SLA for a Pervasive Healthcare Environment

  • J. Valarmathi
  • K. Lakshmi
  • R. S. Menaga
  • K. V. Abirami
  • V. Rhymend Uthariaraj
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 176)


The use of Pervasive computing in Healthcare field is an evolving paradigm and is under constant development in the recent years. Pervasive computing allows information processing and interactions to be carried out by smart devices autonomously. The advent of wearable computers or wearable devices has enabled continuous monitoring of patients and has changed the face of healthcare systems in many parts of the world. Since these devices carry sensitive data and interactions are initiated and carried out without much human intervention, the need for trust and security is crucial. This paper proposes a Service Level Agreement (SLA) based approach to trust, that relies on credential matching to form a notion of trust. The number of interactions and computational overhead is reduced without compromising safety. The aim is to provide secure and reliable healthcare services without any arbitration. The security and power issues in a pervasive environment are also addressed.


SLA trust Pervasive Computing Credentials 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Boukerche, A., Ren, Y.: A Secure Mobile Healthcare System using Trust-Based Multicast Scheme. IEEE Journal of Selected Areas in Communications 27, 387–399 (2009)CrossRefGoogle Scholar
  2. 2.
    Orwat, C., Rashid, A., Holtmann, C., Wolk, M., Scheermesser, M., Kosow, H., Graefe, A.: Adopting Pervasive Computing for Routine Use in Healthcare. IEEE Pervasive Computing 9, 64–71 (2010)CrossRefGoogle Scholar
  3. 3.
    Surie, A., Perrig, A., Farber, D.J.: Rapid Trust Establishment for Pervasive Personal Computing. IEEE Pervasive Computing 6, 24–30 (2007)CrossRefGoogle Scholar
  4. 4.
    Lawo, M., Herzog, O., Boronowsky, M., Knackfuss, P.: The Open Wearable Computing Group. IEEE Pervasive Computing 10, 78–81 (2011)CrossRefGoogle Scholar
  5. 5.
    Trcek, D.: Trust Management in the Pervasive Computing Era. IEEE Security & Privacy 9, 52–55 (2011)Google Scholar
  6. 6.
    Ahamed, S.I., Haque, M.M., Hoque, E., Rahman, F., Talukder, N.: Design, analysis and deployment of omnipresent Formal Trust Model with trust bootstrapping for pervasive environments. Journal of Systems and Software 83 (February 2010)Google Scholar
  7. 7.
    Buford, J., Kumar, R., Perkins, G.: Composition Trust Bindings in Pervasive Computing Service Composition. In: Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006, pp. 260–266 (March 2006)Google Scholar
  8. 8.
    Zeng, S., Xin, Y., Yang, Y.-X., Hu, Z.-M.: TM-RMRP: A Trust Model Based on a Recommendation Mechanism of Rewards and Punishments. In: 2010 Second International Workshopon Education Technology and Computer Science (ETCS), pp. 31–34 (March 2010)Google Scholar
  9. 9.
    Liu, Y.L., Guo, S.Z., Tang, Y., Ding, Y.Z.: Trust Propagation Model in Pervasive Computing Environment. Pervasive, 120–123 (September 2010)Google Scholar
  10. 10.
    Ismail, A., Yan, J., Shen, J.: An offer generation approach to SLA negotiation support in service oriented computing. In: Service Oriented Computing and Applications, vol. 4, pp. 277–289. Springer, London (2010)Google Scholar
  11. 11.
    Pelta, D.A., Yager, R.R.: Decision Strategies in Mediated Multiagent Negotiations: An Optimization Approach. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 40, 635–640 (2010)CrossRefGoogle Scholar
  12. 12.
    Chi, Y., Moon, H.J., Hacigumus, H.: iCBS: Incremental Costbased Scheduling under Piecewise Linear SLA. Proceedings of the VLDB Endowment 4 (2011)Google Scholar
  13. 13.
    Bonatti, P.A., De Coi, J.L., Olmedilla, D., Sauro, L.: A Rule-Based Trust Negotiation System. IEEE Transactions on Knowledge and Data Engineering 22, 1507–1520 (2010)CrossRefGoogle Scholar
  14. 14.
    Li, L., Song, M., Zhang, X.: An SLA Based Web Service Quality Monitor System. Pervasive, 661–664 (2009)Google Scholar
  15. 15.
    Valarmathi, J., Uthariaraj, D.V.R., Arjun Kumar, G., Subramanian, P., Karthick, R.: A Novel Trust Management Scheme In Pervasive Computing. In: 2010 The 2nd IEEE International Conference on Information Management and Engineering (ICIME), pp. 141–145 (April 2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • J. Valarmathi
    • 1
  • K. Lakshmi
    • 1
  • R. S. Menaga
    • 1
  • K. V. Abirami
    • 1
  • V. Rhymend Uthariaraj
    • 1
  1. 1.Computer CenterMadras Institute of Technology, Anna UniversityChennaiIndia

Personalised recommendations