Abstract
In this paper, we have designed and modeled the ubiquitous RFID healthcare system architecture and framework workflow, which are described by six classified core players or subsystems, and have also analyzed by an economic value-chain model. They consist of the patient and wearable ECG sensor, network service, healthcare service, emergency service, and PKI service providers. To enhance the security level control for the patient’s medical privacy, individual private and public keys should be stored on smart cards. All the patient and service providers in the proposed security control architecture should have suitable secure private and public keys to access medical data and diagnosis results with RFID/GPS tracking information for emergency service. By enforcing the requirements of necessary keys among the patient and service providers, the patient’s ECG data can be protected and effectively controlled over the open medical directory service. Consequently, the proposed architecture for ubiquitous RFID healthcare system using the smart card terminal is appropriate to build up medical privacy policies in future ubiquitous sensor networking and home networking environments. In addition, we have analyzed an economic value-chain model based on the proposed architecture consisting of RFID, GPS, PDA, ECG sensor, and smart card systems in large-scale wireless sensor networks and have also analyzed two market derivers – customer demands and technology – in the proposed service architecture using the value-chain model. Finally, policy modeling for privacy and security protection for customers, service providers, and regulatory agency is considered to promote beneficial utilization of the collected healthcare data and derived new business of healthcare applications.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Song, W.J., Son, S.H., Choi, M.K., Kang, M.H.: Privacy and Security Control Architecture for Ubiquitous RFID Healthcare System in Wireless Sensor Networks. In: Proceedings in the IEEE ICCE 2006 (January 2006)
Choi, S.S., Song, W.J., Choi, M.K., Son, S.H.: Ubiquitous RFID Healthcare Systems Analysis on PhysioNet Grid Portal Services Using Petri Nets. In: Proceedings in the IEEE ICICS 2005 (December 2005)
Moody, G.B., Mark, R.G., Goldberger, A.L.: PhysioNet: A Web-Based Resource for the Study of Physiologic Signals. IEEE Engineering in Medicine and Biology 20(3), 70–75 (2001)
Finkenzeller, K.: RFID Handbook, 2nd edn. Wiley & Sons, Chichester (2003)
Nam, D.S., Youn, C.H., Lee, B.H., Clifford, G., Healey, J.: QoS-Constrained Resource Allocation for a Grid-Based Multiple Source Electrocardiogram Application. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 352–359. Springer, Heidelberg (2004)
Eysenbach, G.: What is e-healthcare? Journal of Medical Internet Research 3(2) (2001)
Marconi, J.: E-Health: Navigating the Internet for Health Information Healthcare. Advocacy White Paper, Healthcare Information and Management Systems Society (May 2002)
Joseph, J., Fellenstein, C.: Grid Computing. Prentice Hall, Englewood Cliffs (2004)
Chan, H., Perrig, A.: Security and Privacy in Sensor Networks. IEEE Computer 36(10), 103–105 (2003)
Fancher, C.H.: In Your Pocket: Smartcards. IEEE Spectrum 34(2), 47–53 (1997)
Baldwin, R.W., Chang, C.V.: Locking the e-safe. IEEE Spectrum 34(2), 40–46 (1997)
Rankl, W., Effing, W.: Smart Card Handbook, 2nd edn. John Wiley & Sons, New York (2000)
ISO/IEC 7816-1:1998, Identification Cards – Integrated Circuit(s) Cards with Contacts - Part 1: Physical Characteristics, International Organization for Standardization (1998)
Song, W.J., Kim, W.H., Kim, B.G., Ahn, B.H., Choi, M.K., Kang, M.H.: Smart Card Terminal Systems Using ISO/IEC 7816-3 Interface and 8051 Microprocessor Based on the System-on-Chip. In: Geist, D., Tronci, E. (eds.) CHARME 2003. LNCS, vol. 2860, pp. 364–371. Springer, Heidelberg (2003)
NHS, NHS IT Standards Handbook, National Health Service (NHS) Information Authority (June 2001)
Porter, M.E.: Competitive Strategy: Techniques for Analyzing Industries and Competitors. Free Press, New York (1980)
Olla, P., Patel, N.V.: A Value Chain Model for Mobile Data Service Providers. Telecommunications Policy 26(9-10), 551–571 (2002)
Lee, Y.H., Kim, H.W., Kim, Y.J., Sohn, H.: A New Conceptual Framework for Designing Ubiquitous Business Model. IE Interfaces 19(1), 9–18 (2006)
Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd Generation E-Commerce: Privacy Preferences versus Actual Behavior. In: Proceedings of the 2001 ACM Conference on Electronic Commerce, Association for Computing Machinery, pp. 38–47 (October 2001)
The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, W3C Recommendation (April 2002), http://www.w3.org/P3P/
Janczewski, L., Shi, F.X.: Development of Information Security Baselines for Healthcare Information Systems in New Zealand. Computers & Security 21(2), 172–192 (2002)
Gobuty, D.E. and Joint NEMA/COCIR/JIRA Security & Privacy Committee (SPC): Organizing Security and Privacy Enforcement in Medical Imaging Technology. In: International Congress Series, vol. 1256, pp. 319–329 (June 2003)
Health Insurance Portability and Accountability Act of 1996, Public Law 104-191, 104th United States Congress (1996), http://www.aspe.hhs.gov/admnsimp/pl104191.htm
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Song, W.J., Cho, M.K., Ha, I.S., Choi, M.K. (2006). Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor Networks. In: Górski, J. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2006. Lecture Notes in Computer Science, vol 4166. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11875567_18
Download citation
DOI: https://doi.org/10.1007/11875567_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-45762-6
Online ISBN: 978-3-540-45763-3
eBook Packages: Computer ScienceComputer Science (R0)