Share This Article:

Regulatory Privacy Protection for Biomedical Cloud Computing

Abstract Full-Text HTML Download Download as PDF (Size:89KB) PP. 145-151
DOI: 10.4236/blr.2012.34020    4,220 Downloads   7,014 Views   Citations

ABSTRACT

This article provides background information on biomedical cloud computing. It examines the privacy concerns that arise from the use of biomedical cloud computing services and then surveys the current state of regulatory privacy safeguards for patients and consumers of these services both in the U.S and abroad. Finally, it identifies opportunities for legal and technological mechanisms to be implemented or reinforced so that patients and consumers are not forced to lose control of their information when they use biomedical cloud computing services.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Y. Yang and K. Borg, "Regulatory Privacy Protection for Biomedical Cloud Computing," Beijing Law Review, Vol. 3 No. 4, 2012, pp. 145-151. doi: 10.4236/blr.2012.34020.

References

[1] D. Crawford, “Biomedical Research Gets Head Into Cloud Computing,” 2011. http://medicalcenter.osu.edu/mediaroom/releases/Pages/Biomedcal-Research-Gets-Head-Into-Cloud-Computing.aspx
[2] A. Mathews, “United Health to Launch Cloud-Based Data Platform,” Wall Street Journal, 2012. http://online.wsj.com/article/SB10001424052970204062704577221551500296744.html
[3] I. Carrión, J. Alemán and A. Toval, “Personal Health Records: New Means to Safely Handle our Health Data,” IEEE computer Society Digital Library, IEEE Computer Society, 2012. http://doi.ieeecomputersociety.org/10.1109/MC.2012.74
[4] C. McCarthy, “Paging Dr. Google: Personal Health Records and Patient Privacy,” William & Mary Law Review, Vol. 51, No. 6, 2010, pp. 2243-2268. http://scholarship.law.wm.edu/wmlr/vol51/iss6/6
[5] C. Klein, “Cloudy Confidentiality: Clinical and Legal Implications of Cloud Computing in Health Care,” The Journal of the American Academy of Psychiatry and the Law, Vol. 39, No. 4, 2011, pp.571-578.
[6] L. Osterhaus, “Cloud Computing and Health Information,” The University of Iowa School of Library and Information Science Journal, Vol. 19, 2010, pp. 1-9.
[7] HITECH Act Enforcement Interim Final Rule. US Department of Health and Human Services, 2009. http://www.hhs.gov/ocr/privacy/hipaa/administrative/enforcementrule/hitechenforcementifr.html
[8] M. Delgado, “The Evolution of Health Care IT: Are Current US Privacy Policies Ready for the Clouds,” IEEE World Congress on Services, Washington DC, 4-9 July 2011, pp. 371-378. http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6012698&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6012698
[9] R. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, Q. Liang and B. Lee, “Trust Cloud: A Framework for Accountability and Trust in Cloud Computing,” 2011. http://www.hpl.hp.com/techreports/2011/HPL-2011-38.pdf
[10] T. Martin, “Hey! You! Get off of My Cloud: Defining and Protecting the Metes and Bounds of Privacy, Security, and Property in Cloud Computing,” 2011. http://works.bepress.com/timothy_martin/3
[11] A. Palanzi, “Patient Privacy in the Cloud: Why Congress Should Model HIPAA Enforcement Mechanisms after the FCA to Meet a New Wave of Privacy Threats from the Implementation of Cloud-Computing Technologies,” 2012. http://works.bepress.com/andrew_palanzi/1/
[12] R. Grossman and K. White, “A Vision for Biomedical Cloud,” Journal of Internal Medicine, Vol. 271, No. 2, 2012, pp. 122-130. doi:10.1111/j.1365-2796.2011.02491.x
[13] J. Philbin, F. Prior and P. Nagy, “Will the Next Generation of PACS Be Sitting on a Cloud,” Journal of Digital Imaging, Vol. 24, No. 2, 2011, pp. 179-183. doi:10.1007/s10278-010-9331-4
[14] E. Schweitzer, “Reconciliation of the Cloud Computing Model with US,” Journal of American Medical Informatics Association, Vol. 19, No. 2, 2012, pp. 161-165. doi:10.1136/amiajnl-2011-000162
[15] S. Pearson, “Toward Accountability in the Cloud,” IEEE Internet Computing, 2011, pp. 64-69. http://www.hpl.hp.com/techreports/2011/HPL-2011-138.html doi:10.1109/MIC.2011.98
[16] J. Soma, M. Nichols, M. Gates and A. Gutierrez, “Chasing the Clouds without Getting Drenched: A Call for Fair Practices in Cloud Computing Services,” 2011. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2039439
[17] R. Ko, B. Lee and S. Pearson, “Towards Achieving Accountability, Auditability and Trust in Cloud Computing,” Advances in Computing and Communications, Communications in Computer and Information Science, Vol. 193, 2011, pp. 432-444. doi:10.1007/978-3-642-22726-4_45
[18] Fujitsu Research Institute, “Personal Data in the Cloud: A Global Survey of Consumer Attitudes,” 2010. http://www.fujitsu.com/downloads/SOL/fai/reports/fujitsu_personal-data-in-the-cloud.pdf
[19] C. Witt, “HIPAA versus the Cloud,” 2011. http://healthcare-executive-insight.advanceweb.com/Features/Articles/HIPAA-Versus-the-Cloud.aspx
[20] C. Lyon and K. Retzer, “Privacy in the Cloud: A Legal Framework for Moving Personal Data to the Cloud,” 2011. http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909494
[21] A. Weissberger, “ACLU of Northern California, Cloud Computing: Storm Warning for Privacy,” 2009. http://viodi.com/2009/02/13/aclu-northern-ca-cloud-computing-storm-warning-for-privacy/
[22] J. Harshbarger, “Cloud Computing Providers and Data Security Law: Building Trust with United States Companies,” Journal of Technology Law and Policy, Vol. 16, No. 2, 2011, pp. 229-254.
[23] Federal Trade Commission, Fair Information Practice Principles, 2012. http://www.ftc.gov/reports/privacy3/fairinfo.shtm
[24] J. Turow, J. King, C. Hoofnagle, A. Bleakley and M. Hennessy, “Americans Reject Tailored Advertising and Three Activities that Enable It,” 2009. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1478214
[25] N. Ozer, “Privacy and Free Speech: It’s good for Business,” 2009. http://dotrights.org/business/primer/.
[26] S. Pearson and A. Charlesworth, “Accountability as a Way Forward in Privacy Protection in the Cloud,” Cloud Computing, Lecture Notes in Computer Science, Vol. 5931, 2009, pp. 131-144,
[27] A. Narayanan and V. Shmatikov, “Robust De-Anonymization of Large Sparse Datasets,” 2008. http://dl.acm.org/citation.cfm?id=1398064
[28] P. Wayner, “You Know about Backups. Now, Do It Online,” New York Times, 2008. http://www.nytimes.com/2008/10/23/technology/personaltech/23basics1.html

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.