How to Realize Device Interoperability and Information Security in mHealth Applications

More and more people suffer from chronic diseases such as the chronic obstructive pulmonary disease (COPD). This leads to very high treatment costs every year, as such patients require a periodic screening of their condition. However, many of these checks can be performed at home by the patients themselves. This enables physicians to focus on actual emergencies. Modern smart devices such as Smartphones contribute to the success of these telemedical approaches. So-called mHealth apps combine the usability and versatility of Smartphones with the high accuracy and reliability of medical devices for home use. However, patients often face the problem of how to connect medical devices to their Smartphones (the device interoperability problem). Moreover, many patients reject mHealth apps due to the lack of control over their sensitive health data (the information security problem).

[1]  Pascal Hirmer,et al.  Towards a Rule-based Manufacturing Integration Assistant☆ , 2016 .

[2]  Ryan J. Halter,et al.  Amulet: An Energy-Efficient, Multi-Application Wearable Platform , 2016, SenSys.

[3]  Naresh Gupta,et al.  Inside Bluetooth Low Energy , 2016 .

[4]  Tun-Wen Pai,et al.  Smartphone Indoor Localization with Accelerometer and Gyroscope , 2014, 2014 17th International Conference on Network-Based Information Systems.

[5]  Lirong Dai,et al.  Issues and Challenges in Securing eHealth Systems , 2014, Int. J. E Health Medical Commun..

[6]  Muttukrishnan Rajarajan,et al.  Device Data Protection in Mobile Healthcare Applications , 2008, eHealth.

[7]  Matthias Wieland,et al.  ECHO - An mHealth Solution to Support Treatment of Chronic Patients , 2016, ZEUS.

[8]  Ying Zhang,et al.  An empirical characterization of IFTTT: ecosystem, usage, and performance , 2017, Internet Measurement Conference.

[9]  Misha Pavel,et al.  Mobile Health: Revolutionizing Healthcare Through Transdisciplinary Research , 2013, Computer.

[10]  Bernhard Mitschang,et al.  Design and Implementation of the Privacy Management Platform , 2014, 2014 IEEE 15th International Conference on Mobile Data Management.

[11]  John Herbert,et al.  Data Management within mHealth Environments: Patient Sensors, Mobile Devices, and Databases , 2012, JDIQ.

[12]  Christoph Stach,et al.  TIROL: The Extensible Interconnectivity Layer for mHealth Applications , 2017, ICIST.

[13]  Bernhard Mitschang,et al.  Privacy Management for Mobile Platforms -- A Review of Concepts and Approaches , 2013, 2013 IEEE 14th International Conference on Mobile Data Management.

[14]  Silvia Jiménez-Fernández,et al.  Telemedicine Experience for Chronic Care in COPD , 2006, IEEE Transactions on Information Technology in Biomedicine.

[15]  Jian Lu,et al.  B-Loc: Scalable Floor Localization Using Barometer on Smartphone , 2014, 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems.

[16]  Emil Jovanov,et al.  APPLICATIONS OF SMARTPHONES FOR UBIQUITOUS HEALTH MONITORING AND WELLBEING MANAGEMENT , 2011 .

[17]  Bernhard Mitschang,et al.  The AVARE PATRON - A Holistic Privacy Approach for the Internet of Things , 2018 .

[18]  Christoph Stach Secure Candy Castle - A Prototype for Privacy-Aware mHealth Apps , 2016, 2016 17th IEEE International Conference on Mobile Data Management (MDM).

[19]  Bernhard Mitschang,et al.  An Integrated mHealth Solution for Enhancing Patients’ Health Online , 2015 .

[20]  Bernhard Mitschang,et al.  Curator --- a secure shared object store: design, implementation, and evaluation of a manageable, secure, and performant data exchange mechanism for smart devices , 2018, SAC.

[21]  Magnus Moar,et al.  On the importance of locations in therapeutic serious games: Review on current health games and how they make use of the urban landscape , 2011, 2011 5th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops.

[22]  Reihaneh Safavi-Naini,et al.  A rights management approach to protection of privacy in a cloud of electronic health records , 2011, DRM '11.

[23]  Byung-Gon Chun,et al.  TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.

[24]  Joel J. P. C. Rodrigues,et al.  Mobile-health: A review of current state in 2015 , 2015, J. Biomed. Informatics.

[25]  Christina Synowiec,et al.  The Economics of eHealth and mHealth , 2012, Journal of health communication.

[26]  Jean-Yves Fourniols,et al.  Smart wearable systems: Current status and future challenges , 2012, Artif. Intell. Medicine.

[27]  Hongwei Xie,et al.  A Reliability-Augmented Particle Filter for Magnetic Fingerprinting Based Indoor Localization on Smartphone , 2016, IEEE Transactions on Mobile Computing.

[28]  Dan Siewiorek,et al.  Generation smartphone , 2012, IEEE Spectrum.

[29]  Matthew Green,et al.  Securing medical records on smart phones , 2009, SPIMACS '09.

[30]  Frank Leymann,et al.  ChronicOnline: Implementing a mHealth solution for monitoring and early alerting in chronic obstructive pulmonary disease , 2017, Health Informatics J..

[31]  Yuval Elovici,et al.  Database encryption: an overview of contemporary challenges and design considerations , 2010, SGMD.

[32]  Ilkka Korhonen,et al.  Empowering Citizens for Well-being and Chronic Disease Management With Wellness Diary , 2010, IEEE Transactions on Information Technology in Biomedicine.

[33]  Jeremy Hilton,et al.  A Reference Model of Information Assurance & Security , 2013, 2013 International Conference on Availability, Reliability and Security.

[34]  Ioannis Kouris,et al.  Identifying risky environments for COPD patients using smartphones and internet of things objects , 2014, Int. J. Comput. Intell. Stud..

[35]  Bernhard Mitschang,et al.  Rule-based integration of smart services using the manufacturing service bus , 2017, 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).

[36]  James Oberg Up, up, and away , 2012, IEEE Spectrum.

[37]  Benjamin L. Schooley,et al.  A secure mHealth application for EMS: design and implementation , 2013, Wireless Health.

[38]  Gurpreet Dhillon,et al.  Technical opinion: Information system security management in the new millennium , 2000, CACM.

[39]  Bernhard Mitschang,et al.  Extended provisioning, security and analysis techniques for the ECHO health data management system , 2016, Computing.

[40]  David A. Huffaker,et al.  Mobile health apps: adoption, adherence, and abandonment , 2015, UbiComp/ISWC Adjunct.

[41]  Blase Ur,et al.  Practical trigger-action programming in the smart home , 2014, CHI.

[42]  Bernhard Mitschang,et al.  The Privacy Management Platform - An Enabler for Device Interoperability and Information Security in mHealth Applications , 2018, HEALTHINF.

[43]  Catarina Silva,et al.  Location Privacy Concerns in Mobile Applications , 2018 .

[44]  Minho Shin,et al.  Hide-n-Sense: Preserving Privacy Efficiently in Wireless mHealth , 2014 .

[45]  Frank Dürr,et al.  How a Pattern-based Privacy System Contributes to Improve Context Recognition , 2018, 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).