IMPROVING E-HEALTH SECURITY THROUGH TRUST NEGOTIATION

被引:0
|
作者
Elkhodr, Mahmoud [1 ]
Shahrestani, Seyed [1 ]
Cheung, Hon [1 ]
机构
[1] Univ Western Sydney, Sch Comp & Math, Locked Bag 1797, Penrith, NSW 2751, Australia
关键词
Trust Negotiation; e-health Security; Remote Health Monitoring; Mobile Application; TLS Protocol;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To achieve higher levels of efficiency and to improve the quality of care, remote monitoring systems for elderly offer interesting solutions. The data collected by the monitoring system are transmitted to the healthcare provider and stored on the healthcare provider's server in the form of patients' Electronic Health Records (EHR). It is important to secure the transmission of the patient's EHR between the healthcare provider server and the mobile device being used by the healthcare professional, as their communication is normally via unsecure networks, such as the Internet. The approaches proposed in this study ensure that patients' EHRs are only disclosed to the authorized healthcare professionals, on the registered devices and at the appropriate locations. To achieve these security requirements, building on the strengths of Transport Layer Security (TLS) protocol, a trust negotiation approach is proposed. For verification purposes, a mobile application is also constructed. The experimental works confirm that by applying the proposed approach, significant improvements in the security of the remote health monitoring systems can be achieved.
引用
收藏
页码:172 / 177
页数:6
相关论文
共 50 条
  • [1] Trust assessment of security for e-health systems
    Bahtiyar, Erif
    Caglayan, Mehmet Ufuk
    [J]. ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2014, 13 (03) : 164 - 177
  • [2] NEW LENS ON HEALTH CONSUMERISM: E-HEALTH CONSUMERISM, E-HEALTH TRUST, AND E-HEALTH LITERACY
    Seckin, G.
    Hughes, S.
    [J]. GERONTOLOGIST, 2016, 56 : 46 - 46
  • [3] e-Health PST (Privacy, Security and Trust) Mobile Networking Infrastructure
    Liu, W.
    Park, E. K.
    Zhu, S. S.
    [J]. 2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,
  • [4] Trust and Reputation in e-Health Systems
    Alboaie, L.
    Buraga, S. C.
    [J]. INTERNATIONAL CONFERENCE ON ADVANCEMENTS OF MEDICINE AND HEALTH CARE THROUGH TECHNOLOGY, 2009, 26 : 43 - 48
  • [5] A security architecture for e-health services
    Sulaiman, Rossilawati
    Sharma, Dharmendra
    Ma, Wanli
    Tran, Dat
    [J]. 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 999 - 1004
  • [6] IMPROVING OLDER ADULTS' E-HEALTH LITERACY THROUGH COLLABORATIVE LEARNING
    Xie, B.
    [J]. GERONTOLOGIST, 2010, 50 : 454 - 455
  • [7] A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System
    Kanwal, Saima
    Tao, Feng
    Almogren, Ahmad
    Rehman, Ateeq Ur
    Taj, Rizwan
    Radwan, Ayman
    [J]. CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2023, 134 (01): : 201 - 219
  • [8] Security Improvement and Privacy Preservation in E-Health
    Kishore, Pushkar
    Barisal, Swadhin Kumar
    Kumar, Kulamala Vinod
    Mohapatra, Durga Prasad
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [9] e-Health: An Introduction to the Challenges of Privacy and Security
    Jara, H. R.
    Schafir, E.
    [J]. 2014 IEEE CENTRAL AMERICA AND PANAMA CONVENTION (CONCAPAN XXXIV), 2014,
  • [10] Sensor network security for pervasive e-health
    Garcia-Morchon, Oscar
    Falck, Thomas
    Wehrle, Klaus
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (11) : 1257 - 1273