SmartData pp 197-211 | Cite as

Privacy-Enabled Mobile-Health (mHealth)-Based Diabetic Solution

Conference paper


Diabetes is one of the leading chronic diseases affecting the lives of millions globally and early detection and treatment of this disease can serve to improve the quality of life for patients as well as suspend further health complications arising from diabetes. Continuous Glucose Monitors (CGM) and Insulin Pumps (IP) have been widely deployed to monitor the sugar levels in the blood stream and inject appropriate amounts of insulin to compensate for the underperforming pancreas functions of the patients’ bodies and thereby may provide appropriate treatment solutions for many diabetic sufferers. With the invention and deployment of Smartphones, the quality and performance associated with treating diabetes has reached new heights, however the privacy and security of mobile-based diabetic systems remain in ongoing challenges. This paper aims to focus on the privacy and security challenges of Mobile-Health (mHealth)-based Diabetic solutions.


Diabetes Type Information Privacy Health Data Continuous Glucose Monitor Privacy Concern 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Wild, S., Roglic, G., Green, A., Sicree, R. and King, H., "Global prevalence of diabetes: estimates for the year 2000 and projections for 2030", Diabetes Care, Vol. 27 No., pp 1047–1053, 2004Google Scholar
  2. 2.
    Diabetes Programme, World Health Organization (WHO), Retrieved on July 5, 2012,
  3. 3.
    N. Wickramasinghe, S. Goldberg, "How M=EC2 in healthcare", International Journal of Mobile Communications, Vol. 2 No. 2, pp 140–156, 2004CrossRefGoogle Scholar
  4. 4.
    N. Wickramasinghe, S. Goldberg, "Adaptive mapping to realization methodology (AMR) to facilitate mobile initiatives in healthcare", International Journal of Mobile Communications, Vol. 5 No. 3, pp 300–318, 2007CrossRefGoogle Scholar
  5. 5.
    E. Geisler, N. Wickramasinghe, “The Role and Use of Wireless Technology in the Management and Monitoring of Chronic Diseases” IBM Center for The Business of Government, DC, Appendix: Springer-Author Discount, 2009Google Scholar
  6. 6.
    Sasan Adibi, "Privacy-Enabled Mobile-Health (mHealth)-based Diabetic Solution", Presented and published at the Identity, Privacy and Security Institute (IPSI) SmartData International Symposium, University of Toronto, 14–16 May, 2012,
  7. 7.
    Sasan Adibi, "Link Technologies and BlackBerry Mobile Health (mHealth) Solutions: A Review", IEEE Transactions on Information Technology in Biomedicine, Vol. 14, Issue: 4, pp: 586–597, July 2012Google Scholar
  8. 8.
    C. M. Shay, A. M. Secrest, R. G. Miller, E. S. Strotmeyer, B. H. Goodpaster, S. F. Kelsey,T. J. Orchard (2012) Femoral–gluteal adiposity is not associated with insulin sensitivity in Type 1 diabetes, Diabetic Medicine, WileyGoogle Scholar
  9. 9.
    Wild, S., Roglic, G., Green, A., Sicree, R., King, H. (2004). Global prevalence of diabetes: Estimates for the year 2000 and projections for 2030. Diabetes Care, 27, 1047–1053CrossRefGoogle Scholar
  10. 10.
    P. Zhang, X. Zhang, J. Brown et al., “Global healthcare expenditure on diabetes for 2010 and 2030,” Diabetes Research and Clinical Practice, vol. 87, no. 3, pp. 293–301, 2010MathSciNetCrossRefGoogle Scholar
  11. 11.
    Diabetes, Fact Sheet No. 312, Media Centre, World Health Organization, August 2011,
  12. 12.
    Diabetes Data and Trends, Centers for Disease Control and Prevention, Department of Health and Human Services, Retrieved on July 7, 2012,
