Enhancing privacy on Mobile Health: An integrated privacy module

The evolution of mobile communication in the health sector has improved patients' quality of care. Nowadays, doctors can make diagnosis even though the patient is miles away using mobile technologies such as smart phones or tablet PCs. Nevertheless, the exchange of medical information through mobile devices brings on serious threats to patients' privacy. We believe that privacy must be considered during the development of any mobile healthcare system. In this paper we discuss the efficiency of current privacy and security protection mechanisms used in current mobile systems. The nature and the diversity of medical information shared between different entities (physicians, hospitals, laboratories, pharmacies...) increases privacy and security risks. Thus, we introduce a new conceptual module to preserve privacy in mobile healthcare. By integrating this module into current mobile healthcare systems architecture, we obtain a privacy-preserving system enabling patients to monitor and manage the disclosure of their sensitive health information during a mobile transaction.

[1]  Mauro Conti,et al.  An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments , 2014, IEEE Transactions on Services Computing.

[2]  Xiaodong Lin,et al.  SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.

[3]  Jie Huang,et al.  A Hierarchical Framework for Secure and Scalable EHR Sharing and Access Control in Multi-cloud , 2012, 2012 41st International Conference on Parallel Processing Workshops.

[4]  William J. Buchanan,et al.  Monitoring information security risks within health care , 2013, Comput. Secur..

[5]  David Kotz,et al.  Privacy in mobile technology for personal healthcare , 2012, CSUR.

[6]  Yuguang Fang,et al.  CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring , 2013, IEEE Transactions on Information Forensics and Security.

[7]  Karen Renaud,et al.  Privacy: Aspects, definitions and a multi-faceted privacy preservation approach , 2010, 2010 Information Security for South Africa.

[8]  I-En Liao,et al.  A searchable encryption scheme for outsourcing cloud storage , 2012, 2012 IEEE International Conference on Communication, Networks and Satellite (ComNetSat).

[9]  Yuguang Fang,et al.  Security and Privacy for Mobile Health-Care (m-Health) Systems , 2012 .

[10]  Flora Malamateniou,et al.  Enabling data protection through PKI encryption in IoT m-Health devices , 2012, 2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE).

[11]  W.D. Yu,et al.  A web-based wireless mobile system design of security and privacy framework for u-Healthcare , 2008, HealthCom 2008 - 10th International Conference on e-health Networking, Applications and Services.

[12]  B. Achiriloaie,et al.  VI REFERENCES , 1961 .

[13]  Vallipuram Muthukkumarasamy,et al.  Enhancing Trust on e-Government: A Decision Fusion Module , 2009, 2009 Third International Conference on Network and System Security.

[14]  Ayman I. Kayssi,et al.  Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[15]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[16]  Julian Jang,et al.  Security analysis of mobile applications: A case study of a collaboration tool in healthcare , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[17]  F. Kaneyasu,et al.  System requirements for an electronic health record system using smartphones for homecare , 2012, 2012 Proceedings of PICMET '12: Technology Management for Emerging Technologies.

[18]  Giampaolo Bella,et al.  Enforcing privacy in e-commerce by balancing anonymity and trust , 2011, Comput. Secur..

[19]  Eduardo B. Fernandez,et al.  Security in Data Intensive Computing Systems , 2011 .