Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is ac...

Full description

Bibliographic Details
Main Authors: Mohammad Hossein Ronaghi, Foroughosadat Hosseini
Format: Article
Language:fas
Published: Tehran University of Medical Sciences 2020-03-01
Series:پیاورد سلامت
Subjects:
Online Access:http://payavard.tums.ac.ir/article-1-6929-en.html
id doaj-c335d24907b042c5ab7153596417293c
record_format Article
spelling doaj-c335d24907b042c5ab7153596417293c2021-10-02T17:30:04ZfasTehran University of Medical Sciencesپیاورد سلامت1735-81322008-26652020-03-01141110Security Challenges in Fog Computing in HealthcareMohammad Hossein Ronaghi0Foroughosadat Hosseini1 Assistant Professor, Department of Management, Faculty of Economics, Management and Social Sciences, Shiraz University, Shiraz, Iran Master of Science in Computer Engineering, Faculty of Electrical & Computer Engineering, Islamic Azad University, Zanjan Branch, Zanjan, Iran Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and open structure makes it vulnerable and weak to security threats. Therefore, the aim of this paper was to identify the security challenges in healthcare. Materials and Methods: This applied research has been done in three phases using mixed-method approach in 2019. In the first phase, security codes from library resources by content analysis was identified. In the second phase interpretation of experts by Delphi method, Panel of IT experts consists of twelve members who work on healthcare sector was evaluated. Finally, we used Analytic Hierarchy Process method for ranking security codes. Results: According to fuzzy AHP results attacks(0.31), secure communications(0.23), authentication and access control(0.19), trust(0.15) and privacy preservation(0.12) are the most important criteria in security challenges of fog computing. Conclusion: According to the results of this study, secure communications and network attacks are the major challenges in fog computing, because fog nodes are usually deployed in some places with relatively weak protection. They may encounter various malicious attacks. As a result, policymakers should be aware of the role of secure communications and network attacks in fog computing implementation.http://payavard.tums.ac.ir/article-1-6929-en.htmlcloud computingcomputer securitydelphi techniquehealthcare sector
collection DOAJ
language fas
format Article
sources DOAJ
author Mohammad Hossein Ronaghi
Foroughosadat Hosseini
spellingShingle Mohammad Hossein Ronaghi
Foroughosadat Hosseini
Security Challenges in Fog Computing in Healthcare
پیاورد سلامت
cloud computing
computer security
delphi technique
healthcare sector
author_facet Mohammad Hossein Ronaghi
Foroughosadat Hosseini
author_sort Mohammad Hossein Ronaghi
title Security Challenges in Fog Computing in Healthcare
title_short Security Challenges in Fog Computing in Healthcare
title_full Security Challenges in Fog Computing in Healthcare
title_fullStr Security Challenges in Fog Computing in Healthcare
title_full_unstemmed Security Challenges in Fog Computing in Healthcare
title_sort security challenges in fog computing in healthcare
publisher Tehran University of Medical Sciences
series پیاورد سلامت
issn 1735-8132
2008-2665
publishDate 2020-03-01
description Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and open structure makes it vulnerable and weak to security threats. Therefore, the aim of this paper was to identify the security challenges in healthcare. Materials and Methods: This applied research has been done in three phases using mixed-method approach in 2019. In the first phase, security codes from library resources by content analysis was identified. In the second phase interpretation of experts by Delphi method, Panel of IT experts consists of twelve members who work on healthcare sector was evaluated. Finally, we used Analytic Hierarchy Process method for ranking security codes. Results: According to fuzzy AHP results attacks(0.31), secure communications(0.23), authentication and access control(0.19), trust(0.15) and privacy preservation(0.12) are the most important criteria in security challenges of fog computing. Conclusion: According to the results of this study, secure communications and network attacks are the major challenges in fog computing, because fog nodes are usually deployed in some places with relatively weak protection. They may encounter various malicious attacks. As a result, policymakers should be aware of the role of secure communications and network attacks in fog computing implementation.
topic cloud computing
computer security
delphi technique
healthcare sector
url http://payavard.tums.ac.ir/article-1-6929-en.html
work_keys_str_mv AT mohammadhosseinronaghi securitychallengesinfogcomputinginhealthcare
AT foroughosadathosseini securitychallengesinfogcomputinginhealthcare
_version_ 1716851360127778816