SlideShare una empresa de Scribd logo
1 de 57
Descargar para leer sin conexión
Securing the E-Health Cloud


                        Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy




   1st ACM International Health Informatics Symposium (IHI 2010)
   Arlington,Virginia, USA, 11-12 November 2010
Freitag, 12. November 2010
Introduction
                        Buzzwords of the year:

                             E-Health


                             Cloud Computing




Freitag, 12. November 2010
Introduction
                        Put together: E-Health Cloud




Freitag, 12. November 2010
Introduction
                        Put together: E-Health Cloud




                 First idea: a paper with both buzzwords (cool!)




Freitag, 12. November 2010
Introduction
                        Put together: E-Health Cloud




                 First idea: a paper with both buzzwords (cool!)
                        Seriously: What about security & privacy?



Freitag, 12. November 2010
Outline
                    • E-Health Cloud Models
                    • Security & Privacy Problem Areas
                    • Security Architecture for Privacy Domains




Freitag, 12. November 2010
Simple E-Health Cloud




Freitag, 12. November 2010
Simple E-Health Cloud
                                        Examples:




                                          ...


Freitag, 12. November 2010
Simple E-Health Cloud
                                                                Examples:




                   • Patients need to manage complex access rights
                   • Patients don‘t understand security implications ...
                   • Privacy: server provider can gain access to data in PHRs




Freitag, 12. November 2010
Advanced E-Health Cloud




Freitag, 12. November 2010
Advanced E-Health Cloud




Freitag, 12. November 2010
Advanced E-Health Cloud




Freitag, 12. November 2010
Advanced E-Health Cloud




Freitag, 12. November 2010
Advanced E-Health Cloud




Freitag, 12. November 2010
Advanced E-Health Cloud




Freitag, 12. November 2010
Advanced E-Health Cloud




Freitag, 12. November 2010
Advanced E-Health Cloud




Freitag, 12. November 2010
Advanced E-Health Cloud




        Healthcare
        Telematics
        Boundary




Freitag, 12. November 2010
Advanced E-Health Cloud




        Healthcare
        Telematics
        Boundary




Freitag, 12. November 2010
Advanced E-Health Cloud




        Healthcare
        Telematics
        Boundary




Freitag, 12. November 2010
Advanced E-Health Cloud




        Healthcare
        Telematics
        Boundary




Freitag, 12. November 2010
Advanced E-Health Cloud




        Healthcare
        Telematics
        Boundary




Freitag, 12. November 2010
Advanced E-Health Cloud
                                 Examples:
                                 • Europe
     Healthcare
                                   - Germany, Austria,
                                     Netherlands, ...
     Telematics
     Boundary



                                 • Asia
                                   - Taiwan, ...




Freitag, 12. November 2010
Advanced E-Health Cloud
                                            Examples:
                                            • Europe
     Healthcare
                                              - Germany, Austria,
                                                Netherlands, ...
     Telematics
     Boundary



                                            • Asia
                                              - Taiwan, ...
                             Huh! Pretty complex.
                             Must be secure, right?



Freitag, 12. November 2010
Security Problem Areas
                    • Data Storage and Processing
                             • Data centers: unauthorized information leakage
                             • Platform security: vulnerable to malware
                             • Mobile storage (USB memory sticks)
                    •         Infrastructure Management
                             • Cryptographic keys, certificates
                             • Hardware / software components
                    •         Usability and User Experience
                             • Smartcard PIN (when unconscious?)
                             • Time consuming
Freitag, 12. November 2010
Security Problem Areas
                    • Data Storage and Processing
                             • Data centers: unauthorized information leakage
                             • Platform security: vulnerable to malware
                             • Mobile storage (USB memory sticks)
                    •         Infrastructure Management
                             • Cryptographic keys, certificates
                             • Hardware / software components
                    •         Usability and User Experience
                             • Smartcard PIN (when unconscious?)
                             • Time consuming
Freitag, 12. November 2010
Platform Security (Server)




Freitag, 12. November 2010
Platform Security (Server)




Freitag, 12. November 2010
Platform Security (Server)




Freitag, 12. November 2010
Platform Security (Server)




Freitag, 12. November 2010
Platform Security (Server)




Freitag, 12. November 2010
Platform Security (Server)




Freitag, 12. November 2010
Platform Security (Client)




Freitag, 12. November 2010
Platform Security (Client)




Freitag, 12. November 2010
Platform Security (Client)




Freitag, 12. November 2010
Platform Security (Client)




Freitag, 12. November 2010
Platform Security (Client)




Freitag, 12. November 2010
Platform Security (Client)




