Advantages and Drawbacks of Developing Mobile Health Technologies in the Cloud
|
|
|
- Barbara McKinney
- 10 years ago
- Views:
Transcription
1 Advantages and Drawbacks of Developing Mobile Health Technologies in the Cloud Nima Kaviani Director of Technology Curatio Networks Inc.
2 Mobile Health in the Cloud Cloud Computing HealthCare in North America, a $6.5 Billion Market by 2018 [1] General acceptance by the community Adaptation to changes in market dynamics [1] Markets-And-Markets Survey: Reports/north-america-healthcare-cloud-computing-market html 2
3 Mobile Health in the Cloud Cloud + Mobile + Health 3
4 Mobile Health in the Cloud Cloud + Mobile + Health Cloud Scalability Affordability 4
5 Mobile Health in the Cloud Cloud + Mobile + Health Cloud Scalability Affordability Mobile Personalization Accessibility 5
6 Mobile Health in the Cloud Cloud + Mobile + Health Cloud Scalability Affordability Mobile Personalization Accessibility Health Personal Info. Privacy Regulations US: Health Insurance Portability and Accountability Act (HIPAA) Canada: The Personal Information Protection and Electronic Documents Act (PIPEDA) European Union: Data Protection Directive 6
7 Mobile Health Requirements Preserve Privacy for Patient Information Security (Data Encryption) Transparency Auditability Privacy of Data 7
8 Privacy of Data Requirements Data is not stored out of the country (Japan s Privacy Directive) Where to keep the data Where to backup the data Data does not leave the country (Canada s Privacy Directive) How does the data flow? How to track the data? 8
9 How to deal with Personal Data? Assume you are a Canadian Company 9
10 Where to Store the Data? Trying to use Amazon Data Centers 10
11 Where to Store the Data? Trying to use Rackspace Data Centers 11
12 Where to Store the Data? Using Local Data Centers Issues: Cost Not a real cloud Potential data leak 12
13 Where to Store the Data? Hybrid Cloud + Application Partitioning Optimization for Deployment Premise (Canadian DC) US Cloud (e.g., Amazon or Rackspace) 13
14 Example Cross-tier Request Flow Pull up user information and Stock holdings for a given user id Request Query App Tier function function function function Data Tier DB Table(a) a h p DB Table(p) DB Table(h) 14
15 Example Cross-tier Request Flow Pull up user information and Stock holdings for a given user id Request Query App Tier function function function function Data Tier DB Table(a) a h p DB Table(p) DB Table(h) 15
16 Application Partitioning (Cross-Tier) Code Profiling EXPLAIN PLAN Join Orders Application-Tier BIP Create Objective Function Create Constraints Combined Partitioning Solver Code Placement Table Placement 16
17 Cost Modeling Execution Time: Communication Time: 17
18 Cost Modeling Execution Cost: Communication Cost: 18
19 Application Partitioning Benefits Up to 54% improvement in Cost Up to 56% improvement in Performance Drawbacks Does not guarantee privacy of data flow Impossible without proper automation 19
20 Analyzing Data Flow Combining Application Partitioning with Data Flow Analysis Which software elements deal with security-sensitive data Constrain security-sensitive software elements to be on private infrastructure Push everything else to the cloud 20
21 Analyzing Data Flow Homomorphic Encryption: Encrypt the information on the private premise Let the cloud operate on encrypted data Let the data flow anywhere 21
22 Conclusion Concerns: Preserving Data Privacy in the Cloud is Challenging Many companies switch back to a traditional data center model of deployment Improvements: Regulations are becoming easier to adopt Cloud technologies are becoming easier to integrate into traditional data centers. 22
23 Publications Cross-Tier Application & Data Partitioning of Web Applications for Hybrid Cloud Deployment. Nima Kaviani, Eric Wohlstadter, Rodger Lea. In Proceedings of Usenix International Middleware Conference 2013, December 2013, Beijing, China. MANTICORE: a Framework for Partitioning Software Services for Hybrid Cloud. Nima Kaviani, Eric Wohlstadter, Rodger Lea. In Proceedings of the 4th IEEE International Conference on Cloud Computing Technologies and Science, December 2012, Taipei, Taiwan, pages Profiling-as-a-Service: Adaptive Scalable Resource Profiling for the Cloud in the Cloud. Nima Kaviani, Eric Wohlstadter, Rodger Lea. In Proceedings of the 9th International Conference on Service Oriented Computing, Paphos, Cyprus, 2011, pp
24 QUESTIONS? WE ARE HIRING 24
Partitioning of web applications for hybrid cloud deployment
Kaviani et al. Journal of Internet Services and Applications (2014) 5:14 DOI 10.1186/s13174-014-0014-0 RESEARCH Open Access Partitioning of web applications for hybrid cloud deployment Nima Kaviani, Eric
NCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
On Premise Vs Cloud: Selection Approach & Implementation Strategies
On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile
Global Cloud Storage Market. More Info: [email protected]. Contact: 080-61341600/500 Visit: www.researchfox.com. saran@researchfox.