  13. 13.
    Sasan Adibi, Gordon B. Agnew, “On The Diversity of eHealth Security Systems and Mechanisms”, The 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society EMBC 2008, August 20–24, 2008, Vancouver, BC, CanadaGoogle Scholar
  14. 14.
    Sasan Adibi, Tony Sahama, “Information Accountability for eHealth Infrastructures through Quality of Service (QoS) Support”, The Advances in Health Informatics Conference (AHIC ’10), Kitchener, Ontario, Canada, April 28 30, 2010Google Scholar
  15. 15.
    N. Wickramasinghe, S. Misra, A. Jenkins and D. Vogel, “The Competitive Forces Facing E-health”, International Journal of Health Information Systems and Informatics (IJHISI), Vol. 1, No. 4, pp.68–81, 2006Google Scholar
  16. 16.
    N. Wickramasinghe, S. Misra, “A Wireless Trust Model for Healthcare” International Journal of e-Health (IJEH), Vol. 1, No. 1, pp. 60–77, 2004Google Scholar
  17. 17.
    A. Etzioni, The Limits of Privacy, Basic Books, New York. 1999.Google Scholar
  18. 18.
    Sasan Adibi, “Biomedical Sensing Analyzer (BSA) for Mobile-Health (mHealth)-LTE”, Accepted with revision at the Special Issue on Emerging Technologies in Communications – mHealth (Healthcare based on Mobile phone technology), IEEE Journal on Selected Areas in Communications (JSAC) – Area 1: e-Health, paper #: 1569578555, March 2012Google Scholar
  19. 19.
    Health Information Technology Plan (NY-SMHP), New York State Medicaid, June 20, 2011,
  20. 20.
    A. Lorenz, K. Borcea-Pfitzmann, "Role Management in a Privacy-Enhanced Collaborative Environment", "Role management in a privacy-enhanced collaborative environment", Interactive Technology and Smart Education, Vol. 7 Issue: 2, pp.102 – 112, 2010Google Scholar
  21. 21.
    N. Zakaria, K. Y. Lau, N. M. A. Alias, W. Husain, “Protecting privacy of children in social networking sites with rule-based privacy tool”, High Capacity Optical Networks and Enabling Technologies (HONET), pp. 253–257, 2011Google Scholar
  22. 22.
    G. J. Tomko, H. Kwan, D. Borrett,, "SmartData: The Need, the Goal, the Challenge", Ideintity, Privacy and Security Institute, University of Toronto, March 2012,
  23. 23.
    G. Tomko, D. Borrett, H. Kwan, G. Steffan, "SmartData: Make the Data “Think” for Itself", Identity in the Information Society, Springer Verlag, 3 (2):343-362, 2010,
  24. 24.
    Ann Cavoukian, “Privacy-By-Design Principles”, adapted from, July16,2012 Google Scholar
  25. 25.
    A. Cavoukian, K. E. Emam, "A Positive-Sum Paradigm in Action in the Health Sector", Whitepaper, Office of the Information and Privacy Commissioner of Ontario, March 2010,
  26. 26.
    D. Kotz “A threat taxonomy for mHealth privacy”, in Workshop on Networked Healthcare Technology (NetHealth), Bangalore, India. January 4, 2011Google Scholar
  27. 27.
    I. A. Essa, "Ubiquitous Sensing for Smart and Aware Environments: Technologies towards the building of an Aware Home", IEEE Personal Communications, Special Issue on Networking The Physical World, pp. 47–49, October 2000Google Scholar
  28. 28.
    G. W. van Blarkom, J. J. Borking, J. G. E Olk, “PET". Handbook of Privacy and Privacy-Enhancing Technologies: The Case of Intelligent Software Agents. ISBN 90-74087-33-7, College besherming persoongegevens, Haag. W3C World wide web consortium, 2003Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.RMIT UniversityMelbourneAustralia
  2. 2.Office of the Information and Privacy Commissioner of OntarioTorontoCanada
  3. 3.Epworth HealthCareRichmondAustralia

Personalised recommendations