Freitag, 12. November 2010
Privacy Domains




Freitag, 12. November 2010
Privacy Domains




Freitag, 12. November 2010
Privacy Domains




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains


     Trusted
     Virtual
     Domain




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains


     Trusted
     Virtual
     Domain




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains


     Trusted
     Virtual
     Domain




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains


     Trusted
     Virtual
     Domain




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains


     Trusted
     Virtual
     Domain




     Security
      Kernel



Freitag, 12. November 2010
Privacy Domains


     Trusted
     Virtual
     Domain




     Security
      Kernel



Freitag, 12. November 2010
Technology:
                  Trusted Virtual Domains (TVDs)
                TVD = coalition of virtual machines
                • Isolated compartments
                • Trust relationships
                • Transparent policy enforcement
                • Secure communication
                • Clienton modern security security functionality)
                  (based
                         platform
                                   hardware


Freitag, 12. November 2010
Software Architecture
                                                                                                                      /<%*45%=+5*?
                                                                                                                      0<5*%<*5-;++*44


                                                                                                                          6123=8-)*%:*%
                                    !"#$                                             !"#12345*%-"#$
                                                                                     011#23+435&-./       617*3859-
                                                                                                          )*%:*%
                                     )*+,%*-./0

                                                                                                                         A*B4*%:*%
                  066*41)+4#3       9(::$#;7($<      011#23+435                      ;++&,<5=<>
                  "#$!6$#1(77435    %&=)4*&>*4(3+    )3?!!:4**435!                   )*%:*%
                  %'87                               7#"+;)$(
                                                     @(A5A<!B.&
  !"#$%&'(!"#$                                       C)"(3(+         !"#$%&'(!"#$!
                                                     )66*41)+4#3D    011#23+435&!
  %&'()*+,&-./
                                                                     -./


                                   )*+,%=5(-C*%<*8                                            !"#12345*%-"#$
                                                                                              %&'()*+,&-./

                                                              !%,45*?
                                     73%?@3%*                 73%?@3%*




Freitag, 12. November 2010
User Interface




Freitag, 12. November 2010
Conclusion
                    •        E-Health Clouds: big security & privacy challenges!
                    •        TVDs can solve unaddressed issues:
                             •   Establish privacy domains
                             •   Extend security to end user platforms

                    •        Ongoing projects: study usability & deploy technology




Freitag, 12. November 2010
Conclusion
                    •        E-Health Clouds: big security & privacy challenges!
                    •        TVDs can solve unaddressed issues:
                             •   Establish privacy domains
                             •   Extend security to end user platforms

                    •        Ongoing projects: study usability & deploy technology


                                                                             (EU FP7 funded)




                                                                MediTrust   (National German)



Freitag, 12. November 2010
Questions?

                                     Contact:
                                 Marcel Winandy
                               Ruhr-University Bochum
                             marcel.winandy@trust.rub.de
                               http://www.trust.rub.de




Freitag, 12. November 2010

Más contenido relacionado

Similar a Securing the E-Health Cloud

HEUGCloud services the democratization of it (heug)
HEUGCloud services the democratization of it (heug)HEUGCloud services the democratization of it (heug)
HEUGCloud services the democratization of it (heug)
Leo Plugge
 
20100602 porticor at igt short
20100602 porticor at igt   short20100602 porticor at igt   short
20100602 porticor at igt short
giladpn
 
Ruby conf2010 OpenPaaS
Ruby conf2010 OpenPaaSRuby conf2010 OpenPaaS
Ruby conf2010 OpenPaaS
Derek Collison
 
Crypto Hot Cases – One Year Backward
Crypto Hot Cases – One Year BackwardCrypto Hot Cases – One Year Backward
Crypto Hot Cases – One Year Backward
Positive Hack Days
 
Anil saldhana identitycloud
Anil saldhana identitycloudAnil saldhana identitycloud
Anil saldhana identitycloud
Anil Saldanha
 

Similar a Securing the E-Health Cloud (20)

ICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologieICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologie
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdinger
 
Scientific Applications with Python
Scientific Applications with PythonScientific Applications with Python
Scientific Applications with Python
 
Cloud computing and mobile rit
Cloud computing and mobile   ritCloud computing and mobile   rit
Cloud computing and mobile rit
 
HEUGCloud services the democratization of it (heug)
HEUGCloud services the democratization of it (heug)HEUGCloud services the democratization of it (heug)
HEUGCloud services the democratization of it (heug)
 
from Realtime Operating systems to unlocking iPhones in less than 30 slides
from Realtime Operating systems to unlocking iPhones in less than 30 slidesfrom Realtime Operating systems to unlocking iPhones in less than 30 slides
from Realtime Operating systems to unlocking iPhones in less than 30 slides
 
