IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Home Healthcare in Cloud Computing

Home Healthcare in Cloud Computing
View Sample PDF
Author(s): Mina Deng (Philips Research Europe, The Netherlands), Milan Petkovic (Philips Research Europe, The Netherlands), Marco Nalin (Scientific Institute Hospital San Raffaele, Italy)and Ilaria Baroni (Scientific Institute Hospital San Raffaele, Italy)
Copyright: 2013
Pages: 21
Source title: Handbook of Research on ICTs and Management Systems for Improving Efficiency in Healthcare and Social Care
Source Author(s)/Editor(s): Maria Manuela Cruz-Cunha (Polytechnic Institute of Cavado and Ave, Portugal), Isabel Maria Miranda (Municipality of Guimarães, Portugal)and Patricia Gonçalves (School of Technology at the Polytechnic Institute of Cavado and Ave, Portugal)
DOI: 10.4018/978-1-4666-3990-4.ch032

Purchase

View Home Healthcare in Cloud Computing on the publisher's website for pricing and purchasing information.

Abstract

Cloud computing is one of the emerging technologies that has an increasing impact on both private and public sectors. It represents an on-demand service model for delivering computing resources ranging from storage and data access, via computation and software provisioning. This chapter describes an application of Cloud Computing in home healthcare by introducing several use cases and application architecture based on the cloud. A comprehensive methodology is used to integrate security and privacy engineering process into the development lifecycle and to identify challenges for building security and privacy in the proposed cloud-based home healthcare system. Moreover, a functional infrastructure plan is provided to demonstrate the integration between the proposed application architecture with the cloud infrastructure. Finally, this chapter discusses several mitigation techniques putting the focus on patient-centric control and policy enforcement via cryptographic technologies, and consequently on digital rights management and attribute-based encryption technologies.

Related Content

. © 2024. 27 pages.
. © 2024. 10 pages.
. © 2024. 13 pages.
. © 2024. 6 pages.
. © 2024. 23 pages.
. © 2024. 14 pages.
. © 2024. 7 pages.
Body Bottom