather than on-premise hosted solutions. This is mainly justified by the scalability, cost savings and availability of cloud services. The primary objective of this model is to outsource data and delegate IT computations to an external party. The latter delivers needed storage systems via the Internet to fulfill client's demands. Even though this model provides significant cost advantages, using cloud storage raises security challenges. To this aim, this article describes several solutions which were proposed to ensure data protection. The existing implementations suffer from many limitations. The authors propose a framework to secure the storage of medical images over cloud computing. In this regard, they use multi-region segmentation and watermarking techniques to maintain both confidentiality and integrity. In addition, they rely on an ABAC model to ensure access control to cloud storage. This solution mainly includes four functions, i.e., (1) split data for privacy protection, (2) authentication for medical dataset accessing, (3) integrity checking, and (4) access control to enforce security measures. Hence, the proposal is an appropriate solution to meet privacy requirements.

Date: 2018
References: Add references at CitEc
Citations:

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 4018/JECO.2018010101 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jeco00:v:16:y:2018:i:1:p:1-16

Access Statistics for this article

Journal of Electronic Commerce in Organizations (JECO) is currently edited by Pedro Isaías

More articles in Journal of Electronic Commerce in Organizations (JECO) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2025-03-19
Handle: RePEc:igg:jeco00:v:16:y:2018:i:1:p:1-16