Enhancing the security of mobile health monitoring systems through trust negotiations

Mahmoud Elkhodr, Seyed Shahrestani, Hon Cheung

    Research output: Chapter in Book / Conference PaperConference Paperpeer-review

    15 Citations (Scopus)

    Abstract

    There are clear advantages in using remote monitoring systems for elderly care. They help with improving the efficiency in providing higher quality of care. These systems collect relevant data and transmit them to the healthcare provider, to be stored on their servers in the form of patients' Electronic Health Records (EHRs). The EHR may then be used by healthcare professional, either at provider locations or remotely through mobile devices. Among of the main concerns in acceptance of these systems, ensuring the privacy of personally sensitive information and securing EHRs during the transmission can be named. This paper, reports a trust negotiation approach that we have developed to address these concerns. It complements the strengths of the Transport Layer Security (TLS) as the underlying protocol. This combination results in significant improvements in overcoming security related concerns compared to the traditional identity-based only access control techniques. We also report the experimental works that demonstrate the ease of application of the proposed approach in typical mobile environments.
    Original languageEnglish
    Title of host publicationProceedings of the 36th Annual IEEE Conference on Local Computer Networks (LCN 2011), Bonn, Germany, 4-7 October 2011
    PublisherIEEE
    Pages754-757
    Number of pages4
    ISBN (Print)9781612849263
    DOIs
    Publication statusPublished - 2011
    EventConference on Local Computer Networks -
    Duration: 22 Oct 2012 → …

    Conference

    ConferenceConference on Local Computer Networks
    Period22/10/12 → …

    Fingerprint

    Dive into the research topics of 'Enhancing the security of mobile health monitoring systems through trust negotiations'. Together they form a unique fingerprint.

    Cite this