A Secure Robust and Privacy Enhanced Mobile Healthcare Framework

A Secure Robust and Privacy Enhanced Mobile Healthcare Framework

Hisham M. Alsaghier, Shaik Shakeel Ahamad
Copyright: © 2018 |Volume: 15 |Issue: 3 |Pages: 21
ISSN: 1545-7362|EISSN: 1546-5004|EISBN13: 9781522542469|DOI: 10.4018/IJWSR.2018070104
Cite Article Cite Article

MLA

Alsaghier, Hisham M., and Shaik Shakeel Ahamad. "A Secure Robust and Privacy Enhanced Mobile Healthcare Framework." IJWSR vol.15, no.3 2018: pp.61-81. http://doi.org/10.4018/IJWSR.2018070104

APA

Alsaghier, H. M. & Ahamad, S. S. (2018). A Secure Robust and Privacy Enhanced Mobile Healthcare Framework. International Journal of Web Services Research (IJWSR), 15(3), 61-81. http://doi.org/10.4018/IJWSR.2018070104

Chicago

Alsaghier, Hisham M., and Shaik Shakeel Ahamad. "A Secure Robust and Privacy Enhanced Mobile Healthcare Framework," International Journal of Web Services Research (IJWSR) 15, no.3: 61-81. http://doi.org/10.4018/IJWSR.2018070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article describes how the exponential growth of mobile applications has changed the way healthcare services function, and mobile healthcare using the Cloud is the most promising technology for healthcare industry. The mobile healthcare industry is in a continuous transition phase that requires continual innovation. There has been identified some of the challenges in the area of security protocols for mobile health systems which still need to be addressed in the future to enable cost-effective, secure and robust mobile health systems. This article addresses these challenges by proposing a secure robust and privacy-enhanced mobile healthcare framework (SRPF) by adopting a Community Cloud (CC), WPKI cryptosystems, Universal Integrated Circuit Cards (UICCs) and a Trusted Platform Module (TPM). All the security properties are provided within this framework. SRPF overcomes replay attacks, Man in the Middle (MITM) Attacks, Impersonation attacks and Multi-Protocol attacks as SRPF was successfully verified using a scyther tool and by BAN logic.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.