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
 
How To Develop Secure Software
How To Develop Secure SoftwareHow To Develop Secure Software
How To Develop Secure Software
 
20100602 porticor at igt short
20100602 porticor at igt   short20100602 porticor at igt   short
20100602 porticor at igt short
 
Ruby conf2010 OpenPaaS
Ruby conf2010 OpenPaaSRuby conf2010 OpenPaaS
Ruby conf2010 OpenPaaS
 
Building Services for New UN WFP Office
Building Services for New UN WFP OfficeBuilding Services for New UN WFP Office
Building Services for New UN WFP Office
 
Cloud Security - A Visibility Challenge
Cloud Security - A Visibility ChallengeCloud Security - A Visibility Challenge
Cloud Security - A Visibility Challenge
 
Scaling the Cloud - Cloud Security
Scaling the Cloud - Cloud SecurityScaling the Cloud - Cloud Security
Scaling the Cloud - Cloud Security
 
Crypto Hot Cases – One Year Backward
Crypto Hot Cases – One Year BackwardCrypto Hot Cases – One Year Backward
Crypto Hot Cases – One Year Backward
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
 
HOW TO DO AI IN 2013 from Roadmap 2012
HOW TO DO AI IN 2013 from Roadmap 2012HOW TO DO AI IN 2013 from Roadmap 2012
HOW TO DO AI IN 2013 from Roadmap 2012
 
Anil saldhana identitycloud
Anil saldhana identitycloudAnil saldhana identitycloud
Anil saldhana identitycloud
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Identity theft in the Cloud and remedies
Identity theft in the Cloud and remediesIdentity theft in the Cloud and remedies
Identity theft in the Cloud and remedies
 

Más de Marcel Winandy

Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
Marcel Winandy
 
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One DeviceUni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
Marcel Winandy
 
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
Marcel Winandy
 
A Note on the Security in the Card Management System of the German E-Health Card
A Note on the Security in the Card Management System of the German E-Health CardA Note on the Security in the Card Management System of the German E-Health Card
A Note on the Security in the Card Management System of the German E-Health Card
Marcel Winandy
 
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop EnvironmentsTrusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments
Marcel Winandy
 
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer SystemsPatterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems
Marcel Winandy
 
A Pattern for Secure Graphical User Interface Systems
A Pattern for Secure Graphical User Interface SystemsA Pattern for Secure Graphical User Interface Systems
A Pattern for Secure Graphical User Interface Systems
Marcel Winandy
 
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
TruWallet: Trustworthy and Migratable Wallet-Based Web AuthenticationTruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
Marcel Winandy
 
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
Marcel Winandy
 
Modeling Trusted Computing Support in a Protection Profile for High Assurance...
Modeling Trusted Computing Support in a Protection Profile for High Assurance...Modeling Trusted Computing Support in a Protection Profile for High Assurance...
Modeling Trusted Computing Support in a Protection Profile for High Assurance...
Marcel Winandy
 

Más de Marcel Winandy (13)

Security Patterns - An Introduction
Security Patterns - An IntroductionSecurity Patterns - An Introduction
Security Patterns - An Introduction
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
 
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One DeviceUni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
 
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
 
A Note on the Security in the Card Management System of the German E-Health Card
A Note on the Security in the Card Management System of the German E-Health CardA Note on the Security in the Card Management System of the German E-Health Card
A Note on the Security in the Card Management System of the German E-Health Card
 
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop EnvironmentsTrusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments
 
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer SystemsPatterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems
 
A Pattern for Secure Graphical User Interface Systems
A Pattern for Secure Graphical User Interface SystemsA Pattern for Secure Graphical User Interface Systems
A Pattern for Secure Graphical User Interface Systems
 
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
TruWallet: Trustworthy and Migratable Wallet-Based Web AuthenticationTruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
 
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
 
Modeling Trusted Computing Support in a Protection Profile for High Assurance...
Modeling Trusted Computing Support in a Protection Profile for High Assurance...Modeling Trusted Computing Support in a Protection Profile for High Assurance...
Modeling Trusted Computing Support in a Protection Profile for High Assurance...
 
Property-Based TPM Virtualization
Property-Based TPM VirtualizationProperty-Based TPM Virtualization
Property-Based TPM Virtualization
 
Compartmented Security for Browsers
Compartmented Security for BrowsersCompartmented Security for Browsers
Compartmented Security for Browsers
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Securing the E-Health Cloud