Skip to main content

Operating Secure Mobile Healthcare Services over Constrained Resource Networks

  • Chapter
  • First Online:
Emergent Computation

Part of the book series: Emergence, Complexity and Computation ((ECC,volume 24))

Abstract

Constrained resource (lossy) networks are characterized by low-power and low-processing capability devices. Using lossy networks for service provision is a good approach to overcoming the technological constraints that characterize remote and rural areas of developing regions. In this chapter, we propose a framework for provisioning Healthcare-as-a-mobile-service over lossy networks, as a cost-effective approach to healthcare management in remote and rural areas of developing regions. The framework allows Healthcare providers collect and share patient data obtained via body sensors that periodically report health status information. Queries can be run locally on a mobile device when the stored copy, say on a cloud, is not accessible. Since mobile storage capacity limitations can be problematic for maintaining data consistency, we propose a storage management framework based on data fragmentation and caching. The fragmentation scheme classifies data according to confidentiality and affinity. While caching optimizes mobile storage by prioritizing data fragments in terms of frequency of access. Our experimental results demonstrate that our data fragmentation and caching algorithms are scalable to varied bandwidth and download rates. The battery power consumption is reasonable with respect to bandwidth variations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Goodman, S., Harris, A.: The coming African tsunami of information insecurity. Commun. ACM 53(12), 24–27 (2010)

    Article  Google Scholar 

  2. Greenhalgh, T., Potts, H.W., Wong, G., Bank, P., Swinglehurst, D.: Tensions and paradoxes in electronic patient record research: a systematic literature review using the meta-narrative method. Milbank Q. 87(4), 729–788 (2009)

    Article  Google Scholar 

  3. Mandl, K.D., Simons, W.W., Crawford, W., Abbett, J.M.: Indivo: a personally controlled health record for health information exchange and communication. BMC Med. Inform. Decis. Mak. 7(1), 25 (2007)

    Article  Google Scholar 

  4. Robison, J., Bai, L., Mastrogiannis, D.S., Tan, C.C., Wu, J.: A survey on phr technology. In: Proceedings of the 2012 IEEE 14th International Conference on e-Health Networking, Applications and Services, Healthcom ’12, pp. 184–189. IEEE (2012)

    Google Scholar 

  5. De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: management of access control evolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Databases, VLDB ’07, pp. 123–134. VLDB Endowment (2007)

    Google Scholar 

  6. Samarati, P., De Capitani di Vimercati, S.: Data protection in outsourcing scenarios: issues and directions. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS ’10, New York, NY, USA, ACM, pp. 1–14 (2010)

    Google Scholar 

  7. De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM Trans. Database Syst. 35(2), 12:1–12:46 (2010)

    Google Scholar 

  8. Kayem, A.V.D.M., Martin, P., Akl, S.G.: Effective cryptographic key management for outsourced dynamic data sharing environments. In: Proceedings of the 10th Annual Information Security Conference (ISSA 2011), 15–17 August 2011, Johannesburg, South Africa, pp. 1–8. IEEE (2011)

    Google Scholar 

  9. Kayem, A.V.D.M., Elgazzar, K., Martin, P.: Secure and efficient data placement in mobile healthcare services. In: Database and Expert Systems Applications—25th International Conference, DEXA 2014, Munich, Germany, 1–4 September 2014. Proceedings, Part I, pp. 352–361 (2014)

    Google Scholar 

  10. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 3rd edn. MIT Press, Cambridge (2009)

    MATH  Google Scholar 

  11. Baker, D.B., Masys, D.R.: Pcasso: a design for secure communication of personal health information via the internet. Int. J. Med. Inform. 54(2), 97–104 (1999)

    Article  Google Scholar 

  12. Grimson, J.: Delivering the electronic healthcare record for the 21st century. Int. J. Med. Inform. 64, 111–127 (2010)

    Article  Google Scholar 

  13. Adida, B., Sanyal, A., Zabak, S., Kohane, I.S., Mandl, K.D.: Indivo x: developing a fully substitutable personally controlled health record platform. In: Proceedings of the AMIA Annual Symposium, Healthcom ’12, p. 6. American Medical Informatics Association (2010)

    Google Scholar 

  14. Mandl, K.D., Mandel, J.C., Murphy, S.N., Bernstam, E.V., Ramoni, R.L., Kreda, D.A., McCoy, J.M., Adida, B., Kohane, I.S.: The smart platform: early experience enabling substitutable applications for electronic health records. J. Am. Med. Inf. Assoc. 19(4), 597–603 (2012)

    Article  Google Scholar 

  15. Win, K.T., Susilo, W., Mu, Y.: Personal health record systems and their security protection. J. Med. Syst. 30(4), 309–315 (2006)

    Article  Google Scholar 

  16. Damiani, E., De Captani Di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational dbmss. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS ’03, New York, NY, USA, ACM, pp. 93–102 (2003)

    Google Scholar 

  17. Damiani, E., De Captani Di Vimercati, S., Finetti, M., Paraboschi, S., Samarati, P., Jajodia, S.: Implementation of a storage mechanism for untrusted dbmss. In: In Proceedings of the Second International IEEE Security in Storage Workshop, Washington DC, USA (2003)

    Google Scholar 

  18. Hacigümüş, H., Bala, I., Sharad, M.: Providing database as a service. In: Proceedings of the 18th International Conference on Data Engineering, San Jose, California, USA (2002)

    Google Scholar 

  19. Hacigümüş, H., Balakrishna, R.I., Sharad, M.: Ensuring the integrity of encrypted databases in the database-as-a-service model. In: Proceedings of the IFIP Conference on Data and Applications Security, Estes Park Colorado, USA, pp. 61–74 (2003)

    Google Scholar 

  20. Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation and encryption to enforce privacy in data storage. In: Biskup, J., Lpez, J. (eds.) Computer Security ESORICS 2007. Volume 4734 of Lecture Notes in Computer Science, pp. 171–186. Springer, Berlin (2007)

    Google Scholar 

  21. Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation design for efficient query execution over sensitive distributed databases. In: ICDCS 2009: IEEE International Conference on Distributed Computing Systems, pp. 32–39 (2009)

    Google Scholar 

  22. Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur. 13(3), 22:1–22:33 (2010)

    Google Scholar 

  23. Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1(3), 239–248 (1983). August

    Article  Google Scholar 

  24. Atallah, M.J., Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur. 12(3), 18:1–18:43 (2009)

    Google Scholar 

  25. Foresti, S.: Preserving Privacy in Data Outsourcing. Volume 51 of Advances in Information Security. Springer, New York (2011)

    Google Scholar 

  26. Elgazzar, K., Martin, P., Hassanein, H.: Personalized mobile web service discovery. In: 2013 IEEE Ninth World Congress on Services (SERVICES), pp. 170–174. IEEE (2013)

    Google Scholar 

  27. Gavey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman (1979)

    Google Scholar 

  28. Nielsen, J.: User interface directions for the web. Commun. ACM 42(1), 65–72 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anne Kayem .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Kayem, A., Martin, P., Elgazzar, K., Meinel, C. (2017). Operating Secure Mobile Healthcare Services over Constrained Resource Networks. In: Adamatzky, A. (eds) Emergent Computation . Emergence, Complexity and Computation, vol 24. Springer, Cham. https://doi.org/10.1007/978-3-319-46376-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-46376-6_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-46375-9

  • Online ISBN: 978-3-319-46376-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics