Show simple item record

dc.contributor.authorYeng, Prosper
dc.contributor.authorWolthusen, Stephen D.
dc.contributor.authorYang, Bian
dc.date.accessioned2021-01-19T13:44:56Z
dc.date.available2021-01-19T13:44:56Z
dc.date.created2021-01-18T15:59:14Z
dc.date.issued2020
dc.identifier.citationInternational Journal of Advanced Computer Science and Applications (IJACSA). 2020, 11 (11), 772-784.en_US
dc.identifier.issn2158-107X
dc.identifier.urihttps://hdl.handle.net/11250/2723718
dc.description.abstractHealthcare organizations consist of unique activities including collaborating on patients care and emergency care. The sector also accumulates high sensitive multifaceted patients’ data such as text reports, radiology images and pathological slides. The large volume of the data is often stored as Electronic Health Records (EHR) which must be frequently updated while ensuring higher percentage up-time for constant availability of patients’ records. Healthcare as a critical infrastructure also needs highly skilled IT personnel, Information and Communication Technol-ogy (ICT) and infrastructure with regular maintenance culture. Fortunately, cloud computing can provide these necessary services at a lower cost. But with all thees enormous benefits of cloud computing, it is characterized with various information security issues which is not enticing to healthcare. Amid many threat modelling methods, which of them is suitable for identifying cloud related threats towards the adoption of cloud computing for healthcare? This paper compared threat modelling methods to determine their suitability for identifying and managing healthcare related threats in cloud computing. Threat modelling in pervasive computing (TMP) was identified to be suitable and can be combined with Attack Tree (AT), Attack Graph (AG) and Practical Threat Analysis (PTA) or STRIDE (spoofing, tampering, repudiation, information disclosure, denial of service and elevation of privilege). Also Attack Tree (AT) could be complemented with TMP, AG and STRIDE or PTA. Healthcare IT security professionals can hence rely on these methods in their security practices, to identify cloud related threats for healthcare. Essentially, privacy related threat modeling methods such as LINDDUN framework, need to be included in these synergy of cloud related threat modelling methods towards enhancing security and privacy for healthcare needs.en_US
dc.language.isoengen_US
dc.publisherSAI, The Science and Information Organizationen_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleComparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practiceen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.source.pagenumber772-784en_US
dc.source.volume11en_US
dc.source.journalInternational Journal of Advanced Computer Science and Applications (IJACSA)en_US
dc.source.issue11en_US
dc.identifier.doi10.14569/IJACSA.2020.0111194
dc.identifier.cristin1873486
dc.description.localcodeCopyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.en_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Navngivelse 4.0 Internasjonal
Except where otherwise noted, this item's license is described as Navngivelse 4.0 Internasjonal