Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment

Social media has enabled information-sharing across massively large networks of people without spending much financial resources and time that are otherwise required in the print and electronic media. Mobile-based social media applications have overwhelmingly changed the information-sharing perspective. However, with the advent of such applications at an unprecedented scale, the privacy of the information is compromised to a larger extent if breach mitigation is not adequate. Since healthcare applications are also being developed for mobile devices so that they also benefit from the power of social media, cybersecurity privacy concerns for such sensitive applications have become critical. This article discusses the architecture of a typical mobile healthcare application, in which customized privacy levels are defined for the individuals participating in the system. It then elaborates on how the communication across a social network in a multi-cloud environment can be made more secure and private, especially for healthcare applications.

[1]  Sophia Alim,et al.  Impact of social media usage on students academic performance in Saudi Arabia , 2015, Comput. Hum. Behav..

[2]  Adriana Vlad,et al.  Unifying running-key approach and logistic map to generate enciphering sequences , 2013, Ann. des Télécommunications.

[3]  Walter Willinger,et al.  10 Lessons from 10 Years of Measuring and Modeling the Internet's Autonomous Systems , 2011, IEEE Journal on Selected Areas in Communications.

[4]  Haider Abbas,et al.  A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata , 2013, J. Netw. Comput. Appl..

[5]  Azzedine Boukerche,et al.  A secure mobile healthcare system using trust-based multicast scheme , 2009, IEEE Journal on Selected Areas in Communications.

[6]  Yong Chen,et al.  Security Risks and Protection in Online Learning: A Survey. , 2013 .

[7]  Helvi Kyngäs,et al.  The effects of a counselling intervention on lifestyle change in people at risk of cardiovascular disease , 2015, European journal of cardiovascular nursing : journal of the Working Group on Cardiovascular Nursing of the European Society of Cardiology.

[8]  Abdelouahid Derhab,et al.  Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society , 2015, Comput. Hum. Behav..

[9]  Wu He,et al.  A review of social media security risks and mitigation techniques , 2012, J. Syst. Inf. Technol..

[10]  Ian Brissette,et al.  The role of optimism in social network development, coping, and psychological adjustment during a life transition. , 2002, Journal of personality and social psychology.

[11]  Yongqiang Sun,et al.  The privacy-personalization paradox in mHealth services acceptance of different age groups , 2016, Electron. Commer. Res. Appl..

[12]  Yiwen Gao,et al.  International Journal of Medical Informatics , 2016 .

[13]  Marcin Luckner,et al.  On the testing of network cyber threat detection methods on spam example , 2014, Ann. des Télécommunications.

[14]  Mark Terry,et al.  Twittering healthcare: social media and medicine. , 2009, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.

[15]  Duncan Chambers,et al.  Social Network Analysis in Healthcare Settings: A Systematic Scoping Review , 2012, PloS one.

[16]  I. Ajzen The theory of planned behavior , 1991 .

[17]  F. Griffiths,et al.  Social networks--the future for health care delivery. , 2012, Social science & medicine.

[18]  InduShobha N. Chengalur-Smith,et al.  An overview of social engineering malware: Trends, tactics, and implications , 2010 .

[19]  J. Sarasohn-Kahn The Wisdom of Patients: Health Care Meets Online Social Media , 2008 .

[20]  Joel J. P. C. Rodrigues,et al.  Mobile-health: A review of current state in 2015 , 2015, J. Biomed. Informatics.

[21]  Min-Shiang Hwang,et al.  Challenges in E-Government and Security of Information , 2004 .

[22]  Wojciech Mazurczyk,et al.  Network forensics and challenges for cybersecurity , 2014, Ann. des Télécommunications.

[23]  Daniel J. Brass,et al.  Social Networks and Perceptions of Intergroup Conflict: The Role of Negative Relationships and Third Parties , 1998 .

[24]  Basit Shahzad,et al.  Does a Change in Weekend Days Have an Impact on Social Networking Activity? , 2014, J. Univers. Comput. Sci..

[25]  Patricia A. H. Williams,et al.  Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem , 2015, Medical devices.

[26]  Lada A. Adamic,et al.  The role of social networks in information diffusion , 2012, WWW.

[27]  Sonia Livingstone,et al.  Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression , 2008, New Media Soc..

[28]  Robert H. Deng,et al.  Privacy leakage analysis in online social networks , 2015, Comput. Secur..

[29]  Yuguang Fang,et al.  Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.

[30]  G. S. O'Keeffe,et al.  The Impact of Social Media on Children, Adolescents, and Families , 2011, Pediatrics.

[31]  Bruno S. Silvestre,et al.  Unpacking the Social Media Phenomenon: Towards a Research Agenda , 2012 .

[32]  Maumita Bhattacharya,et al.  Countering Social Engineering Through Social Media: An Enterprise Security Perspective , 2015, ICCCI.

[33]  Gary L. Kreps,et al.  New directions in eHealth communication: opportunities and challenges. , 2010, Patient education and counseling.

[34]  Haider Abbas,et al.  Cloud Computing Risk Assessment: A Systematic Literature Review , 2014 .

[35]  Özgür Külcü,et al.  Privacy in social networks: An analysis of Facebook , 2014, Int. J. Inf. Manag..

[36]  W. Dressler,et al.  The Health Consequences of Cultural Consonance: Cultural Dimensions of Lifestyle, Social Support, and Arterial Blood Pressure in an African American Community , 2000 .

[37]  Mehmet A. Orgun,et al.  Secure transfer of environmental data to enhance human decision accuracy , 2015, Comput. Hum. Behav..

[38]  Soner Yıldırım,et al.  Understanding the perception towards using mHealth applications in practice , 2018 .

[39]  Jessica Castner,et al.  Health care provider social network analysis: A systematic review. , 2015, Nursing outlook.

[40]  W. Chou,et al.  Social Media Use in the United States: Implications for Health Communication , 2009, Journal of medical Internet research.

[41]  Cem Ersoy,et al.  Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.

[42]  Kalina Bontcheva,et al.  Making sense of social media streams through semantics: A survey , 2014, Semantic Web.

[43]  B Balamurugan,et al.  Social Network Analysis in Healthcare , 2017 .

[44]  John-Paul Hatala Social Network Analysis in Human Resource Development: A New Methodology , 2006 .

[45]  Brandon Van Der Heide,et al.  Too Much of a Good Thing? The Relationship Between Number of Friends and Interpersonal Impressions on Facebook , 2008, J. Comput. Mediat. Commun..

[46]  M. Hendryx,et al.  Access to health care and community social capital. , 2002, Health services research.

[47]  Daniel E. Geer,et al.  Mobile Code Security , 1998, IEEE Internet Comput..

[48]  C. Kruse,et al.  Cybersecurity in healthcare: A systematic review of modern threats and trends. , 2017, Technology and health care : official journal of the European Society for Engineering and Medicine.