SlideShare a Scribd company logo
Hipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviroment
The Health Insurance Portability and Accountability Act (HIPAA)
Act supports the concepts of Electronic Health Record (EHR) and
Health Information Exchange (HIE). Even though HIPAA has been
around since 1996 it wasn’t taken seriously until HITECH was put
into place in 2010. HITECH extended the HIPAA that was put into
place in 1996 which contained two parts: Title I and Title II.
•Title I to protect people in case they lost their job or switched jobs
so that they could still have healthcare coverage.
•Title II called Administrative Simplification was about data
protection. From an IT Departments aspect HIPAA/HITECH is to
control who can see what data depending on their job position,
tracking data, and monitoring data. Also protecting stored data and
data while it is being transferred through encryption. Access
controls and processes also need to be set up.
What is cloud Computing?
• cloud computing has been driven by the benefits, the cheapest
purveyor of application hosting, storage, infrastructure, huge
cost savings with low initial investment, elasticity and scalability,
ease of adoption, operational efficiency, on-demand resources.
• the cloud of computers extend beyond a single company or
entity. the application and data served by cloud are available to
broader group of users, cross enterprise, and cross platform.
• access is via internet. any authorized user can access these
documents, application from any computer over the internet.
• access pay-as-you-go manner .
Hipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviroment
GENERATION OF HPC
Compliance and Audit in cloud
• Compliance is a Conformance with an established standard,
specification, regulation, or law. Various types of privacy
regulations and laws exist within different countries at the
local and global levels, making compliance a potentially
complicated issue for cloud computing.
• HIPAA in the US is just compliance issues affecting cloud
computing, based on the type of data and application for
which the cloud is being used. Maintaining and proving
compliance when using cloud computing.
• Audit is well positioned through its role as an assurance
function to help management and the board identifies and
considers the key risks of leveraging cloud computing
technology.
HIPAA RULES
COMPLIANCE SECURITY
• The traditional cryptographic technologies for data integrity and availability, based
on Hash functions and signature schemes.

1. Firstly, traditional cryptographic cannot work on the outsourced data. it is not a
practical solution for data validation by downloading them due to the expensive
communications, especially for large size files.
2. Secondly, Cloud Computing is not just a third party data warehouse. The data stored in
the cloud may be frequently updated by the users, including insertion, deletion,
modification, appending, reordering, etc.
In a Corporate world there are large number of client who accessing their data and
modifying a data. To manage this data we use third party auditor (TPA), that will check
the reliability of data but it increases the data integrity risk of data owner. Since TPA
not only read the data but also he can modify the data, therefore a novel approach
should be provided who solved this problem. In this thesis we first examine the
problem and new potential security scheme used to solve this problem. Our algorithm
encrypt the content of file at user level which ensure the data owner and client that
there data are intact.

1.Protect the data from unauthorized access.
2.Ensure that our data are intact.
3.Solve the problem of integrity, unauthorized access, privacy and consistency.
Hipaa auditing in cloud computing enviroment
modules

1. Client Module:
In this module, the client sends the query to the server. Based on the
query the server sends the corresponding file to the client.
2. System Module:
• User:
Users, who have data to be stored in the cloud and rely on the cloud for
data computation, consist of both individual consumers and
organizations.
• Cloud Service Provider (CSP):
A CSP, who has significant resources and expertise in building and
managing distributed cloud storage servers, owns and operates live Cloud
Computing systems,.
• Third Party Auditor (TPA):
An optional TPA, who has expertise and capabilities that users may not
have, is Trusted to assess and expose risk of cloud storage services on
behalf of the users upon request.
ALGORITHM
screen shots
Eucalyptus Private Cloud Setup
Admin Console
E-mail Confirmation
User Console
Audit Logs
Client request to csp
Cloud Server Login
Verify password if correct send a file
that he wants to access
Conclusion
• Creating a cost-effective and secure system design when the
adversary owns the data is extremely challenging.
•

To protect the data from unauthorized access and ensure
that our data are intact.

• Solve the problem of integrity, unauthorized access, privacy
and consistency.
Hipaa auditing in cloud computing enviroment

More Related Content

DOCX
Data Security
PPTX
Eight principles of consumer data privacy
PPTX
Data security in Hybrid Cloud Computing
PPT
Ahearn Cloud Presentation
PDF
Uganda Cloud Computing Panel
PPTX
Cloud Compliance Auditing - Closer 2011
PPT
Security Problem With Cloud Computing
PPTX
In data security
Data Security
Eight principles of consumer data privacy
Data security in Hybrid Cloud Computing
Ahearn Cloud Presentation
Uganda Cloud Computing Panel
Cloud Compliance Auditing - Closer 2011
Security Problem With Cloud Computing
In data security

What's hot (19)

DOCX
Running head technology vulnerabilities in the cloud
PDF
HIPAA Compliance Healthcare Datasheet - eFax Corporate Secure Faxing
DOCX
Running head hardware and software security14 hardware an
PPS
CloudSecurity
PDF
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DOCX
PDF
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
PDF
eHealth ….. How to trust a cloud?
PPTX
Compliant Email Solutions for HIPAA & SOX regulations
PPTX
IoT_Implemented
PPT
Lkm 2011
PDF
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
PPTX
Access control policy
PPTX
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
PDF
Brochure Imperva Vormetric
PPT
What is IRM? bright talk
PDF
Secure cloud storage privacy preserving public auditing for data storage secu...
PPTX
Security in electronic health records
Running head technology vulnerabilities in the cloud
HIPAA Compliance Healthcare Datasheet - eFax Corporate Secure Faxing
Running head hardware and software security14 hardware an
CloudSecurity
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
eHealth ….. How to trust a cloud?
Compliant Email Solutions for HIPAA & SOX regulations
IoT_Implemented
Lkm 2011
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
Access control policy
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
Brochure Imperva Vormetric
What is IRM? bright talk
Secure cloud storage privacy preserving public auditing for data storage secu...
Security in electronic health records
Ad

