loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Alexandra Dmitrienko 1 ; Zecir Hadzic 1 ; Hans Löhr 1 ; Marcel Winandy 1 and Ahmad-Reza Sadeghi 2

Affiliations: 1 Ruhr-University Bochum, Germany ; 2 Technische Universität Darmstadt, Germany

ISBN: 978-989-8425-34-8

Keyword(s): Health records, Mobile computing, Smartphone, Security architecture, Trusted computing.

Related Ontology Subjects/Areas/Topics: Biomedical Engineering ; Cloud Computing ; Confidentiality and Data Security ; Distributed and Mobile Software Systems ; e-Health ; Health Engineering and Technology Applications ; Health Information Systems ; Mobile Technologies ; Mobile Technologies for Healthcare Applications ; Neural Rehabilitation ; Neurotechnology, Electronics and Informatics ; Platforms and Applications ; Software Engineering

Abstract: Using mobile phones to access healthcare data is an upcoming application scenario of increasing importance in the near future. However, important aspects to consider in this context are the high security and privacy requirements for sensitive medical data. Current mobile phones using standard operating systems and software cannot offer appropriate protection for sensitive data, although the hardware platform often offers dedicated security features. Malicious software (malware) like Trojan horses on the mobile phone could gain unauthorized access to sensitive medical data. In this paper, we propose a complete security framework to protect medical data (such as electronic health records) and authentication credentials that are used to access e-health servers. Derived from a generic architecture that can be used for PCs, we introduce a security architecture specifically for mobile phones, based on existing hardware security extensions. We describe security building blocks, including tru sted hardware features, a security kernel providing isolated application environments as well as a secure graphical user interface, and a trusted wallet (TruWallet) for secure authentication to e-health servers. Moreover, we present a prototype implementation of the trusted wallet on a current smartphone: the Nokia N900. Based on our architecture, health care professionals can safely and securely process medical data on their mobile phones without the risk of disclosing sensitive information as compared to commodity mobile operating systems. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.237.51.159

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Dmitrienko, A.; Hadzic, Z.; Löhr, H.; Winandy, M. and Sadeghi, A. (2011). A SECURITY ARCHITECTURE FOR ACCESSING HEALTH RECORDS ON MOBILE PHONES.In Proceedings of the International Conference on Health Informatics - Volume 1: HEALTHINF, (BIOSTEC 2011) ISBN 978-989-8425-34-8, pages 87-96. DOI: 10.5220/0003171100870096

@conference{healthinf11,
author={Alexandra Dmitrienko. and Zecir Hadzic. and Hans Löhr. and Marcel Winandy. and Ahmad{-}Reza Sadeghi.},
title={A SECURITY ARCHITECTURE FOR ACCESSING HEALTH RECORDS ON MOBILE PHONES},
booktitle={Proceedings of the International Conference on Health Informatics - Volume 1: HEALTHINF, (BIOSTEC 2011)},
year={2011},
pages={87-96},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003171100870096},
isbn={978-989-8425-34-8},
}

TY - CONF

JO - Proceedings of the International Conference on Health Informatics - Volume 1: HEALTHINF, (BIOSTEC 2011)
TI - A SECURITY ARCHITECTURE FOR ACCESSING HEALTH RECORDS ON MOBILE PHONES
SN - 978-989-8425-34-8
AU - Dmitrienko, A.
AU - Hadzic, Z.
AU - Löhr, H.
AU - Winandy, M.
AU - Sadeghi, A.
PY - 2011
SP - 87
EP - 96
DO - 10.5220/0003171100870096

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.