Cloud Computing is considered as the next logical step in emerging technology for prosperous resource outsourcing, information sharing in Physician-Patient relationship and a platform for research development. The fast drift of Ghana’s healthcare facilities into cloud computing for finding treatment to humanity’s major illnesses has called for a pragmatic understanding of its security deterrence techniques. Studies in cryptographic discipline of Ghana’s healthcare require a working understanding of the security issues by Healthcare Administrators. Healthcare data leaked outside to unauthorized users tarnishes the image of such individual, healthcare facility and the Ghanaian populace. This paradigm shift requires a strong and efficient security system among healthcare facilities to avoid the erosion of trust. Our review is motivated by these contemporary technologies to explore it adoptions, utilization and provision of security strategies in this innovation. Much emphasis were placed on network, interfaces, data, virtualization, legal, compliance and governance as key areas of security challenges in cloud computing. Relevant literatures were discussed to highlight their prominent findings. The contributions presented are relevant in providing a practical framework for enhancing security in other disciplines as well.
[1] Sultan, N. (2014). Making use of cloud computing for
healthcare provision: Opportunities and challenges.
International Journal of Information Management, 34(2),
177–184. https://doi.org/10.1016/j.ijinfomgt.2013.12.011
[2] Regalado, A. 2010, “Who coined the term ‘Cloud
Computing’?”, The Business Technology Forum,
http://www.thebusinesstechnologyforum.com/2011/10/whocoined-the-term-cloud-computing/ (Accessed on: 4
December, 2017).
[3] Isaac Akuamoah-Boateng Adueni, J. B. Hayfron-Acquah,
J. K. P. (2016). Developing a Common Cloud Platform to
Manage Ghana ’ s Healthcare System . Case Study of Ghana
Health Service ( GHS ). Journal of Communications
Technology, Electronics and Computer Science, Issue 4,
2016 ISSN 2457-905X, 4(4), 6–10.
[4] Al-Rashedi, A. A. (2014). E-Government Based on
Cloud Computing and Service- Oriented
Architecture. International Journal of Computer and
Electrical Engineering, 6(3), 201–206.
https://doi.org/10.7763/IJCEE.2014.V6.822
[5] Sultan, N. A. (2011). Reaching for the “cloud”: How
SMEs can manage. International Journal of Information
Management, 31(3), 272–278.
https://doi.org/10.1016/j.ijinfomgt.2010.08.001
[6] Basu, S., Andrews, J., Kishore, S., Panjabi, R., &
Stuckler, D. (2012). Comparative performance of private and
public healthcare systems in low- and middle-income
countries: A systematic review. PLoS Medicine, 9(6), 19.
https://doi.org/10.1371/journal.pmed.1001244
[7] Kruse, C. S., Smith, B., Vanderlinden, H., & Nealand, A.
(2017). Security Techniques for the Electronic Health
Records. https://doi.org/10.1007/s10916-017-0778-4
[8] Achampong, E. K. (2012). The State of Information and
Communication Technology and Health Informatics in
Ghana. Online Journal of Public Health Informatics, 4(2), 1–
13. https://doi.org/10.5210/ojphi.v4i2.4191
[9] Samaras, E. A., & Samaras, G. M. (2016). Confronting
systemic challenges in interoperable medical device safety,
security & usability. Journal of Biomedical Informatics, 63,
226–234. https://doi.org/10.1016/j.jbi.2016.08.024
[10] Ahuja, S. P., Mani, S., & Zambrano, J. (2012). A Survey
of the State of Cloud Computing in Healthcare. Network and
Communication Technologies, 1(2), 12–19.
https://doi.org/10.5539/nct.v1n2p12
[11] Bossert, T. J. (2002). Decentralization of health systems
in Ghana, Zambia, Uganda and the Philippines: a
comparative analysis of decision space. Health Policy and
Planning, 17(1), 14–31.
https://doi.org/10.1093/heapol/17.1.14
[12] Mell, P., & Grance, T. (2011). The NIST Definition of
Cloud Computing Recommendations of the National
Institute of Standards and Technology. National Institute of
Standards and Technology, Information Technology
Laboratory, 145, 7. https://doi.org/10.1136/emj.2010.096966
[13] Katz, R., Goldstein P. & Yanosky. R. 2010. “Cloud
Computing in Higher”.
http://net.educause.edu/section_params/conf/CCW10/highere
d.pdf.
