Nature of Computation and Communication. International Conference, ICTCC 2014, Ho Chi Minh City, Vietnam, November 24-25, 2014, Revised Selected Papers

Research Article

Security Aspects of Cloud Based Mobile Health Care Application

Download
239 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-15392-6_20,
        author={Richard Cimler and Jan Matyska and Ladislav Balik and Josef Horalek and Vladimir Sobeslav},
        title={Security Aspects of Cloud Based Mobile Health Care Application},
        proceedings={Nature of Computation and Communication. International Conference, ICTCC 2014, Ho Chi Minh City, Vietnam, November 24-25, 2014, Revised Selected Papers},
        proceedings_a={ICTCC},
        year={2015},
        month={2},
        keywords={Cloud computing Security Mobile application Health care},
        doi={10.1007/978-3-319-15392-6_20}
    }
    
  • Richard Cimler
    Jan Matyska
    Ladislav Balik
    Josef Horalek
    Vladimir Sobeslav
    Year: 2015
    Security Aspects of Cloud Based Mobile Health Care Application
    ICTCC
    ICST
    DOI: 10.1007/978-3-319-15392-6_20
Richard Cimler1,*, Jan Matyska1,*, Ladislav Balik1,*, Josef Horalek1,*, Vladimir Sobeslav1,*
  • 1: University of Hradec Kralove
*Contact email: richard.cimler@uhk.cz, jan.matyska@uhk.cz, ladislav.balik@uhk.cz, josef.horalek@uhk.cz, vladimir.sobeslav@uhk.cz

Abstract

As mobile computing has become very common, a new vulnerabilities and security threads appeared. Cloud computing is a new distribution model of services for various technologies and solutions including the mobile applications. Mobile cloud computing benefits from the interconnection of these two areas. This approach brings many assets, but on the other hand, also the security risks and potential problems. This paper discuss ecurity aspects of mobile cloud computing with a focus on the developed health care mobile application using cloud computation services. Personal data about health of the person are one of the most confidential thus need to be secured against different types of threats. Proposed solution is based on the smartphone as a client gathering data and the cloud servers as a computational platform for data storage and analysing.