Authors:
Mahmoud Elkhodr
;
Seyed Shahrestani
and
Hon Cheung
Affiliation:
University of Western Sydney, Australia
Keyword(s):
Trust Negotiation, e-health Security, Remote Health Monitoring, Mobile Application, TLS Protocol.
Related
Ontology
Subjects/Areas/Topics:
Agents
;
Artificial Intelligence
;
Biomedical Engineering
;
Communication and Software Technologies and Architectures
;
Communication Networks and Protocols
;
Computer-Supported Education
;
Distributed and Mobile Software Systems
;
e-Business
;
Enterprise Information Systems
;
Health Engineering and Technology Applications
;
Health Information Systems
;
Information Technologies Supporting Learning
;
Mobile and Pervasive Computing
;
Mobile Software and Services
;
Mobile Technologies
;
Mobile Technologies for Healthcare Applications
;
Neural Rehabilitation
;
Neurotechnology, Electronics and Informatics
;
Pervasive Computing
;
Process Coordination and Synchronization
;
Security and Privacy
;
Software Engineering
;
Telecommunications
;
Wireless Information Networks and Systems
Abstract:
To achieve higher levels of efficiency and to improve the quality of care, remote monitoring systems for elderly offer interesting solutions. The data collected by the monitoring system are transmitted to the healthcare provider and stored on the healthcare provider’s server in the form of patients’ Electronic Health Records (EHR). It is important to secure the transmission of the patient’s EHR between the healthcare provider server and the mobile device being used by the healthcare professional, as their communication is normally via unsecure networks, such as the Internet. The approaches proposed in this study ensure that patients’ EHRs are only disclosed to the authorized healthcare professionals, on the registered devices and at the appropriate locations. To achieve these security requirements, building on the strengths of Transport Layer Security (TLS) protocol, a trust negotiation approach is proposed. For verification purposes, a mobile application is also constructed. The ex
perimental works confirm that by applying the proposed approach, significant improvements in the security of the remote health monitoring systems can be achieved.
(More)