[14] Habib, S. M., Hauke, S., Ries, S., & Mühlhäuser, M.
(2012). Trust as a facilitator in cloud computing: A survey.
Journal of Cloud Computing, 1(1), 1–18.
https://doi.org/10.1186/2192-113X-1-19
[15] Al-Ruithe, M., Benkhelifa, E., & Hameed, K. (2017).
Current State of Cloud Computing Adoption - An Empirical
Study in Major Public Sector Organizations of Saudi Arabia
(KSA). Procedia Computer Science, 110, 378–385.
https://doi.org/10.1016/j.procs.2017.06.080.
[16] Ramireddy, S., Raghu, T. S., Chakraborthy, R., & Rao,
H. R. (2010). Privacy and Security Practices in the Arena of
Cloud Computing.
[17] Kissi, J., Dai, B., Boamah, K. K. B., Owusu-Marfo, J.,
& Asare, I. (2018). Integrated Cloud Based Platform for Managıng Employees Pensıon Schemes; Case of
Ghana. Australian Journal of Economics and Management
Sciences, 8(1).
[18] West, B. C. (2014). Factors that Influence Application
Migration to Cloud Computing in Government
Organizations: a Conjoint Approach, 1–90. Retrieved from
http://scholarworks.gsu.edu/bus_admin_diss/40
[19] Amron, M. T., Ibrahim, R., & Chuprat, S. (2017). A
Review on Cloud Computing Acceptance Factors. Procedia
Computer Science, 124, 639–646.
https://doi.org/10.1016/j.procs.2017.12.200
[20] Abouelmehdi, K., Beni-hssane, A., Khaloufi, H., &
Nationale, E. (2017). ScienceDirect Big data security and
privacy in healthcare : A Review Big data security and
privacy in healthcare:Procedia Computer Science, 113, 73–
80. https://doi.org/10.1016/j.procs.2017.08.292.
[21] Sultan, N., & Sultan, Z. (2012). The application of
utility ICT in healthcare management and life science
research: A new market for a disruptive innovation. The
European Academy of Management Conference EURAM,
(JUNE 2012), 6–8.
[22] Marketing, C. (2011). Cloud Computing : Building a
New Foundation for Healthcare. White Paper, 12. Retrieved
from http://www-05.ibm.com/de/healthcare/literature/cloudnew-foundation-for-hv.pdf
[23] Yan, L., Rong, C., & Zhao, G. (2009). Strengthen Cloud
Computing Security with Federal Identity Management
Using Hierarchical Identity-Based. Cloud Computing, 5931,
167–177. https://doi.org/10.1007/978-3-642-10665-1_15
[24] Jain, P. (2012). Security Issues and their Solution in
Cloud Computing. International Journal of Computing &
Business Research ISSN (Online, 2229–6166.
[25] Chadwick, D. W., & Casenove, M. (2011). Security
APIs for my private cloud: Granting access to anyone, from
anywhere at any time. Proceedings - 2011 3rd IEEE
International Conference on Cloud Computing Technology
and Science, CloudCom 2011, 792–798.
https://doi.org/10.1109/CloudCom.2011.122
[26] Kabachinski, J. (2011). What’s the forecast for cloud
computing in healthcare? Biomedical Instrumentation and
Technology, 45(2), 146–150. https://doi.org/10.2345/0899-
8205-45.2.146
[27] Williams, S. O., Olatunji, O. M., & Olayinka, O. O.
