Scalable Computing: Practice and Experience

Mobile health has recently gained a lot of attention. Biological, environmental and behavioral data collected from mobile devices can be analyzed and transmitted directly to the person, family or health professionals for immediate and individualized care. However, due to multiplicity of mobile applications and the heterogeneity of actors involved in patient care, conflicts among the privacy policies defined by the different actors can take place. Thus, we present in this paper an approach to resolve the problem of conflicting privacy policies in e-health/m-health environments using AHP (Analytic Hierarchy Process) prioritization technique. Conflicts detection and resolution are facilitated by the adoption of S4P formal privacy policy language used as a standardized language. Finally, a case study is suggested to illustrate how our solution can be applied to resolve such conflicts.

[1]  R. Costa,et al.  Enhancing conflict resolution through an AHP-based methodology , 2014 .

[2]  George Yee The Negotiation of Privacy Policies in Distance Education 1 , 2003 .

[3]  Laurent Bussard,et al.  S4P: A Generic Language for Specifying Privacy Preferences and Policies , 2010 .

[4]  Giampaolo Bella,et al.  Enforcing privacy in e-commerce by balancing anonymity and trust , 2011, Comput. Secur..

[5]  Karen Renaud,et al.  Privacy: Aspects, definitions and a multi-faceted privacy preservation approach , 2010, 2010 Information Security for South Africa.

[6]  Gail-Joon Ahn,et al.  Detecting and resolving privacy conflicts for collaborative data sharing in online social networks , 2011, ACSAC '11.

[7]  Ali Görener,et al.  Comparing AHP and ANP: An Application of Strategic Decisions Making in a Manufacturing Company , 2012 .

[8]  Thomas L. Saaty,et al.  Decision-making with the AHP: Why is the principal eigenvector necessary , 2003, Eur. J. Oper. Res..

[9]  Liu Hongxia,et al.  A privacy-preserving access control in outsourced storage services , 2011, 2011 IEEE International Conference on Computer Science and Automation Engineering.

[10]  Lei Chen,et al.  A framework for privacy-preserving healthcare data sharing , 2012, 2012 IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom).

[11]  Amjad Gawanmeh,et al.  Challenges in Formal Methods for Testing and Verification of Cloud Computing Systems , 2015, Scalable Comput. Pract. Exp..

[12]  Hanan El Bakkali,et al.  PPAMH: A novel privacy-preserving approach for mobile healthcare , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).

[13]  Amjad Gawanmeh An axiomatic model for formal specification requirements of ubiquitous healthcare systems , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).

[14]  D. Parker Verification of Probabilistic Real-time Systems , 2013 .

[15]  Yang Xin,et al.  Full privacy preserving electronic voting scheme , 2012 .

[16]  Michael Rovatsos,et al.  Privacy Policy Negotiation in Social Media , 2014, TAAS.

[17]  Socrates H. Tuch Health Insurance Portability and Accountability Act of 1996. Public Law 104-191. , 1996, United States statutes at large.

[18]  Renato Iannella,et al.  Privacy oriented access control for electronic health records , 2012, WWW 2012.

[19]  David W. Chadwick,et al.  A privacy preserving authorisation system for the cloud , 2012, J. Comput. Syst. Sci..

[20]  Julita Vassileva,et al.  P2U: A Privacy Policy Specification Language for Secondary Data Sharing and Usage , 2014, 2014 IEEE Security and Privacy Workshops.

[21]  M SuchJose,et al.  Privacy Policy Negotiation in Social Media , 2016 .

[22]  Mahmoud Al-Qutayri,et al.  Reliability analysis of healthcare information systems: State of the art and future directions , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).

[23]  Marta Z. Kwiatkowska,et al.  PRISM 4.0: Verification of Probabilistic Real-Time Systems , 2011, CAV.

[24]  Joel J. P. C. Rodrigues,et al.  Mobile-health: A review of current state in 2015 , 2015, J. Biomed. Informatics.

[25]  Osman Hasan,et al.  Formal reliability analysis of Device Interoperability Middleware (DIM) based E-health system using PRISM , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).

[26]  Amit Sahu A Review on Enhancing Privacy Preservation of Web Service through Negotiation Mechanism , 2015 .

[27]  Eugeniusz J. Sobczyk,et al.  The problem of developing prospective hard coal deposits from the point of view of social and environmental conflicts with the use of AHP method , 2013 .

[28]  Vallipuram Muthukkumarasamy,et al.  Enhancing Trust on e-Government: A Decision Fusion Module , 2009, 2009 Third International Conference on Network and System Security.

[29]  Sofiène Tahar,et al.  Formal reliability analysis of a typical FHIR standard based e-Health system using PRISM , 2014, 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom).

[30]  Dickson K. W. Chiu,et al.  Enabling Web Services Policy Negotiation with Privacy preserved using XACML , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[31]  Thomas L. Saaty,et al.  DECISION MAKING WITH THE ANALYTIC HIERARCHY PROCESS , 2008 .

[32]  Ilaria Matteucci,et al.  A prototype for solving conflicts in XACML-based e-Health policies , 2013, Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems.

[33]  BellaGiampaolo,et al.  Enforcing privacy in e-commerce by balancing anonymity and trust , 2011 .