Javascript must be enabled to continue!
Simulating Cloud Environment for HIS Backup using Secret Sharing
View through CrossRef
In the face of a disaster hospitals are expected to be able to continue providing efficient and high-quality care to patients. It is therefore crucial for hospitals to develop business continuity plans (BCPs) that identify their vulnerabilities, and prepare procedures to overcome them. A key aspect of most hospitals' BCPs is creating the backup of the hospital information system (HIS) data at multiple remote sites. However, the need to keep the data confidential dramatically increases the costs of making such backups. Secret sharing is a method to split an original secret message so that individual pieces are meaningless, but putting sufficient number of pieces together reveals the original message. It allows creation of pseudo-redundant arrays of independent disks for privacy-sensitive data over the Internet. We developed a secret sharing environment for StarBED, a large-scale network experiment environment, and evaluated its potential and performance during disaster recovery. Simulation results showed that the entire main HIS database of Kyoto University Hospital could be retrieved within three days even if one of the distributed storage systems crashed during a disaster.
Title: Simulating Cloud Environment for HIS Backup using Secret Sharing
Description:
In the face of a disaster hospitals are expected to be able to continue providing efficient and high-quality care to patients.
It is therefore crucial for hospitals to develop business continuity plans (BCPs) that identify their vulnerabilities, and prepare procedures to overcome them.
A key aspect of most hospitals' BCPs is creating the backup of the hospital information system (HIS) data at multiple remote sites.
However, the need to keep the data confidential dramatically increases the costs of making such backups.
Secret sharing is a method to split an original secret message so that individual pieces are meaningless, but putting sufficient number of pieces together reveals the original message.
It allows creation of pseudo-redundant arrays of independent disks for privacy-sensitive data over the Internet.
We developed a secret sharing environment for StarBED, a large-scale network experiment environment, and evaluated its potential and performance during disaster recovery.
Simulation results showed that the entire main HIS database of Kyoto University Hospital could be retrieved within three days even if one of the distributed storage systems crashed during a disaster.
Related Results
Hybrid Cloud Scheduling Method for Cloud Bursting
Hybrid Cloud Scheduling Method for Cloud Bursting
In the paper, we consider the hybrid cloud model used for cloud bursting, when the computational capacity of the private cloud provider is insufficient to deal with the peak number...
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategi...
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
Cloud computing is the delivery of computing services, such as storage, processing power, and software applications, via the internet. Cloud computing offers various advantages and...
Developing a Cloud Computing Framework for University Libraries
Developing a Cloud Computing Framework for University Libraries
Our understanding of the library context on security challenges on storing research output on the cloud is inadequate and incomplete. Existing research has mostly focused on profit...
Verifiable secret sharing based on the Chinese remainder theorem
Verifiable secret sharing based on the Chinese remainder theorem
ABSTRACTA (t,n) secret sharing scheme (SS) enables a dealer to divide a secret into n shares in such a way that (i) the secret can be recovered successfully with t or more than t s...
Decoding the Cloud Giants: A Comparison of AWS, Azure and GCP
Decoding the Cloud Giants: A Comparison of AWS, Azure and GCP
The adoption of cloud services by companies and organizations is increasingly becoming essential for enhancing competitive performance in today's business environment. Cloud servic...
Energy‐aware cross‐layer resource allocation in mobile cloud
Energy‐aware cross‐layer resource allocation in mobile cloud
SummaryThis paper proposed an energy‐aware cross‐layer mobile cloud resource allocation approach. In this paper, a hybrid cloud architecture is adopted for provisioning mobile serv...
Organization of SIP mechanisms among basic cloud types
Organization of SIP mechanisms among basic cloud types
 Clouds are a fundamental aspect of the Earth’s atmosphere. One of the major challenges in cloud-resolving models (CRM) is the formation and generation of new cl...

