Abstract
Constrained resource (lossy) networks are characterized by low-power and low-processing capability devices. Using lossy networks for service provision is a good approach to overcoming the technological constraints that characterize remote and rural areas of developing regions. In this chapter, we propose a framework for provisioning Healthcare-as-a-mobile-service over lossy networks, as a cost-effective approach to healthcare management in remote and rural areas of developing regions. The framework allows Healthcare providers collect and share patient data obtained via body sensors that periodically report health status information. Queries can be run locally on a mobile device when the stored copy, say on a cloud, is not accessible. Since mobile storage capacity limitations can be problematic for maintaining data consistency, we propose a storage management framework based on data fragmentation and caching. The fragmentation scheme classifies data according to confidentiality and affinity. While caching optimizes mobile storage by prioritizing data fragments in terms of frequency of access. Our experimental results demonstrate that our data fragmentation and caching algorithms are scalable to varied bandwidth and download rates. The battery power consumption is reasonable with respect to bandwidth variations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Goodman, S., Harris, A.: The coming African tsunami of information insecurity. Commun. ACM 53(12), 24–27 (2010)
Greenhalgh, T., Potts, H.W., Wong, G., Bank, P., Swinglehurst, D.: Tensions and paradoxes in electronic patient record research: a systematic literature review using the meta-narrative method. Milbank Q. 87(4), 729–788 (2009)
Mandl, K.D., Simons, W.W., Crawford, W., Abbett, J.M.: Indivo: a personally controlled health record for health information exchange and communication. BMC Med. Inform. Decis. Mak. 7(1), 25 (2007)
Robison, J., Bai, L., Mastrogiannis, D.S., Tan, C.C., Wu, J.: A survey on phr technology. In: Proceedings of the 2012 IEEE 14th International Conference on e-Health Networking, Applications and Services, Healthcom ’12, pp. 184–189. IEEE (2012)
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: management of access control evolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Databases, VLDB ’07, pp. 123–134. VLDB Endowment (2007)
Samarati, P., De Capitani di Vimercati, S.: Data protection in outsourcing scenarios: issues and directions. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS ’10, New York, NY, USA, ACM, pp. 1–14 (2010)
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM Trans. Database Syst. 35(2), 12:1–12:46 (2010)
Kayem, A.V.D.M., Martin, P., Akl, S.G.: Effective cryptographic key management for outsourced dynamic data sharing environments. In: Proceedings of the 10th Annual Information Security Conference (ISSA 2011), 15–17 August 2011, Johannesburg, South Africa, pp. 1–8. IEEE (2011)
Kayem, A.V.D.M., Elgazzar, K., Martin, P.: Secure and efficient data placement in mobile healthcare services. In: Database and Expert Systems Applications—25th International Conference, DEXA 2014, Munich, Germany, 1–4 September 2014. Proceedings, Part I, pp. 352–361 (2014)
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 3rd edn. MIT Press, Cambridge (2009)
Baker, D.B., Masys, D.R.: Pcasso: a design for secure communication of personal health information via the internet. Int. J. Med. Inform. 54(2), 97–104 (1999)
Grimson, J.: Delivering the electronic healthcare record for the 21st century. Int. J. Med. Inform. 64, 111–127 (2010)
Adida, B., Sanyal, A., Zabak, S., Kohane, I.S., Mandl, K.D.: Indivo x: developing a fully substitutable personally controlled health record platform. In: Proceedings of the AMIA Annual Symposium, Healthcom ’12, p. 6. American Medical Informatics Association (2010)
Mandl, K.D., Mandel, J.C., Murphy, S.N., Bernstam, E.V., Ramoni, R.L., Kreda, D.A., McCoy, J.M., Adida, B., Kohane, I.S.: The smart platform: early experience enabling substitutable applications for electronic health records. J. Am. Med. Inf. Assoc. 19(4), 597–603 (2012)
Win, K.T., Susilo, W., Mu, Y.: Personal health record systems and their security protection. J. Med. Syst. 30(4), 309–315 (2006)
Damiani, E., De Captani Di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational dbmss. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS ’03, New York, NY, USA, ACM, pp. 93–102 (2003)
Damiani, E., De Captani Di Vimercati, S., Finetti, M., Paraboschi, S., Samarati, P., Jajodia, S.: Implementation of a storage mechanism for untrusted dbmss. In: In Proceedings of the Second International IEEE Security in Storage Workshop, Washington DC, USA (2003)
Hacigümüş, H., Bala, I., Sharad, M.: Providing database as a service. In: Proceedings of the 18th International Conference on Data Engineering, San Jose, California, USA (2002)
Hacigümüş, H., Balakrishna, R.I., Sharad, M.: Ensuring the integrity of encrypted databases in the database-as-a-service model. In: Proceedings of the IFIP Conference on Data and Applications Security, Estes Park Colorado, USA, pp. 61–74 (2003)
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation and encryption to enforce privacy in data storage. In: Biskup, J., Lpez, J. (eds.) Computer Security ESORICS 2007. Volume 4734 of Lecture Notes in Computer Science, pp. 171–186. Springer, Berlin (2007)
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation design for efficient query execution over sensitive distributed databases. In: ICDCS 2009: IEEE International Conference on Distributed Computing Systems, pp. 32–39 (2009)
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur. 13(3), 22:1–22:33 (2010)
Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1(3), 239–248 (1983). August
Atallah, M.J., Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur. 12(3), 18:1–18:43 (2009)
Foresti, S.: Preserving Privacy in Data Outsourcing. Volume 51 of Advances in Information Security. Springer, New York (2011)
Elgazzar, K., Martin, P., Hassanein, H.: Personalized mobile web service discovery. In: 2013 IEEE Ninth World Congress on Services (SERVICES), pp. 170–174. IEEE (2013)
Gavey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman (1979)
Nielsen, J.: User interface directions for the web. Commun. ACM 42(1), 65–72 (1999)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Kayem, A., Martin, P., Elgazzar, K., Meinel, C. (2017). Operating Secure Mobile Healthcare Services over Constrained Resource Networks. In: Adamatzky, A. (eds) Emergent Computation . Emergence, Complexity and Computation, vol 24. Springer, Cham. https://doi.org/10.1007/978-3-319-46376-6_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-46376-6_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-46375-9
Online ISBN: 978-3-319-46376-6
eBook Packages: EngineeringEngineering (R0)