Abstract
Intelligent Information is generated with each click that we do. The systems that are responsible of this tend to have a log where they record all the accesses to them. Unfortunately, the integrity and anonymity of this vast amount of information is not always ensured. There exist many threats that can change or even delete part of these logs. One of the purposes of the Internet of Things (IoT) is to generate Intelligent Information from different sources. Therefore, if there are some irregularities, then the generated information is not useful. In this paper we present a proposal to take into account some of these threats and prevent their consequences in some eHealth systems. In order to increase the applicability of our approach, we have implemented a tool that allow us to manage communications and check whether they are performed as intended.
Research partially supported by the Spanish MEC projects ESTuDIo and DArDOS (TIN2012-36812-C02-01 and TIN2015-65845-C3-1-R) and the Comunidad de Madrid project SICOMORo-CM (S2013/ICE-3006).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alemzadeh, H., Iyer, R.K., Kalbarczyk, Z., Raman, J.: Analysis of safety-critical computer failures in medical devices. IEEE Secur. Priv. 11(4), 14–26 (2013)
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Allen, B.: The Eleven Most Implanted Medical Devices in America. http://247wallst.com/healthcare-economy/2011/07/18/the-eleven-most-implanted-medical-devices-in-america/. (2011)
Andrés, C., Merayo, M.G., Núñez, M.: Formal passive testing of timed systems: theory and tools. Softw Test. Verification Reliab. 22(6), 365–405 (2012)
Bayse, E., Cavalli, A., Núñez, M,. Zadi, F.: A passive testing approach based on invariants: application to the WAP. Comput. Netw. 48(2), 247–266 (2005)
Black, A.D., Car, J., Pagliari, C., Anandan, C., Cresswell, K., Bokun, T., McKinstry, B., Procter, R., Majeed, A., Sheikh, A.: The impact of eHealth on the quality and safety of health care: a systematic overview. PLoS Med. 8(1), e1000387 (2011)
Burleson, W., Clark, S.S., Ransford, B., Fu, K.: Design challenges for secure implantable medical devices. In: ACM/EDAC/IEEE 49th Design Automation Conference, DAC’12, pp. 12–17. IEEE Computer Society (2012)
Chadwick, P.E.: Regulations and standards for wireless applications in eHealth. In: 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC’07, pp. 6170–6173. IEEE Computer Society (2007)
Cavalli, A.R., Higashino, T., Núñez, M.: A survey on formal active and passive testing with applications to the cloud. Ann. Telecommun. 70(3–4), 85–93 (2015)
Cooper, J., James, A.: Challenges for database management in the Internet of things. IETE Tech. Rev. 26(5), 320–329 (2009)
Eysenbach, G.: What is e-Health? J. Med. Internet Res. 3(2), e20 (2001)
Gregorio, C., Núñez, M.: Denotational semantics for probabilistic refusal testing. In: Workshop on Probabilistic Methods in Verification, PROBMIV’98, ENTCS 22. Elsevier (1999)
Halperin, D., Kohno, T., Heydt-Benjamin, T.S., Fu, K., Maisel, W.H.: Security and privacy for implantable medical devices. Pervasive Comput. 7(1), 30–39 (2008)
Hierons, R.M., Merayo, M.G.: Mutation testing from probabilistic and stochastic finite state machines. J. Syst. Softw. 82(11), 1804–1818 (2009)
Hierons, R.M., Merayo, M.G., Núñez, M.: Testing from a stochastic timed system with a fault model. J. Logic Algebraic Prog. 78(2), 98–115 (2009)
Hierons, R.M., Merayo, M.G., Núñez, M.: Passive testing with asynchronous communications. In: IFIP 33rd International Conference on Formal Techniques for Distributed Systems, FMOODS/FORTE’13, LNCS, vol. 7892, pp. 99–113. Springer (2013)
Miorandi, D., Sicari, S., de Pellegrini, F., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)
National Intelligence Council. Six Technologies with Potential Impacts on US Interests Out to 2025. http://fas.org/irp/nic/disruptive.pdf. (2008)
Roman, R., Najera, P., Lopez, J.: Securing the internet of things. Computer 44(9), 51–58 (2011)
Sandler, K., Ohrstrom, L., Moy, L., McVay, R.: Killed by code: software transparency in implantable medical devices. Software Freedom Law Center (2010)
U.S. Food and Drug Administration. Medical Device Recall Report—FY2003 to FY2012, 2014
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Camacho, A., Merayo, M.G., Núñez, M. (2016). A Formal Passive Testing Approach to Control the Integrity of Private Information in eHealth Systems. In: Król, D., Madeyski, L., Nguyen, N. (eds) Recent Developments in Intelligent Information and Database Systems. Studies in Computational Intelligence, vol 642. Springer, Cham. https://doi.org/10.1007/978-3-319-31277-4_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-31277-4_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31276-7
Online ISBN: 978-3-319-31277-4
eBook Packages: EngineeringEngineering (R0)