Haze-Assisted Confidentiality Conserving Mobile Health Monitoring

R Konda Reddy, Aluru Subramanyam

Abstract


Haze-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and Haze computing technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the healthcare cost. Unfortunately, it  also  poses  a  serious  risk  on  both  clients Confidentiality and intellectual property of monitoring service providers, which could deter the wide adoption of mHealth technology. This paper is to address this important problem and design a Hazeassisted Confidentiality Conserving mobile health monitoring system to protect the Confidentiality of the involved parties and their data. Moreover, the outsourcing decryption technique and a newly proposed key private proxy re-encryption are adapted to shift the computational complexity of the involved parties to the Haze without compromising clients’ Confidentiality and service providers’ intellectual property. Finally, our security and performance analysis demonstrates the effectiveness of our proposed design.


Keywords


Mobile health (mHealth), Healthcare,Confidentiality, Outsourcing decryption, Key private Proxy re encryption.

References


P. Mohan, D. Marin, S. Sultan, and A. Deen, “Medinet: personalizing the self-care process for patients with diabetes and cardiovascular disease using mobile telephony.” Conference Proceedings of the InternationalConference of IEEE Engineering in Medicine and BiologySociety, vol.2008, no. 3, pp. 755–758.

A. Tsanas, M. Little, P. McSharry, and L. Ramig,“Accurate telemonitoring of parkinson’s disease progression by noninvasive speech tests,”Biomedical Engineering, IEEE Transactions on, vol. 57, no. 4, pp. 884 – 893, 2010.

G. Clifford and D. Clifton, “Wireless technology in disease management and medicine,” Annual Review of Medicine, vol. 63, pp. 479 – 492, 2012.

L. Ponemon Institute,“Americans’ opinions on healthcare Confidentiality, available: http://tinyurl.com/4atsdlj,” 2010.

A. V. Dhukaram, C. Baber, L. Elloumi, B.J. van Beijnum, and P. D. Stefanis, “End-user perception towards pervasive cardiac healthcare services: Benefits, acceptance, adoption, risks, security, Confidentiality and trust,” inPervasiveHealth, 2011, pp. 478–484.

M. Delgado, “The evolution of health care it: Are current u.sConfidentiality policies ready for the Hazes?” in SERVICES, 2011, pp. 371 –378.

N. Singer, “When 2+ 2 equals a Confidentiality question,” New YorkTimes, 2009.

P. Baldi, R. Baronio, E. D. Cristofaro, P. Gasti, and G. Tsudik,“Countering gattaca: efficient and secure testing of fully-sequenced human genomes,” in ACM Conference on Computer and Communications Security, 2011, pp. 691–702.

A. Cavoukian, A. Fisher, S. Killen, and D. Hoffman, “Remote home health care technologies: how to ensure Confidentiality? build it in: Confidentiality by design,” Identity in the Information Society, vol. 3, no. 2, pp. 363–378, 2010.

A. Narayanan and V. Shmatikov, “Robust de-anonymization of large sparse datasets,” in Security and Confidentiality, 2008. SP 2008. IEEESymposium on. IEEE, 2008, pp. 111–125.

I. Neamatullah, M. Douglass, L. Lehman, A. Reisner, M. Villarroel, W. Long, P. Szolovits, G. Moody, R. Mark, and G. Clifford, “Automated deidentification of freetext medical records,” BMC medical informatics and decision making, vol. 8, no. 1, p. 32, 2008.

S. Al-Fedaghi and A. Al-Azmi, “Experimentation with personal identifiable information,” Intelligent Information Management, vol. 4, no. 4 , pp. 123–133, 2012.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.