Global Cloud Storage Market Technology, Education, Training and Infrastructure are key areas which are rapidly developing in emerging Tier II and Tier III cities across the Globe. For IT and ITeS industries,
Cloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station
Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station What is Cloud Computing? http://www.agent-x.com.au/ Wikipedia - the use of computing resources (hardware and software)
Session 5. Mixing and matching Public, Private and Hybrid Clouds for maximum benefits
Session 5. Mixing and matching Public, Private and Hybrid Clouds for maximum benefits Best of both/ Best of all regarding specific needs, based on the use of resources Hybrid cloud is simply a mix of private
SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE
SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE 1 PARISHA TYAGI, 2 VIRENDRA KUMAR 1Department of Information Technology, Suresh Gyan Vihar University, Rajasthan, India 2 Department of
Intermedia s Dedicated Exchange
Intermedia s Dedicated Exchange This is a practical guide to implementing Intermedia s Dedicated Hosted Exchange on AWS. Intermedia, the world s independent provider of Hosted Exchange, and AWS, the leading
Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter
Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute
Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit [email protected]
Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit [email protected] 2 If cloud computing is so simple, then what s the big deal? What is the
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Grid-Interop 2012
Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Why the interest in Clouds? A method to avoid/defer CAPEX/OPEX and possibly accelerating implementation 2 It all started here - Timeshare Computers and
Investigation of Cloud Computing: Applications and Challenges
Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,
Taking a Data-Centric Approach to Security in the Cloud
Taking a Data-Centric Approach to Security in the Cloud Bob West Chief Trust Officer CipherCloud 2014 CipherCloud All rights reserved 1 Taking a Data-Centric Approach to Cloud Data Protection Bob West
SECURE BACKUP SYSTEM DESKTOP AND MOBILE-PHONE SECURE BACKUP SYSTEM HOSTED ON A STORAGE CLOUD
SECURE BACKUP SYSTEM DESKTOP AND MOBILE-PHONE SECURE BACKUP SYSTEM HOSTED ON A STORAGE CLOUD The Project Team AGENDA Introduction to cloud storage. Traditional backup solutions problems. Objectives of
HEALTHCARE IN THE CLOUD
HEALTHCARE IN THE CLOUD SPI Innovations offers cloud computing services to healthcare providers in hopes of providing a breadth of solutions, including increased security, accessibility and productivity.
Deploying Your Application On Public Cloud
#GHC14 Deploying Your Application On Public Cloud Egle Sigler @eglute Iccha Sethi @IcchaSethi October 9, Egle Sigler Principal Architect at Rackspace Works with OpenStack POWER: Professional Organization
Oracle Cloud Update November 2, 2015. Eric Frank Oracle Sales Consultant. Copyright 2014 Oracle and/or its affiliates. All rights reserved.
