Skip to main content

Secure and Efficient Data Placement in Mobile Healthcare Services

  • Conference paper
Book cover Database and Expert Systems Applications (DEXA 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8644))

Included in the following conference series:

Abstract

Mobile health services offer access to patient data, reported by body sensors, that is stored locally on a mobile phone. Storage capacity limitations however, make storing complete copies of the mobile data challenging and using backup cloud storage is impractical as well as insecure when Internet access is intermittent. We propose a novel approach, based on fragmentation and caching, to secure and efficient data management in mobile health services. Fragmentation classifies the data by confidentiality and attribute affinity. While caching prioritizes data fragments by frequency of access in order to compute a minimum dataset of information to store on the mobile phone. Our simulation results demonstrate that data fragmentation improves query response time by almost 25% and, caching, by an additional 35% on various query workloads on the fragmented data when compared to cloud centric un-fragmented data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kujawski: Latest mobile phone statistics from africa and what this means, http://www.mikekujawski.ca/2009/03/16/latest-mobile-statistics-fromafrica-and-what-this-means/

  2. MHealth: Mobilizing innovation for global health, http://www.mhealthalliance.org/

  3. Damiani, E., De Captani Di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational dbmss. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 93–102. ACM, New York (2003)

    Google Scholar 

  4. Damiani, E., De Captani Di Vimercati, S., Finetti, M., Paraboschi, S., Samarati, P., Jajodia, S.: Implementation of a storage mechanism for untrusted dbmss. In: Proceedings of the Second International IEEE Security in Storage Workshop, Washington DC, USA (May 2003)

    Google Scholar 

  5. Hacigümüş, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proceedings of the 18th International Conference on Data Engineering, San Jose, California, USA (February 2002)

    Google Scholar 

  6. Hacigümüş, H., Iyer, B., Chen, L., Mehrotra, S.: Executing sql over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, SIGMOD 2002, pp. 216–227. ACM, New York (2002)

    Chapter  Google Scholar 

  7. De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of access control evolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Databases. VLDB 2007, pp. 123–134. VLDB Endowment (2007)

    Google Scholar 

  8. Atallah, M.J., Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur. 12(3), 18:1–18:43 (2009)

    Google Scholar 

  9. De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM Trans. Database Syst. 35(2), 12:1–12:46 (2010)

    Google Scholar 

  10. Kayem, A., Martin, P., Akl, S.G.: Effective cryptographic key management for outsourced dynamic data sharing environments. In: Proceedings of the 10th Annual Information Security Conference (ISSA 2011), Johannesburg, South Africa, August 15 -17, pp. 1–8. IEEE (2011)

    Google Scholar 

  11. Samanthula, B., Howser, G., Elmehdwi, Y., Madria, S.: An efficient and secure data sharing framework using homomorphic encryption in the cloud. In: Proceedings of the 1st International Workshop on Cloud Intelligence, vol. 8, pp. 1–8 (2012)

    Google Scholar 

  12. Ciriani, V., De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation design for efficient query execution over sensitive distributed databases. In: Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 32–39 (2009)

    Google Scholar 

  13. Ciriani, V., De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur. 13(3), 22:1–22:33 (2010)

    Google Scholar 

  14. Foresti, S.: Preserving Privacy in Data Outsourcing. Advances in Information Security, vol. 51. Springer, New York (2011)

    MATH  Google Scholar 

  15. Samarati, P., De Capitani Di Vimercati, S.: Data protection in outsourcing scenarios: Issues and directions. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, pp. 1–14. ACM, New York (2010)

    Google Scholar 

  16. De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM Trans. Database Syst. 35(2), 12:1–12:46 (2010)

    Google Scholar 

  17. Pashalidis, A., Meyer, B.: Linking anonymous transactions: the consistent view attack. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 384–392. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  18. Cormen, T.H., Stein, C., Rivest, R.L., Leiserson, C.E.: Introduction to Algorithms, 2nd edn. McGraw-Hill Higher Education (2001)

    Google Scholar 

  19. SQLite, http://www.sqlite.org/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Kayem, A.V.D.M., Elgazzar, K., Martin, P. (2014). Secure and Efficient Data Placement in Mobile Healthcare Services. In: Decker, H., Lhotská, L., Link, S., Spies, M., Wagner, R.R. (eds) Database and Expert Systems Applications. DEXA 2014. Lecture Notes in Computer Science, vol 8644. Springer, Cham. https://doi.org/10.1007/978-3-319-10073-9_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10073-9_29

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10072-2

  • Online ISBN: 978-3-319-10073-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics