SlideShare uma empresa Scribd logo
1 de 57
Baixar para ler offline
Securing the E-Health Cloud


                        Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy




   1st ACM International Health Informatics Symposium (IHI 2010)
   Arlington,Virginia, USA, 11-12 November 2010
Freitag, 12. November 2010
Introduction
                        Buzzwords of the year:

                             E-Health


                             Cloud Computing




Freitag, 12. November 2010
Introduction
                        Put together: E-Health Cloud




Freitag, 12. November 2010
Introduction
                        Put together: E-Health Cloud




                 First idea: a paper with both buzzwords (cool!)




Freitag, 12. November 2010
Introduction
                        Put together: E-Health Cloud




                 First idea: a paper with both buzzwords (cool!)
                        Seriously: What about security & privacy?



Freitag, 12. November 2010
Outline
                    • E-Health Cloud Models
                    • Security & Privacy Problem Areas
                    • Security Architecture for Privacy Domains




Freitag, 12. November 2010
Simple E-Health Cloud




Freitag, 12. November 2010
Simple E-Health Cloud
                                        Examples:




                                          ...


Freitag, 12. November 2010
Simple E-Health Cloud
                                                                Examples:




                   • Patients need to manage complex access rights
                   • Patients don‘t understand security implications ...
                   • Privacy: server provider can gain access to data in PHRs




Freitag, 12. November 2010
Advanced E-Health Cloud




Freitag, 12. November 2010
Advanced E-Health Cloud




Freitag, 12. November 2010
Advanced E-Health Cloud




Freitag, 12. November 2010
Advanced E-Health Cloud




Freitag, 12. November 2010
Advanced E-Health Cloud




Freitag, 12. November 2010
Advanced E-Health Cloud




Freitag, 12. November 2010
Advanced E-Health Cloud




Freitag, 12. November 2010
Advanced E-Health Cloud




Freitag, 12. November 2010
Advanced E-Health Cloud




        Healthcare
        Telematics
        Boundary




Freitag, 12. November 2010
Advanced E-Health Cloud




        Healthcare
        Telematics
        Boundary




Freitag, 12. November 2010
Advanced E-Health Cloud




        Healthcare
        Telematics
        Boundary




Freitag, 12. November 2010
Advanced E-Health Cloud




        Healthcare
        Telematics
        Boundary




Freitag, 12. November 2010
Advanced E-Health Cloud




        Healthcare
        Telematics
        Boundary




Freitag, 12. November 2010
Advanced E-Health Cloud
                                 Examples:
                                 • Europe
     Healthcare
                                   - Germany, Austria,
                                     Netherlands, ...
     Telematics
     Boundary



                                 • Asia
                                   - Taiwan, ...




Freitag, 12. November 2010
Advanced E-Health Cloud
                                            Examples:
                                            • Europe
     Healthcare
                                              - Germany, Austria,
                                                Netherlands, ...
     Telematics
     Boundary



                                            • Asia
                                              - Taiwan, ...
                             Huh! Pretty complex.
                             Must be secure, right?



Freitag, 12. November 2010
Security Problem Areas
                    • Data Storage and Processing
                             • Data centers: unauthorized information leakage
                             • Platform security: vulnerable to malware
                             • Mobile storage (USB memory sticks)
                    •         Infrastructure Management
                             • Cryptographic keys, certificates
                             • Hardware / software components
                    •         Usability and User Experience
                             • Smartcard PIN (when unconscious?)
                             • Time consuming
Freitag, 12. November 2010
Security Problem Areas
                    • Data Storage and Processing
                             • Data centers: unauthorized information leakage
                             • Platform security: vulnerable to malware
                             • Mobile storage (USB memory sticks)
                    •         Infrastructure Management
                             • Cryptographic keys, certificates
                             • Hardware / software components
                    •         Usability and User Experience
                             • Smartcard PIN (when unconscious?)
                             • Time consuming
Freitag, 12. November 2010
Platform Security (Server)




Freitag, 12. November 2010
Platform Security (Server)




Freitag, 12. November 2010
Platform Security (Server)




Freitag, 12. November 2010
Platform Security (Server)




Freitag, 12. November 2010
Platform Security (Server)




Freitag, 12. November 2010
Platform Security (Server)




Freitag, 12. November 2010
Platform Security (Client)




Freitag, 12. November 2010
Platform Security (Client)




Freitag, 12. November 2010
Platform Security (Client)




Freitag, 12. November 2010
Platform Security (Client)




Freitag, 12. November 2010
Platform Security (Client)




Freitag, 12. November 2010
Platform Security (Client)




Freitag, 12. November 2010
Privacy Domains




Freitag, 12. November 2010
Privacy Domains




Freitag, 12. November 2010
Privacy Domains




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains


     Trusted
     Virtual
     Domain




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains


     Trusted
     Virtual
     Domain




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains


     Trusted
     Virtual
     Domain




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains


     Trusted
     Virtual
     Domain




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains


     Trusted
     Virtual
     Domain




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains


     Trusted
     Virtual
     Domain




     Security
      Kernel



Freitag, 12. November 2010
Technology:
                  Trusted Virtual Domains (TVDs)
                TVD = coalition of virtual machines
                • Isolated compartments
                • Trust relationships
                • Transparent policy enforcement
                • Secure communication
                • Clienton modern security security functionality)
                  (based
                         platform
                                   hardware


Freitag, 12. November 2010
Software Architecture
                                                                                                                      /<%*45%=+5*?
                                                                                                                      0<5*%<*5-;++*44


                                                                                                                          6123=8-)*%:*%
                                    !"#$                                             !"#12345*%-"#$
                                                                                     011#23+435&-./       617*3859-
                                                                                                          )*%:*%
                                     )*+,%*-./0

                                                                                                                         A*B4*%:*%
                  066*41)+4#3       9(::$#;7($<      011#23+435                      ;++&,<5=<>
                  "#$!6$#1(77435    %&=)4*&>*4(3+    )3?!!:4**435!                   )*%:*%
                  %'87                               7#"+;)$(
                                                     @(A5A<!B.&
  !"#$%&'(!"#$                                       C)"(3(+         !"#$%&'(!"#$!
                                                     )66*41)+4#3D    011#23+435&!
  %&'()*+,&-./
                                                                     -./


                                   )*+,%=5(-C*%<*8                                            !"#12345*%-"#$
                                                                                              %&'()*+,&-./

                                                              !%,45*?
                                     73%?@3%*                 73%?@3%*




Freitag, 12. November 2010
User Interface




Freitag, 12. November 2010
Conclusion
                    •        E-Health Clouds: big security & privacy challenges!
                    •        TVDs can solve unaddressed issues:
                             •   Establish privacy domains
                             •   Extend security to end user platforms

                    •        Ongoing projects: study usability & deploy technology




Freitag, 12. November 2010
Conclusion
                    •        E-Health Clouds: big security & privacy challenges!
                    •        TVDs can solve unaddressed issues:
                             •   Establish privacy domains
                             •   Extend security to end user platforms

                    •        Ongoing projects: study usability & deploy technology


                                                                             (EU FP7 funded)




                                                                MediTrust   (National German)



Freitag, 12. November 2010
Questions?

                                     Contact:
                                 Marcel Winandy
                               Ruhr-University Bochum
                             marcel.winandy@trust.rub.de
                               http://www.trust.rub.de




Freitag, 12. November 2010

Mais conteúdo relacionado

Semelhante a Securing the E-Health Cloud

HEUGCloud services the democratization of it (heug)
HEUGCloud services the democratization of it (heug)HEUGCloud services the democratization of it (heug)
HEUGCloud services the democratization of it (heug)
Leo Plugge
 
20100602 porticor at igt short
20100602 porticor at igt   short20100602 porticor at igt   short
20100602 porticor at igt short
giladpn
 
Ruby conf2010 OpenPaaS
Ruby conf2010 OpenPaaSRuby conf2010 OpenPaaS
Ruby conf2010 OpenPaaS
Derek Collison
 
Crypto Hot Cases – One Year Backward
Crypto Hot Cases – One Year BackwardCrypto Hot Cases – One Year Backward
Crypto Hot Cases – One Year Backward
Positive Hack Days
 
Anil saldhana identitycloud
Anil saldhana identitycloudAnil saldhana identitycloud
Anil saldhana identitycloud
Anil Saldanha
 

Semelhante a Securing the E-Health Cloud (20)

ICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologieICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologie
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdinger
 
Scientific Applications with Python
Scientific Applications with PythonScientific Applications with Python
Scientific Applications with Python
 
Cloud computing and mobile rit
Cloud computing and mobile   ritCloud computing and mobile   rit
Cloud computing and mobile rit
 
HEUGCloud services the democratization of it (heug)
HEUGCloud services the democratization of it (heug)HEUGCloud services the democratization of it (heug)
HEUGCloud services the democratization of it (heug)
 
from Realtime Operating systems to unlocking iPhones in less than 30 slides
from Realtime Operating systems to unlocking iPhones in less than 30 slidesfrom Realtime Operating systems to unlocking iPhones in less than 30 slides
from Realtime Operating systems to unlocking iPhones in less than 30 slides
 
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
 
How To Develop Secure Software
How To Develop Secure SoftwareHow To Develop Secure Software
How To Develop Secure Software
 
20100602 porticor at igt short
20100602 porticor at igt   short20100602 porticor at igt   short
20100602 porticor at igt short
 
Ruby conf2010 OpenPaaS
Ruby conf2010 OpenPaaSRuby conf2010 OpenPaaS
Ruby conf2010 OpenPaaS
 
Building Services for New UN WFP Office
Building Services for New UN WFP OfficeBuilding Services for New UN WFP Office
Building Services for New UN WFP Office
 
Cloud Security - A Visibility Challenge
Cloud Security - A Visibility ChallengeCloud Security - A Visibility Challenge
Cloud Security - A Visibility Challenge
 
Scaling the Cloud - Cloud Security
Scaling the Cloud - Cloud SecurityScaling the Cloud - Cloud Security
Scaling the Cloud - Cloud Security
 
Crypto Hot Cases – One Year Backward
Crypto Hot Cases – One Year BackwardCrypto Hot Cases – One Year Backward
Crypto Hot Cases – One Year Backward
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
 
HOW TO DO AI IN 2013 from Roadmap 2012
HOW TO DO AI IN 2013 from Roadmap 2012HOW TO DO AI IN 2013 from Roadmap 2012
HOW TO DO AI IN 2013 from Roadmap 2012
 
Anil saldhana identitycloud
Anil saldhana identitycloudAnil saldhana identitycloud
Anil saldhana identitycloud
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Identity theft in the Cloud and remedies
Identity theft in the Cloud and remediesIdentity theft in the Cloud and remedies
Identity theft in the Cloud and remedies
 

Mais de Marcel Winandy

Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
Marcel Winandy
 
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One DeviceUni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
Marcel Winandy
 
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
Marcel Winandy
 
A Note on the Security in the Card Management System of the German E-Health Card
A Note on the Security in the Card Management System of the German E-Health CardA Note on the Security in the Card Management System of the German E-Health Card
A Note on the Security in the Card Management System of the German E-Health Card
Marcel Winandy
 
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop EnvironmentsTrusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments
Marcel Winandy
 
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer SystemsPatterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems
Marcel Winandy
 
A Pattern for Secure Graphical User Interface Systems
A Pattern for Secure Graphical User Interface SystemsA Pattern for Secure Graphical User Interface Systems
A Pattern for Secure Graphical User Interface Systems
Marcel Winandy
 
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
TruWallet: Trustworthy and Migratable Wallet-Based Web AuthenticationTruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
Marcel Winandy
 
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
Marcel Winandy
 
Modeling Trusted Computing Support in a Protection Profile for High Assurance...
Modeling Trusted Computing Support in a Protection Profile for High Assurance...Modeling Trusted Computing Support in a Protection Profile for High Assurance...
Modeling Trusted Computing Support in a Protection Profile for High Assurance...
Marcel Winandy
 

Mais de Marcel Winandy (13)

Security Patterns - An Introduction
Security Patterns - An IntroductionSecurity Patterns - An Introduction
Security Patterns - An Introduction
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
 
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One DeviceUni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
 
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
 
A Note on the Security in the Card Management System of the German E-Health Card
A Note on the Security in the Card Management System of the German E-Health CardA Note on the Security in the Card Management System of the German E-Health Card
A Note on the Security in the Card Management System of the German E-Health Card
 
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop EnvironmentsTrusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments
 
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer SystemsPatterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems
 
A Pattern for Secure Graphical User Interface Systems
A Pattern for Secure Graphical User Interface SystemsA Pattern for Secure Graphical User Interface Systems
A Pattern for Secure Graphical User Interface Systems
 
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
TruWallet: Trustworthy and Migratable Wallet-Based Web AuthenticationTruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
 
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
 
Modeling Trusted Computing Support in a Protection Profile for High Assurance...
Modeling Trusted Computing Support in a Protection Profile for High Assurance...Modeling Trusted Computing Support in a Protection Profile for High Assurance...
Modeling Trusted Computing Support in a Protection Profile for High Assurance...
 
Property-Based TPM Virtualization
Property-Based TPM VirtualizationProperty-Based TPM Virtualization
Property-Based TPM Virtualization
 
Compartmented Security for Browsers
Compartmented Security for BrowsersCompartmented Security for Browsers
Compartmented Security for Browsers
 

Último

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Securing the E-Health Cloud