Securing the E-Health Cloud

  • View
    2.337

  • Download
    4

Embed Size (px)

DESCRIPTION

 

Text of Securing the E-Health Cloud

  • 1. Securing the E-Health Cloud Hans Lhr, Ahmad-Reza Sadeghi, Marcel Winandy 1st ACM International Health Informatics Symposium (IHI 2010) Arlington,Virginia, USA, 11-12 November 2010Freitag, 12. November 2010
  • 2. Introduction Buzzwords of the year: E-Health Cloud ComputingFreitag, 12. November 2010
  • 3. Introduction Put together: E-Health CloudFreitag, 12. November 2010
  • 4. Introduction Put together: E-Health Cloud First idea: a paper with both buzzwords (cool!)Freitag, 12. November 2010
  • 5. Introduction Put together: E-Health Cloud First idea: a paper with both buzzwords (cool!) Seriously: What about security & privacy?Freitag, 12. November 2010
  • 6. Outline E-Health Cloud Models Security & Privacy Problem Areas Security Architecture for Privacy DomainsFreitag, 12. November 2010
  • 7. Simple E-Health CloudFreitag, 12. November 2010
  • 8. Simple E-Health Cloud Examples: ...Freitag, 12. November 2010
  • 9. Simple E-Health Cloud Examples: Patients need to manage complex access rights Patients dont understand security implications ... Privacy: server provider can gain access to data in PHRsFreitag, 12. November 2010
  • 10. Advanced E-Health CloudFreitag, 12. November 2010
  • 11. Advanced E-Health CloudFreitag, 12. November 2010
  • 12. Advanced E-Health CloudFreitag, 12. November 2010
  • 13. Advanced E-Health CloudFreitag, 12. November 2010
  • 14. Advanced E-Health CloudFreitag, 12. November 2010
  • 15. Advanced E-Health CloudFreitag, 12. November 2010
  • 16. Advanced E-Health CloudFreitag, 12. November 2010
  • 17. Advanced E-Health CloudFreitag, 12. November 2010
  • 18. Advanced E-Health Cloud Healthcare Telematics BoundaryFreitag, 12. November 2010
  • 19. Advanced E-Health Cloud Healthcare Telematics BoundaryFreitag, 12. November 2010
  • 20. Advanced E-Health Cloud Healthcare Telematics BoundaryFreitag, 12. November 2010
  • 21. Advanced E-Health Cloud Healthcare Telematics BoundaryFreitag, 12. November 2010
  • 22. Advanced E-Health Cloud Healthcare Telematics BoundaryFreitag, 12. November 2010
  • 23. Advanced E-Health Cloud Examples: Europe Healthcare - Germany, Austria, Netherlands, ... Telematics Boundary Asia - Taiwan, ...Freitag, 12. November 2010
  • 24. Advanced E-Health Cloud Examples: Europe Healthcare - Germany, Austria, Netherlands, ... Telematics Boundary Asia - Taiwan, ... Huh! Pretty complex. Must be secure, right?Freitag, 12. November 2010
  • 25. Security Problem Areas Data Storage and Processing Data centers: unauthorized information leakage Platform security: vulnerable to malware Mobile storage (USB memory sticks) Infrastructure Management Cryptographic keys, certicates Hardware / software components Usability and User Experience Smartcard PIN (when unconscious?) Time consumingFreitag, 12. November 2010
  • 26. Security Problem Areas Data Storage and Processing Data centers: unauthorized information leakage Platform security: vulnerable to malware Mobile storage (USB memory sticks) Infrastructure Management Cryptographic keys, certicates Hardware / software components Usability and User Experience Smartcard PIN (when unconscious?) Time consumingFreitag, 12. November 2010
  • 27. Platform Security (Server)Freitag, 12. November 2010
  • 28. Platform Security (Server)Freitag, 12. November 2010
  • 29. Platform Security (Server)Freitag, 12. November 2010
  • 30. Platform Security (Server)Freitag, 12. November 2010
  • 31. Platform Security (Server)Freitag, 12. November 2010
  • 32. Platform Security (Server)Freitag, 12. November 2010
  • 33. Platform Security (Client)Freitag, 12. Novembe