A fundamental step for the success of tapping health care into the cloud is the in-depth understanding and the effective enforcement of security and privacy in cloud computing .Despite the potential gains achieved from the cloud computing of e-health services, the information security is still questionable and the security problem becomes more complicated under the cloud model .Persicon Corporation, Friedrichstraße 100, 10117 Berlin, Germany Received 16 December 2013; Accepted 5 January 2014; Published 19 February 2014Academic Editors: R. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system.Tags: Essays On War In International LawWrite Conclusions Research PapersIndividual Sports And Team Sports EssayClinton Thesis WellsleyTechnical Support Business PlanJava Homework Solutions
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector.
In the last years, cloud computing is evolved from a marketing hype to a serious alternative to classical information computing  or even a long-held dream of computing as a utility [4, 10].
Some are already considering cloud computing as a paradigm change in information computing [3, 11].
Additionally the shared usage of computing resources by more than one customer is a basic element of cloud computing .