(2014). Cloud Based Framework for Efficient Management
of Research Data, 1–6
[28] Cline, R. J., & Haynes, K. M. (2001). Consumer health
information seeking on the Internet: the state of the art.
Health Education Research, 16(6), 671–692.
https://doi.org/10.1093/her/16.6.671
[29] Kowal, P., Chatterji, S., Naidoo, N., Biritwum, R., Fan,
W., Ridaura, R. L., … Newell, M. L. (2012). Data resource
profile: The world health organization study on global ageing
and adult health (SAGE). International Journal of
Epidemiology, 41(6), 1639–1649.
https://doi.org/10.1093/ije/dys210
[30] Ghana Health Service 2016 Annual Report, (June,
2017).
[31] District Health Information Management System, 2018.
[32] Nyanator, F., Kutzin, J., & Nyonator, F. (1999). Health
for some? The effects of user fees in the Volta Region of
Ghana. Health Policy and Planning, 14(4), 329–341.
[33] Brandic, I., Dustdar, S., Anstett, T., Schumm, D.,
Leymann, F., & Konrad, R. (2010). Compliant Cloud
Computing (C3): Architecture and language support for userdriven compliance management in Clouds. Proceedings -
2010 IEEE 3rd International Conference on Cloud
Computing, CLOUD 2010, (i), 244–251.
https://doi.org/10.1109/CLOUD.2010.42
[34] Zissis, D., & Lekkas, D. (2012). Addressing cloud
computing security issues. Future Generation Computer
Systems, 28(3), 583–592.
https://doi.org/10.1016/j.future.2010.12.006
[35] Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L.
Lo. (2009). On technical security issues in cloud computing.
CLOUD 2009 - 2009 IEEE International Conference on
Cloud Computing, 109–116.
https://doi.org/10.1109/CLOUD.2009.60
[36] Gonzalez, N., Miers, C., Redigolo, F., Carvalho, T.,
Simplicio, M., Naslund, M., & Pourzandi, M. (2011). A
Quantitative Analysis of Current Security Concerns and
Solutions for Cloud Computing. 2011 IEEE Third
International Conference on Cloud Computing Technology
and Science,231–238.
https://doi.org/10.1109/CloudCom.2011.39.
[37] Jadeja, Y., & Modi, K. (2012). Cloud computing -
Concepts, architecture and challenges. 2012 International
Conference on Computing, Electronics and Electrical
Technologies, ICCEET 2012,877–880.
https://doi.org/10.1109/ICCEET.2012.6203873
[38] Han, Y. (2011). Cloud Computing: Case Studies and
Total Costs of Ownership. Information Technology &
Libraries, 30(December), 198–206. https://doi.org/Article
[39] Haufe, K., & Colomo-palacios, R. (2016). Security
Management Standards : A Mapping. Procedia - Procedia
Computer Science, 100(1877),755–761.
https://doi.org/10.1016/j.procs.2016.09.221
[40] Nicanfar, H., Liu, Q., TalebiFard, P., Cai, W., Leung,
V. C. M., Mello, F. L. De, Alliance, C. S. (2016). State-ofThe-Art of cloud computing cyber-security. Proceedings of
2015 IEEE World Conference on Complex Systems, WCCS 2015, 3(4),0–176.
https://doi.org/10.1109/ICoCS.2015.7483283
[41] Sadeghi, A. R., Schneider, T., & Winandy, M. (2010).
Token-based cloud computing: Secure outsourcing of data
and arbitrary computations with lower latency. Lecture Notes
in Computer Science (Including Subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics),
6101 LNCS, 417–429. https://doi.org/10.1007/978-3-642-
13869-0_30
[42] Pearson, S. (2009). Taking Account of Privacy when
Designing Cloud Computing Services 2 . Why is it important
to take privacy into. Challenges of Cloud Computing, 2009.
CLOUD’,44–52.
https://doi.org/10.1109/CLOUD.2009.5071532