Enabling Location Privacy and Medical Data Encryption in Patient Telemonitoring Systems

Patient telemonitoring systems (PTS) deal with the acquisition, processing, and secure transmission of a patient's physiological and physical parameters to a remote location, where expert medical knowledge is available. In emergency situations, when the patient's life is threatened, the trend in modern PTS is to transmit the current location of the patient. Although research in communications security has led to mechanisms that sufficiently protect medical data, research related to location privacy area is still in its early stages. This paper proposes an architecture that enhances PTS through location privacy and data encryption. We study the most popular PTS technologies in conjunction with location privacy architectures and propose an innovative scheme that exploits a point-to-point protocol called Mist. We describe a prototype implementation, developed for validating the proposed framework along with the corresponding evaluation results.

[1]  Marios S. Pattichis,et al.  Wireless telemedicine systems: an overview , 2002 .

[2]  Jeff Magee,et al.  Security Considerations for a Distributed Location Service , 1998, Journal of Network and Systems Management.

[3]  Bradley Malin,et al.  A computational model to protect patient data from location-based re-identification , 2007, Artif. Intell. Medicine.

[4]  Atsushi Kara Protecting Privacy in Remote-Patient Monitoring , 2001, Computer.

[5]  Costas Lambrinoudakis,et al.  Risk analysis of a patient monitoring system using Bayesian Network modeling , 2006, J. Biomed. Informatics.

[6]  Golden G. Richard,et al.  Service and Device Discovery : Protocols and Programming , 2002 .

[7]  Arjen K. Lenstra,et al.  Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.

[8]  Vimla L. Patel,et al.  Usability in the real world: assessing medical information technologies in patients' homes , 2003, J. Biomed. Informatics.

[9]  T. Evans,et al.  Cardiac arrests outside hospital , 1998, BMJ.

[10]  Balázs Benyó,et al.  An open architecture patient monitoring system using standard technologies , 2002, IEEE Transactions on Information Technology in Biomedicine.

[11]  Jean Luprano,et al.  Homecare: a telemedical application. , 2003, Medical device technology.

[12]  D. Hailey,et al.  Systematic review of evidence for the benefits of telemedicine , 2002, Journal of telemedicine and telecare.

[13]  J. Marc Overhage,et al.  Application of Information Technology: A Context-sensitive Approach to Anonymizing Spatial Surveillance Data: Impact on Outbreak Detection , 2006, J. Am. Medical Informatics Assoc..

[14]  Marco Gruteser,et al.  Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2003, WMASH '03.

[15]  Vincent M. Stanford,et al.  Pervasive Health Care Applications Face Tough Security Challenges , 2002, IEEE Pervasive Comput..

[16]  W. Yasnoff,et al.  Privacy, confidentiality, and security in information systems of state health agencies. , 1999, American journal of preventive medicine.

[17]  Maged N Kamel Boulos,et al.  The perceived impact of location privacy: A web-based survey of public health perspectives and requirements in the UK and Canada , 2008, BMC public health.

[18]  Ted Kremenek,et al.  A Probabilistic Room Location Service for Wireless Networked Environments , 2001, UbiComp.

[19]  Dogan Kesdogan,et al.  Variable and scalable security: protection of location information in mobile IP , 1996, Proceedings of Vehicular Technology Conference - VTC.

[20]  J.C. Lin,et al.  Applying telecommunication technology to health-care delivery , 1999, IEEE Engineering in Medicine and Biology Magazine.

[21]  M. Dennis Mickunas,et al.  Routing through the Mist : Design and Implementation , 2002 .

[22]  Yurong Xu,et al.  Providing location privacy in assisted living environments , 2008, PETRA '08.

[23]  S. Barro,et al.  Intelligent telemonitoring of critical-care patients. , 1999, IEEE engineering in medicine and biology magazine : the quarterly magazine of the Engineering in Medicine & Biology Society.

[24]  Eric S. Hall,et al.  Enabling remote access to personal electronic medical records. , 2003, IEEE engineering in medicine and biology magazine : the quarterly magazine of the Engineering in Medicine & Biology Society.

[25]  V. Traver,et al.  Multiagent home telecare platform for patients with cardiac diseases , 2003, Computers in Cardiology, 2003.

[26]  Leonidas Kazatzopoulos,et al.  Share the Secret: Enabling Location Privacy in Ubiquitous Environments , 2005, LoCA.

[27]  A Allen,et al.  Technical and clinical progress in telemedicine. , 1999, JAMA.

[28]  Roy H. Campbell,et al.  Routing through the mist: privacy preserving communication in ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[29]  Sotiris Pavlopoulos,et al.  A novel emergency telemedicine system based on wireless communication technology-AMBULANCE , 1998, IEEE Transactions on Information Technology in Biomedicine.

[30]  G Kambourakis,et al.  PKI-based secure mobile access to electronic health services and data. , 2005, Technology and health care : official journal of the European Society for Engineering and Medicine.

[31]  Peter Reichl,et al.  Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks , 1998, ESORICS.

[32]  G. Passariello,et al.  Intelligent patient monitoring and management systems: a review , 1993, IEEE Engineering in Medicine and Biology Magazine.

[33]  Ilias Maglogiannis,et al.  Design and Implementation of a Calibrated Store and Forward Imaging System for Teledermatology , 2004, Journal of Medical Systems.

[34]  Irini Reljin,et al.  Telemonitoring in cardiology - ECG transmission by mobile phone , 2001 .

[35]  D. Hayn,et al.  Telemedicine framework for manufacturer independent remote pacemaker follow-up , 2005, Computers in Cardiology, 2005.

[36]  Yuan-Ting Zhang,et al.  Implementation of a WAP-based telemedicine system for patient monitoring , 2003, IEEE Transactions on Information Technology in Biomedicine.

[37]  I. Crombie The Audit Handbook: Improving Health Care through Clinical Audit , 1993 .

[38]  T. Frieden,et al.  Ethics in public health research: privacy and public health at risk: public health confidentiality in the digital age. , 2008, American journal of public health.

[39]  Dogan Kesdogan,et al.  Analysis of Security and Privacy in Mobile-IP , 1996 .

[40]  Eran Tromer,et al.  On the Cost of Factoring RSA-1024 , 2003 .