Oracle Cloud Update November 2, 2015 Eric Frank Oracle Sales Consultant Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
FTP-Stream Data Sheet
FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Private Vs Public Cloud
Private Vs Public Cloud Solanke Vikas 1, Kulkarni Gurudatt 2, Maske Vishnu 3, Kumbharkar Prashant 4 1 Lecturer in Information Technology Department,MM Polytechnic Pune, India [email protected]
With Eversync s cloud data tiering, the customer can tier data protection as follows:
APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software
Customer Security Issues in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
Horizontal IoT Application Development using Semantic Web Technologies
Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: [email protected] Roadmap Introduction Challenges
ON THE ROAD TO OPEN HYBRID CLOUD BRYAN CHE GENERAL MANAGER, CLOUD BU, RED HAT
ON THE ROAD TO HYBRID CLOUD BRYAN CHE GENERAL MANAGER, CLOUD BU, RED HAT BUSINESS DEMANDS DRIVE I.T TRANSFORMATION Business wants agility, lower cost, new capabilities IT struggling with existing legacy
5-Layered Architecture of Cloud Database Management System
Available online at www.sciencedirect.com ScienceDirect AASRI Procedia 5 (2013 ) 194 199 2013 AASRI Conference on Parallel and Distributed Computing and Systems 5-Layered Architecture of Cloud Database
Cloud Computing Security Issues
Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, [email protected] Something Old, Something New New: Cloud describes the use of a collection of services, applications,
WHITE PAPER USING ONLINE BACKUP AS A GATEWAY TO CLOUD SERVICES
USING ONLINE BACKUP AS A GATEWAY TO CLOUD SERVICES See how offering cloud and hybrid backup solutions drives business and leads customers to adopt other cloud services. If you re an IT provider, you know
Cloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
Ironside Group Rational Solutions
Ironside Group Rational Solutions IBM Cloud Orchestrator Accelerate the pace of your business innovation Richard Thomas IBM Cloud Management Platforms [email protected] IBM Cloud Orchestrator Business
Addressing Information Protection, Privacy & Sovereignty Concerns in Cloud Applications
Addressing Information Protection, Privacy & Sovereignty Concerns in Cloud Applications Varun Badhwar Co-Founder; VP of Products & Solution Engineering 1 2013 CipherCloud All rights reserved. Agenda Introduction
Sendmail and PostX: Simplifying HIPAA Email Compliance. Providing healthcare organizations with secure outbound, inbound and internal email
Sendmail and PostX: Simplifying HIPAA Email Compliance Providing healthcare organizations with secure outbound, inbound and internal email October 5, 2005 About Your Hosts Sendmail Complete email security
Electronic Records Storage Options and Overview
Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for
Cloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
Nuance Power PDF is PDF uncompromised.
is PDF uncompromised. Collaboration and productivity at a price that makes business sense. 2 is the next generation PDF solution that delivers performance, ease, and value as never before. PDF uncompromised.
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
Bringing Home the Cloud: Practical Considerations in Choosing an Infrastructure-as-a-Service Solution for Your Business
Bringing Home the Cloud: Practical Considerations in Choosing an Infrastructure-as-a-Service Solution for Your Business Introduction The cloud has long been a metaphor for the Internet. More recently,
Cloud models and compliance requirements which is right for you?
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
CLOUD COMPUTING: WHAT YOU SHOULD KNOW
CLOUD COMPUTING: WHAT YOU SHOULD KNOW There is hardly a topic creating more of a buzz in software industry, than the Cloud. Cloud computing is a dramatic shift in the way we think about providing computing
Chapter 2: Transparent Computing and Cloud Computing. Contents of the lecture
Chapter 2: Transparent Computing and Computing Lecture 2 透 明 计 算 与 云 计 算 的 关 联 Prof. Zixue Cheng 程 子 学 University of Aizu, 会 津 大 学 Visiting Professor of CSU 1 Contents of the lecture Definition, Architecture
Cloud Security Strategies. Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems
Cloud Security Strategies Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems London, 14 October 2015 UNICREDIT AT A GLANCE Employees: more than 146.600 Branches: 8.403 Banking operations
An Approach Towards Customized Multi- Tenancy
I.J.Modern Education and Computer Science, 2012, 9, 39-44 Published Online September 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.09.05 An Approach Towards Customized Multi- Tenancy
Kent State University s Cloud Strategy
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
CONSIDERATIONS BEFORE MOVING TO THE CLOUD
CONSIDERATIONS BEFORE MOVING TO THE CLOUD What Management Needs to Know Part I By Debbie C. Sasso Principal When talking technology today, it s very rare that the word Cloud doesn t come up. The benefits
How To Understand Cloud Computing
A STUDY OF CLOUD COMPUTING: APPLICATIONS AND CHALLENGE 1 DR. NEERAJ BHARGAVA, 2 ANCHAL KUMAWAT, 3 DR. RITU BHARGAVA, 4 SONIYA DAYMA 1 Associate Professor, Dept. of Computer Science, School of Engineering
Cloud Computing and Its Vision 2015!!
Cloud Computing and Its Vision 2015!! Anurag S. Barde Abstract "Cloud computing" - "the cloud" is a familiar cliche for the internet, but when combined with "Computing", the meaning gets bigger and fuzzier.
