Abstract
Mobile Healthcare (mHealth) systems use mobile smartphones and portable sensor kits to provide improved and affordable healthcare solutions to underserved communities or to individuals with reduced mobility who need regular monitoring. The architectural constraints of such systems provide a variety of computing challenges: the distributed nature of the system; mobility of the persons and devices involved; asynchrony in communication; security, integrity and authenticity of the data collected; and a plethora of administrative domains and the legacy of installed electronic health/medical systems.
The volume of data collected can be very large; together with the data, there is a large amount of metadata as well. We argue that certain metadata are essential for interpreting the data and assessing their quality. There is great variety in the kinds of medical data and metadata, the methods by which they are collected and administrative constraints on where they may be stored, which suggest the need for flexible distributed data repositories. There also are concerns about the veracity of the data, as well as interesting questions about who owns the data and who may access them.
We argue that traditional notions of relational databases, and security techniques such as access control and encryption of communications are inadequate. Instead, end-to-end systematic (from sensor to cloud) information flow techniques need to be applied for integrity and secrecy. These need to be adapted to work with the volume and diversity of data collected, and in a federated collection of administrative domains where data from different domains are subject to different information flow policies.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Avancha, S., Baxi, A., Kotz, D.: Privacy in mobile technology for personal healthcare. ACM Computing Surveys 45(1), 3 (2012)
Buneman, P., Khanna, S., Tan, W.-C.: Why and where: A characterization of data provenance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol. 1973, pp. 316–330. Springer, Heidelberg (2000)
Brewer, E.A.: Lessons from Giant-Scale Services. IEEE Internet Computing 5(4), 46–55 (2001)
Cheng, W., Ports, D.R.K., Schultz, D.A., Popic, V., Blankstein, A., Cowling, J.A., Curtis, D., Shrira, L., Liskov, B.: Abstractions for Usable Information Flow Control in Aeolus. In: USENIX Annual Tech. Conf., pp. 139–151 (2012)
Denning, D.E., Denning, P.J.: Certification of Programs for Secure Information Flow. Commun. ACM 20(7), 504–513 (1977)
Denning, D.E.: A Lattice Model of Secure Information Flow. Commun. ACM 19(5), 236–243 (1976)
Efstathopoulos, P., Krohn, M.N., Vandebogart, S., Frey, C., Ziegler, D., Kohler, E., Mazières, D., Kaashoek, M.F., Morris, R.: Labels and event processes in the Asbestos operating system. In: ACM Symp. on Operating Systems Principles, pp. 17–30 (2005)
Germanakos, P., Mourlas, C., Samaras, G.: A Mobile Agent Approach for Ubiquitous and Personalized eHealth Information Systems. In: Proc. of the Workshop on Personalization for e-Health of the 10th International Conf. on User Modeling, pp. 67–70 (2005)
Iordanov, B.: HyperGraphDB: A generalized graph database. In: Shen, H.T., Pei, J., Özsu, M.T., Zou, L., Lu, J., Ling, T.-W., Yu, G., Zhuang, Y., Shao, J. (eds.) WAIM 2010. LNCS, vol. 6185, pp. 25–36. Springer, Heidelberg (2010)
Kansal, A., Gupta, A.: Sensor Stack on Android for mHealth Applications. Master’s thesis, Department of Computer Science & Engineering, IIT Delhi (2014)
Kansal, A., Gupta, A., Paul, K., Prasad, S.: mDROID - An Affordable Android based mHealth System. In: International Conf. on Health Informatics. SciTePress - Science and Technology Publications (2014)
Kaashoek, F., Karger, D.R.: Koorde: A simple degree-optimal hash table. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, pp. 98–107. Springer, Heidelberg (2003)
Krohn, M.N., Yip, A., Brodsky, M.Z., Cliffer, N., Kaashoek, M.F., Kohler, E., Morris, R.: Information flow control for standard OS abstractions. In: ACM Symp. on Operating Systems Principles, pp. 321–334 (2007)
Mechael, P., Batavia, H., Kaonga, N., Searle, S., Kwan, A., Goldberger, A., Fu, L., Ossman, J.: Barriers and gaps affecting mhealth in low and middle income countries. In: A Policy White Paper commisioned by The mHealth Alliance (2010)
Myers, A.C., Liskov, B.: A Decentralized Model for Information Flow Control. In: ACM Symp. on Operating Systems Principles, pp. 129–142 (1997)
Myers, A.C., Liskov, B.: Complete, safe information flow with decentralized labels. In: Proceedings of the 1998 IEEE Symposium on Security and Privacy, pp. 186–197 (May 1998)
Otieno, C.F., Kaseje, D., Ochieng, B.M., Githae, M.N.: Reliability of community health worker collected data for planning and policy in a peri-urban area of kisumu, kenya. Journal of Community Health 37, 48–53 (2012)
Prasad, A., Peterson, R.A., Mare, S., Sorber, J., Paul, K., Kotz, D.: Provenance framework for mhealth. In: Fifth International Conference on Communication Systems and Networks, COMSNETS 2013, Bangalore, India, January 7-10, pp. 1–6 (2013)
Priyedarshi, A.: Caching and Distributed Data for Cloud-Style Computation. Master’s thesis, Department of Computer Science & Engineering, IIT Delhi (2011)
Schultz, D.A., Liskov, B.: IFDB: decentralized information flow control for databases. In: Proc. of the 8th ACM European Conf. on Computer Systems, pp. 43–56. ACM (2013)
Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 2001, pp. 149–160. ACM, New York (2001)
Shapiro, M., Preguiça, N.M., Baquero, C., Zawirski, M.: Conflict-free replicated data types. In: Défago, X., Petit, F., Villain, V. (eds.) SSS 2011. LNCS, vol. 6976, pp. 386–400. Springer, Heidelberg (2011)
Saltzer, J.H., Reed, D.P., Clark, D.D.: End-to-end arguments in system design. ACM Trans. Comput. Syst. 2(4), 277–288 (1984)
Swasthya Slate of Public health foundation of India (2012), http://www.swasthyaslate.org
WHO. mhealth: New horizons for health through mobile technologies Global Observatory for eHealth Series, 3 (2011)
WHO. Management of patient information: Trends and challenges in member states. Global Observatory for eHealth Series, 6 (2012)
Zeldovich, N., Boyd-Wickizer, S., Kohler, E., Mazières, D.: Making Information Flow Explicit in HiStar. In: USENIX Conf. on Operating Systems Design and Implementation, pp. 263–278 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Prasad, S. (2015). Designing for Scalability and Trustworthiness in mHealth Systems. In: Natarajan, R., Barua, G., Patra, M.R. (eds) Distributed Computing and Internet Technology. ICDCIT 2015. Lecture Notes in Computer Science, vol 8956. Springer, Cham. https://doi.org/10.1007/978-3-319-14977-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-14977-6_7
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14976-9
Online ISBN: 978-3-319-14977-6
eBook Packages: Computer ScienceComputer Science (R0)