Similar to Hipaa auditing in cloud computing enviroment (20)

PDF
Achieving Secure, sclable and finegrained Cloud computing report
PDF
iaetsd Shared authority based privacy preserving protocol
PDF
Cloud computing security issues and challenges
PDF
Data Stream Controller for Enterprise Cloud Application
PDF
Cloud Information Accountability Frameworks for Data Sharing in Cloud
PDF
Accountability in Distributed Environment For Data Sharing in the Cloud
PDF
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
PDF
Paper id 212014106
PDF
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
PDF
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
PDF
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
PDF
Ieeepro techno solutions 2011 ieee java project -secure role based data
PDF
1784 1788
PDF
1784 1788
PDF
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
PDF
Cloud Security
PPTX
Blockchain-Based Data Preservation System for Medical Data
PDF
Cloud Computing
DOCX
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...
DOC
Security threats in cloud computing
Achieving Secure, sclable and finegrained Cloud computing report
iaetsd Shared authority based privacy preserving protocol
Cloud computing security issues and challenges
Data Stream Controller for Enterprise Cloud Application
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Accountability in Distributed Environment For Data Sharing in the Cloud
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Paper id 212014106
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based data
1784 1788
1784 1788
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Cloud Security
Blockchain-Based Data Preservation System for Medical Data
Cloud Computing
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...
Security threats in cloud computing
Ad

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
A Presentation on Artificial Intelligence
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Spectral efficient network and resource selection model in 5G networks
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
A comparative analysis of optical character recognition models for extracting...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Big Data Technologies - Introduction.pptx
Getting Started with Data Integration: FME Form 101
Programs and apps: productivity, graphics, security and other tools
A Presentation on Artificial Intelligence
Building Integrated photovoltaic BIPV_UPV.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Encapsulation_ Review paper, used for researhc scholars
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Hipaa auditing in cloud computing enviroment

  • 3. The Health Insurance Portability and Accountability Act (HIPAA) Act supports the concepts of Electronic Health Record (EHR) and Health Information Exchange (HIE). Even though HIPAA has been around since 1996 it wasn’t taken seriously until HITECH was put into place in 2010. HITECH extended the HIPAA that was put into place in 1996 which contained two parts: Title I and Title II. •Title I to protect people in case they lost their job or switched jobs so that they could still have healthcare coverage. •Title II called Administrative Simplification was about data protection. From an IT Departments aspect HIPAA/HITECH is to control who can see what data depending on their job position, tracking data, and monitoring data. Also protecting stored data and data while it is being transferred through encryption. Access controls and processes also need to be set up.
  • 4. What is cloud Computing? • cloud computing has been driven by the benefits, the cheapest purveyor of application hosting, storage, infrastructure, huge cost savings with low initial investment, elasticity and scalability, ease of adoption, operational efficiency, on-demand resources. • the cloud of computers extend beyond a single company or entity. the application and data served by cloud are available to broader group of users, cross enterprise, and cross platform. • access is via internet. any authorized user can access these documents, application from any computer over the internet. • access pay-as-you-go manner .
  • 8. Compliance and Audit in cloud • Compliance is a Conformance with an established standard, specification, regulation, or law. Various types of privacy regulations and laws exist within different countries at the local and global levels, making compliance a potentially complicated issue for cloud computing. • HIPAA in the US is just compliance issues affecting cloud computing, based on the type of data and application for which the cloud is being used. Maintaining and proving compliance when using cloud computing. • Audit is well positioned through its role as an assurance function to help management and the board identifies and considers the key risks of leveraging cloud computing technology.
  • 11. • The traditional cryptographic technologies for data integrity and availability, based on Hash functions and signature schemes. 1. Firstly, traditional cryptographic cannot work on the outsourced data. it is not a practical solution for data validation by downloading them due to the expensive communications, especially for large size files. 2. Secondly, Cloud Computing is not just a third party data warehouse. The data stored in the cloud may be frequently updated by the users, including insertion, deletion, modification, appending, reordering, etc.
  • 12. In a Corporate world there are large number of client who accessing their data and modifying a data. To manage this data we use third party auditor (TPA), that will check the reliability of data but it increases the data integrity risk of data owner. Since TPA not only read the data but also he can modify the data, therefore a novel approach should be provided who solved this problem. In this thesis we first examine the problem and new potential security scheme used to solve this problem. Our algorithm encrypt the content of file at user level which ensure the data owner and client that there data are intact. 1.Protect the data from unauthorized access. 2.Ensure that our data are intact. 3.Solve the problem of integrity, unauthorized access, privacy and consistency.
  • 14. modules 1. Client Module: In this module, the client sends the query to the server. Based on the query the server sends the corresponding file to the client. 2. System Module: • User: Users, who have data to be stored in the cloud and rely on the cloud for data computation, consist of both individual consumers and organizations. • Cloud Service Provider (CSP): A CSP, who has significant resources and expertise in building and managing distributed cloud storage servers, owns and operates live Cloud Computing systems,. • Third Party Auditor (TPA): An optional TPA, who has expertise and capabilities that users may not have, is Trusted to assess and expose risk of cloud storage services on behalf of the users upon request.
  • 23. Verify password if correct send a file that he wants to access
  • 24. Conclusion • Creating a cost-effective and secure system design when the adversary owns the data is extremely challenging. • To protect the data from unauthorized access and ensure that our data are intact. • Solve the problem of integrity, unauthorized access, privacy and consistency.