IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Ensuring Security and Privacy in Cloud-Based Healthcare Information Systems Using Deep Learning Techniques

Ensuring Security and Privacy in Cloud-Based Healthcare Information Systems Using Deep Learning Techniques
View Sample PDF
Author(s): Shamneesh Sharma (upGrad Education Private Limited, India), Ajay Sharma (upGrad Education Private Limited, India)and Aman Kumar (upGrad Education Private Limited, India)
Copyright: 2024
Pages: 22
Source title: Green AI-Powered Intelligent Systems for Disease Prognosis
Source Author(s)/Editor(s): Ashish Khanna (Maharaja Agrasen Institute of Technology, India)and Saikat Gochhait (Symbiosis Institute of Digital and Telecom Management, Symbiosis International (Deemed), India & Samara State Medical University, Russia)
DOI: 10.4018/979-8-3693-1243-8.ch015

Purchase

View Ensuring Security and Privacy in Cloud-Based Healthcare Information Systems Using Deep Learning Techniques on the publisher's website for pricing and purchasing information.

Abstract

The cloud-based system is a technology that is currently in the development phase and allows e-health information systems to store and exchange medical records. Nevertheless, it also exhibits significant privacy and security vulnerabilities. Deep learning techniques have recently shown great promise to protect the privacy and anonymity of these infrastructures. This chapter summarizes recent research in the field. This chapter discusses various security attacks, including malware and ransomware, phishing and social engineering, man-in-the-middle attacks, and denial-of-service attacks, as well as studies demonstrating the potential of deep learning techniques for detecting and preventing these attacks. These studies also demonstrate the potential of deep learning methods for safeguarding the confidentiality of sensitive health information. Despite the encouraging results of these studies, additional work is necessary to perfect deep-learning techniques for cloud-based e-health system security.

Related Content

Mohammed Adi Al Battashi, Mohamad A. M. Adnan, Asyraf Isyraqi Bin Jamil, Majid Adi Al-Battashi. © 2026. 30 pages.
Potchong M. Jackaria, Al-adzran G. Sali, Hana An L. Alvarado, Rashidin H. Moh. Jiripa, Al-sabrie Y. Sahijuan. © 2026. 26 pages.
Elizabeth Gross. © 2026. 30 pages.
Siti Nazleen Abdul Rabu, Xie Fengli, Ng Man Yi. © 2026. 44 pages.
Mohammed Abdul Wajeed. © 2026. 30 pages.
Aldammien A. Sukarno, Al-adzkhan N. Abdulbarie, Wati Sheena M. Bulkia, Potchong M. Jackaria. © 2026. 24 pages.
Abdulla Sultan Binhareb Almheiri, Humaid Albastaki, Hanadi Alrashdan. © 2026. 26 pages.
Body Bottom