Security & Cloud Services IAN KAYNE
Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents
Oracle s Cloud Computing Strategy
Oracle s Cloud Computing Strategy Making IT Consumable Richard Garsthagen Director Cloud Business Development EMEA Copyright 2014, Oracle and/or its affiliates. All rights reserved. Trends Driving IT Innovation
The Modern Online Application for the Internet Economy: 5 Key Requirements that Ensure Success
The Modern Online Application for the Internet Economy: 5 Key Requirements that Ensure Success 1 Table of Contents Abstract... 3 Introduction... 3 Requirement #1 Smarter Customer Interactions... 4 Requirement
PROVIDING IT SOLUTIONS FOR THE HEALTHCARE INDUSTRY
PROVIDING IT SOLUTIONS FOR THE HEALTHCARE INDUSTRY The healthcare industry is facing unprecedented challenges as it evolves. New legislation and advances in technology are leading to obstacles and opportunities
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Unlocking & Locking Big Data: Defending the DataLake
Day 2 DIGITAL BUSINESS TECHNOLOGIES Digital Business Transformation @ CeBIT Campus 2015 Unlocking & Locking Big Data: Defending the DataLake Part 1: Stephen Lloyd-Jones, MD, DataLake Solutions Part 2:
All can damage or destroy your company s computers along with the data and applications you rely on to run your business.
All can damage or destroy your company s computers along with the data and applications you rely on to run your business. Losing your computers doesn t have to disrupt your business if you take advantage
HARNESSING THE POWER OF THE CLOUD
HARNESSING THE POWER OF THE CLOUD Demystifying Cloud Computing Everyone is talking about the cloud nowadays. What does it really means? Indeed, cloud computing is the current stage in the Internet evolution.
Private Cloud for Every Organization
white paper Private Cloud for Every Organization Leveraging the community cloud As more organizations today seek to gain benefit from the flexibility and scalability of cloud environments, many struggle
Enabling Multi-Tenancy with NetApp MultiStore
Enabling Multi-Tenancy with NetApp MultiStore Agenda What is Multi-Tenancy? Secure Multi-Tenancy as Cloud Infrastructure Introducing MultiStore MultiStore Use Cases Customer Examples 2009 NetApp. All rights
1. Comments on reviews a. Need to avoid just summarizing web page asks you for:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of
Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center
Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises
Top 10 Cloud Risks That Will Keep You Awake at Night
Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com
Corporate Presentation
Corporate Presentation XcellHost Cloud Services India Dubai Singapore Experience High Touch Support Reliable Secure Speed Scalable Manageable Value XcellHost About Us Founded in 1999. Global Reach Personal
The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management
The Cloud at Crawford Evaluating the pros and cons of cloud computing and its use in claims management The Cloud at Crawford Wikipedia defines cloud computing as Internet-based computing, whereby shared
WHITE PAPER WHY ORGANIZATIONS NEED LTO-6 TECHNOLOGY TODAY
WHITE PAPER WHY ORGANIZATIONS NEED LTO-6 TECHNOLOGY TODAY CONTENTS Storage and Security Demands Continue to Multiply.......................................3 Tape Keeps Pace......................................................................4
Commercial Software Licensing
Commercial Software Licensing CHAPTER 12: Prepared by DoD ESI January 2013 Chapter Overview Most software licenses today are either perpetual or subscription. Perpetual licenses involve software possession
IBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
THE MOBlLE APP. REVOLUTlON. 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD
THE MOBlLE APP REVOLUTlON 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD People use hand-held devices for everything from communicating and playing games to shopping and surfing the Internet. In fact,
Best Practices for Python in the Cloud: Lessons Learned @ActiveState
Best Practices for Python in the Cloud: Lessons Learned @ActiveState Best Practices for Python in the Cloud Presented by: Gisle Aas, Senior Developer, ActiveState whoami? Gisle Aas! [email protected]!
STRATEGIES FOR SUCCESS IN THE CLOUD THE FIVE KEYS TO EXCEPTIONAL BUISINESS IMPACT
STRATEGIES FOR SUCCESS IN THE CLOUD THE FIVE KEYS TO EXCEPTIONAL BUISINESS IMPACT PERVASIVE NEW EXPECTATIONS AGILITY. EFFICIENCY. COST SAVINGS. PUBLIC CLOUDS ENTERPRISE IT Cost per VM Hour: $0.10 vs. $1.00
