skip to main content
10.1145/2070425.2070458acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

An approach to enhance the security of remote health monitoring systems

Published:14 November 2011Publication History

ABSTRACT

Remote health monitoring systems help in improving the quality of care and offer a solution for people who require monitoring from home. These systems collect relevant data and transmit them to the healthcare provider, to be stored on their servers in the form of patients' Electronic Health Records (EHRs). With such a system, healthcare professionals can remotely access each patient's EHR on their mobile devices, for instance, when they are at the patients' homes. They may need to access patients' EHR for obtaining the history of the patient's medical records or modifying the patient's EHR. Among the main concerns in acceptance of these systems, the privacy of personally sensitive information and securing EHRs during the transmission must be addressed. It is specifically important to secure the transmission of the patient's EHR between the healthcare provider server and the mobile device being used by the healthcare professional, as their communication is normally via unsecure networks, such as the Internet. In this paper, a trust negotiation approach is proposed to address these security concerns. Trust negotiation is combined with the Transport Layer Security (TLS) as the underlying protocol. This combination of technology aims at maximizing the security of the remote monitoring system. It results in significant improvements in security compared to the traditional identity-based only access control techniques. The proposed approach is implemented as a mobile application. It demonstrates that the developed application is easy to use and deploy in typical mobile environments.

References

  1. Yamazaki, A., Koyama, A., Arai, J. and Barolli, L. Implementation and Evaluation of a Ubiquitous Health Monitoring System. City, 2009.Google ScholarGoogle Scholar
  2. Choi, J. M., Choi, B. H., Seo, J. W., Sohn, R. H., Ryu, M. S., Yi, W. and Park, K. S. A System for Ubiquitous Health Monitoring in the Bedroom via a Bluetooth Network and Wireless LAN. City, 2004.Google ScholarGoogle Scholar
  3. Seamons, K. TrustBuilder: Automated Trust Negotiation in Open Systems. In Proceedings of the 3rd Annual PKI R&D Workshop (Gaithersburg- Brigham Young University, 2004), {insert City of Publication},{insert 2004 of Publication}.Google ScholarGoogle Scholar
  4. Vawdrey, D. K., Sundelin, T. L., Seamons, K. E. and Knutson, C. D. Trust negotiation for authentication and authorization in healthcare information systems. City, 2003.Google ScholarGoogle Scholar
  5. Asokan, N. and Tarkkala, L. Issues in initializing security. City, 2005.Google ScholarGoogle Scholar
  6. Ajayi, O., Sinnott, R. and Stell, A. Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems. City, 2007.Google ScholarGoogle Scholar
  7. Han, R.-F., Wang, H.-X., Wang, Y.-H. and Zuo, K.-L. Membership-Based Access Control for Trust Negotiation in Open Systems. City, 2009.Google ScholarGoogle Scholar
  8. Aycock, J. A brief history of just-in-time. ACM Comput. Surv., 35, 2 2003), 97--113. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Android SDK. 2011, http://developer.android.com/sdk/index.htmlGoogle ScholarGoogle Scholar
  10. Java Development Kit (JDK) http://java.sun.com/products/archive/jdk/1.1.8_010/.Google ScholarGoogle Scholar
  11. Eclipse - The Eclipse Foundation open source community website., http://www.eclipse.org/.Google ScholarGoogle Scholar
  12. JSON. www.json.org.Google ScholarGoogle Scholar

Index Terms

  1. An approach to enhance the security of remote health monitoring systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SIN '11: Proceedings of the 4th international conference on Security of information and networks
      November 2011
      276 pages
      ISBN:9781450310208
      DOI:10.1145/2070425

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 November 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate102of289submissions,35%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader