Part 1
The healthcare industry uses different security models mainly related to Electronic Health Records (EHR). One of the most applicable security models is the EHR Security Reference Model. The model is critical in ensuring secure patient care delivery using the cloud. The model is most applicable because it provides secure EHR collection and integration (Zhang & Liu 2010). It also facilitates EHR secure storage and access management. It also has the EHR secure usage which supports practitioner’s signature and verification for patients. Other models in the health care industry include the EHR Secure Integration Model which aims at verifying the authenticity and integrity of EHR. It is also useful in defining the structure and format of composite EHR. Another model in the health care industry is the Attribute-based Composite EHR model which is aimed at facilitating fine-grained selective sharing of composite EHR.
Part 2
One of the corporations that deployed part of its operations to the cloud is the InterContinental Hotels Group. The company uses infrastructure as service, software as a service and now has hybrid cloud computing. They have a private cloud called Camelot as a way of addressing the organization's security concerns. The Corporation is using public clouds such as the Amazon for things that are less risky but holds back on things that would pose high-security risks. Security concerns surrounding cloud operations are warranted. Cloud users have to concern themselves with issues such as loss of physical control, loss of privacy and disaster recovery and business continuity. The organization has no control over the measures that the cloud provider has put in place (Badger et al. 2011). For example, in 2015, the icloud was hacked; the security breach resulted in the publication of private photos of celebrities.
Reference
Badger, L., Bohn, R., Hogan, M., Liu, F., Jian, M., John, M., Chu, S., Mills, K., Tong, J., Fred, W., & Leaf, D. (2011) US Government Cloud Computing Technology Roadmap Volume II: Useful Information for Cloud Adopters. National Institute of Standards and Technology SP-500-293.
Zhang, R. & Liu, L. (2010) Security Models and Requirements for Healthcare Application Clouds. CLOUD ’10 Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing. 268-275.