skip to main content
10.1145/2457276.2457300acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmedesConference Proceedingsconference-collections
research-article

Secure data storage for mobile data collection systems

Published:28 October 2012Publication History

ABSTRACT

Wireless network infrastructures, notably cellular networks, are becoming a vital element for exchanging electronic data in low income countries. Several key sectors are already leveraging on cellular networks: mobile financial transactions have already gained an enormous success, and the health care sector is also aiming to tackle outstanding challenges like providing basic health care services to remote communities, by using cheap mobile devices. So far, more than ten mobile based health care services are deployed in low-income countries. Among those, mobile data collection is the one used to replace traditional paper form based data collection with electronic digital forms by the use of Mobile Data Collection Systems (MDCS). However, although such systems are often used to collect sensitive health-related data, critical issues like security and privacy of personal data have not been systematically addressed. Particularly, very little has been done to protect data while stored on the phone. This paper focuses on low budget mobile phones with low hardware and software specification, and proposes adequate secure solutions for data storage protection. Our secure storage scheme is flexible enough to be integrated in existing mobile client applications. The solution has been extensively tested and integrated into a production MDCS. For this work, we collaborated with the open-source mobile data collection project, openXdata.

References

  1. 3rd generation mobile telecommunications(3G). http://en.wikipedia.org/wiki/3G. Online, Accessed December 2011.Google ScholarGoogle Scholar
  2. CommCareHQ. http://www.commcarehq.org. Online, Accessed November 2011.Google ScholarGoogle Scholar
  3. T. Egeberg. Storage of sensitive data in a Java enabled cell phone. Master's thesis, Høgskolen i Gjøvik, 2006.Google ScholarGoogle Scholar
  4. Enhanced Data Rates for GSM Evolution(EDGE). http://en.wikipedia.org/wiki/Enhanced_Data_Rates_for_GSM_Evolution. Online, Accessed December 2011.Google ScholarGoogle Scholar
  5. Episurveyor. http://www.episurveyor.org/. Online, Accessed March 2011.Google ScholarGoogle Scholar
  6. S. Gejibo, K. A. Mughal, F. Mancini, J. Klungsøyrg, and R. B. Valvik. Challenges in implementing end-to-end secure protocol for java ME-based mobile data collection in low-budget settings. In ESSoS, Lecture Notes in Computer Science, pages 38--45. Springer, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. W. Itani and A. Kayssi. J2ME application-layer end-to-end security for m-commerce. Journal of Network and Computer Applications, 27(1):13--32, January 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. B. Kaliski. RFC 2898 - PKCS #5: Password-based cryptography specification. http://www.ietf.org/rfc/rfc2898.txt, 2000. Online, Accessed April 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Klungsøyr, T. Tylleskar, B. MacLeod, P. Bagyenda, W. Chen, and P. Wakholi. OMEVAC - open mobile electronic vaccine trials, an interdisciplinary project to improve quality of vaccine trials in low resource settings. In Proceedings of M4D '08 - The 1st International Conference on Mobile Communication Technology for Development, pages 36--44. Karlstad University Studies, 2008.Google ScholarGoogle Scholar
  10. T. Legion Of the Bouncy Castle. http://www.bouncycastle.org/. Online, Accessed March 2011.Google ScholarGoogle Scholar
  11. F. Mancini, K. Mughal, S. Gejibo, and J. Klungsoyr. Adding security to mobile data collection. In Healthcom 2011 - 13th IEEE International Conference on e-Health Networking Applications and Services, pages 86--89, june 2011.Google ScholarGoogle Scholar
  12. Nokia 2330c classic. http://www.developer.nokia.com/Devices/Device_specifications/2330_classic. Online, Accessed September 2011.Google ScholarGoogle Scholar
  13. Nokia Data Gathering. http://projects.developer.nokia.com/ndg. Online, Accessed November 2011.Google ScholarGoogle Scholar
  14. Nokia, Nokia Data Gatherings(NDG). https://github.com/nokiadatagathering/ndg-mobile-client. Online, Accessed September 2011.Google ScholarGoogle Scholar
  15. openXdata. http://www.openxdata.org. Online, Accessed March 2011.Google ScholarGoogle Scholar
  16. Oracle. Java ME reference. http://www.oracle.com/technetwork/java/javame/index.html. Online, Accessed March 2011.Google ScholarGoogle Scholar
  17. Oracle Inc. Security and Trust Services API for J2ME(SATSA). http://java.sun.com/products/satsa/. Online, Accessed March 2011.Google ScholarGoogle Scholar
  18. OWASP. Mobile Security Project. https://www.owasp.org/index.php/OWASP_Mobile_Security_Project. Online, Accessed March 2012.Google ScholarGoogle Scholar
  19. S. M. A. Shah, N. Gul, H. F. Ahmad, and R. Bahsoon. Secure storage and communication in J2ME based lightweight multi-agent systems. Proceedings of KES-AMSTA'08 - the 2nd KES International conference on Agent and multi-agent systems: technologies and applications, Incheon, Korea, pages 887--896. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. T. Egeberg. Storage of sensitive data in a Java enabled cell phone. http://egebergweb.com/tommy/masterfiler/masteroppgave2.pdf. Master Thesis, Accessed on March 2012.Google ScholarGoogle Scholar
  21. C. Z. G. N. W. unit based multilingual comparative analysis of text corpora. http://speechlab.tmit.bme.hu/publikaciok/. Online, Accessed January 2012.Google ScholarGoogle Scholar
  22. Vision Mobile. Global Smartphone Penetration. http://www.visionmobile.com/. Online, Accessed August 2012.Google ScholarGoogle Scholar
  23. Vital Wave Consulting. mHealth for Development: The Opportunity of Mobile Technology for Healthcare in the Developing World. Washington, D.C. and Berkshire, UK: UN Foundation-Vodafone Foundation Partnership, February 2009.Google ScholarGoogle Scholar
  24. B. Whitaker. Problems with mobile security #1. http://www.masabi.com/2007/07/13/problems-with-mobile-security-1/, July 2007. Online, Accessed March 2011.Google ScholarGoogle Scholar

Index Terms

  1. Secure data storage for mobile data collection systems

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                MEDES '12: Proceedings of the International Conference on Management of Emergent Digital EcoSystems
                October 2012
                199 pages
                ISBN:9781450317559
                DOI:10.1145/2457276
                • General Chair:
                • Janusz Kacprzyk,
                • Program Chair:
                • Dominique Laurent,
                • Publications Chair:
                • Richard Chbeir

                Copyright © 2012 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 28 October 2012

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                MEDES '12 Paper Acceptance Rate16of50submissions,32%Overall Acceptance Rate267of682submissions,39%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader