Abstract
Mobile health services offer access to patient data, reported by body sensors, that is stored locally on a mobile phone. Storage capacity limitations however, make storing complete copies of the mobile data challenging and using backup cloud storage is impractical as well as insecure when Internet access is intermittent. We propose a novel approach, based on fragmentation and caching, to secure and efficient data management in mobile health services. Fragmentation classifies the data by confidentiality and attribute affinity. While caching prioritizes data fragments by frequency of access in order to compute a minimum dataset of information to store on the mobile phone. Our simulation results demonstrate that data fragmentation improves query response time by almost 25% and, caching, by an additional 35% on various query workloads on the fragmented data when compared to cloud centric un-fragmented data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kujawski: Latest mobile phone statistics from africa and what this means, http://www.mikekujawski.ca/2009/03/16/latest-mobile-statistics-fromafrica-and-what-this-means/
MHealth: Mobilizing innovation for global health, http://www.mhealthalliance.org/
Damiani, E., De Captani Di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational dbmss. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 93–102. ACM, New York (2003)
Damiani, E., De Captani Di Vimercati, S., Finetti, M., Paraboschi, S., Samarati, P., Jajodia, S.: Implementation of a storage mechanism for untrusted dbmss. In: Proceedings of the Second International IEEE Security in Storage Workshop, Washington DC, USA (May 2003)
Hacigümüş, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proceedings of the 18th International Conference on Data Engineering, San Jose, California, USA (February 2002)
Hacigümüş, H., Iyer, B., Chen, L., Mehrotra, S.: Executing sql over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, SIGMOD 2002, pp. 216–227. ACM, New York (2002)
De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of access control evolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Databases. VLDB 2007, pp. 123–134. VLDB Endowment (2007)
Atallah, M.J., Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur. 12(3), 18:1–18:43 (2009)
De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM Trans. Database Syst. 35(2), 12:1–12:46 (2010)
Kayem, A., Martin, P., Akl, S.G.: Effective cryptographic key management for outsourced dynamic data sharing environments. In: Proceedings of the 10th Annual Information Security Conference (ISSA 2011), Johannesburg, South Africa, August 15 -17, pp. 1–8. IEEE (2011)
Samanthula, B., Howser, G., Elmehdwi, Y., Madria, S.: An efficient and secure data sharing framework using homomorphic encryption in the cloud. In: Proceedings of the 1st International Workshop on Cloud Intelligence, vol. 8, pp. 1–8 (2012)
Ciriani, V., De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation design for efficient query execution over sensitive distributed databases. In: Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 32–39 (2009)
Ciriani, V., De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur. 13(3), 22:1–22:33 (2010)
Foresti, S.: Preserving Privacy in Data Outsourcing. Advances in Information Security, vol. 51. Springer, New York (2011)
Samarati, P., De Capitani Di Vimercati, S.: Data protection in outsourcing scenarios: Issues and directions. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, pp. 1–14. ACM, New York (2010)
De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM Trans. Database Syst. 35(2), 12:1–12:46 (2010)
Pashalidis, A., Meyer, B.: Linking anonymous transactions: the consistent view attack. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 384–392. Springer, Heidelberg (2006)
Cormen, T.H., Stein, C., Rivest, R.L., Leiserson, C.E.: Introduction to Algorithms, 2nd edn. McGraw-Hill Higher Education (2001)
SQLite, http://www.sqlite.org/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Kayem, A.V.D.M., Elgazzar, K., Martin, P. (2014). Secure and Efficient Data Placement in Mobile Healthcare Services. In: Decker, H., Lhotská, L., Link, S., Spies, M., Wagner, R.R. (eds) Database and Expert Systems Applications. DEXA 2014. Lecture Notes in Computer Science, vol 8644. Springer, Cham. https://doi.org/10.1007/978-3-319-10073-9_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-10073-9_29
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10072-2
Online ISBN: 978-3-319-10073-9
eBook Packages: Computer ScienceComputer Science (R0)