skip to main content
10.1145/2070425.2070458acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

An approach to enhance the security of remote health monitoring systems

Published: 14 November 2011 Publication History

Abstract

Remote health monitoring systems help in improving the quality of care and offer a solution for people who require monitoring from home. These systems collect relevant data and transmit them to the healthcare provider, to be stored on their servers in the form of patients' Electronic Health Records (EHRs). With such a system, healthcare professionals can remotely access each patient's EHR on their mobile devices, for instance, when they are at the patients' homes. They may need to access patients' EHR for obtaining the history of the patient's medical records or modifying the patient's EHR. Among the main concerns in acceptance of these systems, the privacy of personally sensitive information and securing EHRs during the transmission must be addressed. It is specifically important to secure the transmission of the patient's EHR between the healthcare provider server and the mobile device being used by the healthcare professional, as their communication is normally via unsecure networks, such as the Internet. In this paper, a trust negotiation approach is proposed to address these security concerns. Trust negotiation is combined with the Transport Layer Security (TLS) as the underlying protocol. This combination of technology aims at maximizing the security of the remote monitoring system. It results in significant improvements in security compared to the traditional identity-based only access control techniques. The proposed approach is implemented as a mobile application. It demonstrates that the developed application is easy to use and deploy in typical mobile environments.

References

[1]
Yamazaki, A., Koyama, A., Arai, J. and Barolli, L. Implementation and Evaluation of a Ubiquitous Health Monitoring System. City, 2009.
[2]
Choi, J. M., Choi, B. H., Seo, J. W., Sohn, R. H., Ryu, M. S., Yi, W. and Park, K. S. A System for Ubiquitous Health Monitoring in the Bedroom via a Bluetooth Network and Wireless LAN. City, 2004.
[3]
Seamons, K. TrustBuilder: Automated Trust Negotiation in Open Systems. In Proceedings of the 3rd Annual PKI R&D Workshop (Gaithersburg- Brigham Young University, 2004), {insert City of Publication},{insert 2004 of Publication}.
[4]
Vawdrey, D. K., Sundelin, T. L., Seamons, K. E. and Knutson, C. D. Trust negotiation for authentication and authorization in healthcare information systems. City, 2003.
[5]
Asokan, N. and Tarkkala, L. Issues in initializing security. City, 2005.
[6]
Ajayi, O., Sinnott, R. and Stell, A. Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems. City, 2007.
[7]
Han, R.-F., Wang, H.-X., Wang, Y.-H. and Zuo, K.-L. Membership-Based Access Control for Trust Negotiation in Open Systems. City, 2009.
[8]
Aycock, J. A brief history of just-in-time. ACM Comput. Surv., 35, 2 2003), 97--113.
[9]
Android SDK. 2011, http://developer.android.com/sdk/index.html
[10]
Java Development Kit (JDK) http://java.sun.com/products/archive/jdk/1.1.8_010/.
[11]
Eclipse - The Eclipse Foundation open source community website., http://www.eclipse.org/.
[12]
JSON. www.json.org.

Cited By

View all

Index Terms

  1. An approach to enhance the security of remote health monitoring systems

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SIN '11: Proceedings of the 4th international conference on Security of information and networks
    November 2011
    276 pages
    ISBN:9781450310208
    DOI:10.1145/2070425
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • SDU: Suleyman Demirel University
    • AOARD: Asian Office of Aerospace Research and Development
    • RDECOM: U.S. Army Research, Development and Engineering Command
    • US Army ITC-PAC Asian Research Office
    • AFOSR: AFOSR
    • ONRGlobal: U.S. Office of Naval Research Global
    • Macquarie University-Sydney

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 November 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. e-health security
    2. mobile application
    3. remote health monitoring
    4. tls protocol.
    5. trust negotiations

    Qualifiers

    • Research-article

    Conference

    SIN 2011

    Acceptance Rates

    Overall Acceptance Rate 102 of 289 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 18 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)A Blockchain and IoT-Enabled Secure Health Data Handling Framework2023 Seventh International Conference on Advances in Biomedical Engineering (ICABME)10.1109/ICABME59496.2023.10293065(184-189)Online publication date: 12-Oct-2023
    • (2017)Internet of Things ApplicationsThe Internet of Things10.4018/978-1-5225-1832-7.ch015(323-352)Online publication date: 2017
    • (2016)Internet of Things ApplicationsInnovative Research and Applications in Next-Generation High Performance Computing10.4018/978-1-5225-0287-6.ch016(397-427)Online publication date: 2016
    • (2013)Preserving the Privacy of Patient Records in Health Monitoring SystemsTheory and Practice of Cryptography Solutions for Secure Information Systems10.4018/978-1-4666-4030-6.ch019(499-529)Online publication date: 2013

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media