Secure eHealth-Care Service on Self-Organizing Software Platform

There are several applications connected to IT health devices on the self-organizing software platform (SoSp) that allow patients or elderly users to be cared for remotely by their family doctors under normal circumstances or during emergencies. An evaluation of the SoSp applied through PAAR watch/self-organizing software platform router was conducted targeting a simple user interface for aging users, without the existence of extrasettings based on patient movement. On the other hand, like normal medical records, the access to, and transmission of, health information via PAAR watch/self-organizing software platform requires privacy protection. This paper proposes a security framework for health information management of the SoSp. The proposed framework was designed to ensure easy detection of identification information for typical users. In addition, it provides powerful protection of the user’s health information.

[1]  Alexander P. Pons,et al.  Understanding user perspectives on biometric technology , 2008, CACM.

[2]  Akhilesh Chandra,et al.  Challenges and constraints to the diffusion of biometrics in information systems , 2005, CACM.

[3]  Ankit Chaudhary,et al.  A Vision-Based Method to Find Fingertips in a Closed Hand , 2012, J. Inf. Process. Syst..

[4]  A. Khreishah,et al.  Flow-based XOR Network Coding for Lossy Wireless Networks , 2012, IEEE Trans. Wirel. Commun..

[5]  David W. Chadwick,et al.  Patient Privacy in Electronic Prescription Transfer , 2003, IEEE Secur. Priv..

[6]  Junho Ahn,et al.  An indoor augmented-reality evacuation system for the Smartphone using personalized Pedometry , 2012, Human-centric Computing and Information Sciences.

[7]  Fouzia Mousumi,et al.  Push Pull Services Offering SMS Based m-Banking System in Context of Bangladesh , 2010, Int. Arab. J. e Technol..

[8]  Seol-Young Jeong,et al.  Self-Organizing Middleware Platform Based on Overlay Network for Real-Time Transmission of Mobile Patients Vital Signal Stream , 2013 .

[9]  Hyeong-Gon Jo,et al.  Remote service discovery and binding architecture for soft real-time QoS in indoor location-based service , 2014, J. Syst. Archit..

[10]  Reijo Savola,et al.  Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks , 2006, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06).

[11]  José Luis Fernández Alemán,et al.  Security and privacy in electronic health records: A systematic literature review , 2013, J. Biomed. Informatics.

[12]  Muhammad Khurram Khan,et al.  Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce , 2014, Journal of Medical Systems.

[13]  Tom A. M. Kevenaar,et al.  A security design for a general purpose, self-organizing, multihop ad hoc wireless network , 2003, SASN '03.

[14]  Weiwei Sun,et al.  A Distributed Cache Based Reliable Service Execution and Recovery Approach in MANETs , 2011, 2011 IEEE Asia-Pacific Services Computing Conference.

[15]  Elijah Blessing Rajsingh,et al.  A novel fault tolerant service selection framework for pervasive computing , 2012, Human-centric Computing and Information Sciences.

[16]  Annie I. Antón,et al.  Towards understanding user perceptions of authentication technologies , 2007, WPES '07.

[17]  Md. Imdadul Islam,et al.  A New Approach to Fingerprint Detection Using a Combination of Minutiae Points and Invariant Moments Parameters , 2012, J. Inf. Process. Syst..

[18]  Melek Önen,et al.  A Security Protocol for Self-Organizing Data Storage , 2008, SEC.

[19]  Jerome Couturier,et al.  How Can the Internet of Things Help to Overcome Current Healthcare Challenges , 2012 .

[20]  Sechang Oh,et al.  Using an Adaptive Search Tree to Predict User Location , 2012, J. Inf. Process. Syst..

[21]  Abdullatif Shikfa Security issues in opportunistic networks , 2010, MobiOpp '10.

[22]  A.C.J. Sprokkereef,et al.  ETHICAL PRACTICE IN THE USE OF BIOMETRIC IDENTIFIERS WITHIN THE EU , 2007 .

[23]  Ilango Krishnamurthi,et al.  Finding relevant semantic association paths through user-specific intermediate entities , 2012, Human-centric Computing and Information Sciences.

[24]  Bharat K. Bhargava,et al.  SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems , 2013, IEEE Transactions on Dependable and Secure Computing.

[25]  Ravindra C. Thool,et al.  SURVEY OF BIOMETRIC RECOGNITION SYSTEMS AND THEIR APPLICATIONS , 2010 .

[26]  Kee Yin Joseph Ng Ubiquitous healthcare: Healthcare systems and applications enabled by mobile and wireless , 2012 .

[27]  Giannis F. Marias,et al.  Roles and security in a publish/subscribe network architecture , 2010, The IEEE symposium on Computers and Communications.

[28]  Adam Krzyzak,et al.  Cell Phones Personal Authentication Systems Using Multimodal Biometrics , 2008, ICIAR.

[29]  Sébastien Marcel,et al.  MOBIO: MOBILE BIOMETRIC FACE AND SPEAKER AUTHENTICATION , 2010 .

[30]  Falko Dressler,et al.  A study of self-organization mechanisms in ad hoc and sensor networks , 2008, Comput. Commun..

[31]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[32]  Tae-Hyon Kim,et al.  A three-tier middleware architecture supporting bidirectional location tracking of numerous mobile nodes under legacy WSN environment , 2011, J. Syst. Archit..