Commenced in January 2007
Paper Count: 30124
Use of Cloud Computing and Smart Devices in Healthcare
Abstract:Cloud computing can reduce the start-up expenses of implementing EHR (Electronic Health Records). However, many of the healthcare institutions are yet to implement cloud computing due to the associated privacy and security issues. In this paper, we analyze the challenges and opportunities of implementing cloud computing in healthcare. We also analyze data of over 5000 US hospitals that use Telemedicine applications. This analysis helps to understand the importance of smart phones over the desktop systems in different departments of the healthcare institutions. The wide usage of smartphones and cloud computing allows ubiquitous and affordable access to the health data by authorized persons, including patients and doctors. Cloud computing will prove to be beneficial to a majority of the departments in healthcare. Through this analysis, we attempt to understand the different healthcare departments that may benefit significantly from the implementation of cloud computing.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1338716Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2282
 T. Suzuki and M. Doi, "LifeMinder: an evidence-based wearable healthcare assistant," in CHI'01 Extended Abstracts on Human Factors in Computing Systems, 2001, pp. 127-128.
 C. S. Pattichis, E. Kyriacou, S. Voskarides, M. S. Pattichis, R. Istepanian, and C. N. Schizas, "Wireless telemedicine systems: an overview," Antennas and Propagation Magazine, IEEE, vol. 44, no. 2, pp. 143-153, 2002.
 C. Chatman, “How cloud computing is changing the face of health care information technology,” Journal of Health Care Compliance, vol. 12, no. 3, 2010, pp. 37–70.
 J. T. Dudley, Y. Pouliot, R. Chen, A. A. Morgan, and A. J. Butte, “Translational bioinformatics in the cloud: an affordable alternative,” Genome Medicine, vol. 2, no. 8, pp. 51, 2010.
 E. J. Schweitzer, “Reconciliation of the cloud-computing model with US federal electronic health record regulations,” Journal of American Medical Informatics Association, vol. 19, no. 2, pp. 161-165, 2011.
 J. Haughton, “Year of the underdog: Cloud-based EHRs,” Health Management Technology, vol. 32, no. 1, pp. 9, 2011.
 R. Zhang, and L. Liu “Security models and requirements for healthcare application clouds,” Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing, pp. 268-275, 2010.
 J. Kabachinski, “What's the forecast for cloud computing in healthcare,” Biomedical Instrumentation and Technology, vol. 45, no. 2, pp. 146–50, 2011.
 A. Rosenthal, P. Mork, and M. H. Li, J. Stanford, D. Koester, P. Reynolds, “Cloud computing: a new business paradigm for biomedical information sharing,” Journal of Biomedical Informatics, vol. 43, no. 2, pp. 342–353, 2010.
 P. Mell and T. Grance, “The NIST definition of cloud computing,” National Institute of Standards and Technology, vol. 53, no. 6, pp. 50, 2009.
 C. Gong, J. Liu, Q. Zhang, H. Chen, and Z. Gong, “The characteristics of cloud computing,” In Parallel Processing Workshops (ICPPW), 39th International Conference, pp. 275-279, 2010.
 A. M. H. Kuo, “Opportunities and challenges of cloud computing to improve health care services,” Journal of medical Internet research, vol. 13, no. 3, pp. e67, 2011.
 N. J. King, and V. T. Raja, “Protecting the privacy and security of sensitive customer data in the cloud,” Computer Law & Security Review, vol. 28, no.3, pp. 308-319, 2012.
 D. Catteddu, and G. Hogben, “An SME perspective on cloud computing. Cloud Computing–SME Survey,” ENISA report, 2009, Online: http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-sme-survey/at_download/fullReport.
 J. L. Fernández-Alemán, I. C. Señor, P. Á. O. Lozoya, and A. Toval, “Security and privacy in electronic health records: A systematic literature review,” Journal of Biomedical Informatics, vol. 46, no. 3, pp. 541-562, 2013.
 P. C. Kocher, “The SSL Protocol Version 3.0. Internet Draft,” Netscape Communications Corporation, USA, 1996.
 T. Dierks and C. Allen, “The TSL protocol,” Internet Draft, 1997.
 S. Spiekermann and L. F. Cranor, “Engineering privacy,” Software Engineering, IEEE Transactions, vol. 35, no. 1, pp. 67-82, 2009.
 Q. Ni, E. Bertino, J. Lobo, C. Brodie, C. M. Karat, J. Karat, and A. Trombeta, “Privacy-aware role-based access control,” ACM Transactions on Information and System Security (TISSEC), vol. 13, no. 3, pp. 24, 2010.
 J. J. Yang, J. Q. Li, and Y. Niu, “A hybrid solution for privacy preserving medical data sharing in the cloud environment,” Future Generation Computer Systems, vol. 43, pp. 74-86, 2015.
 The Dorenfest Institute for H.I.T Research and Education Database, HIMSS Foundation, Chicago, IL, 2011.
 U. Varshney, "Pervasive healthcare: applications, challenges and wireless solutions," Communications of the Association for Information Systems, vol. 16, no. 1, pp. 3, 2005.
 L. T. Kohn, J. M. Corrigan, and M. S. Donaldson, “To err is human: building a safer health system. A report of the Committee on Quality of Health Care in America, Institute of Medicine,” The National Academies Press, Washington D. C, USA, 2000.
 C. J. Fitch, “Information systems in healthcare: mind the gap,” Proceedings of the 37th Annual Hawaii International Conference, pp. 8, 2004.