Cipher text Policy Attribute Based Encryption (CP-ABE)
Different type of schemes has been provided by many of the authors regarding the security associated with the patient monitoring system. According to Ibraimi, Asim, and Petkovi?, (2009), confidentiality is one of the major issues faced during the storing of the data related to the patients. The authors of this paper has been associated with proposing a Cipher text Policy Attribute Based Encryption or the CP-ABE. This is associated with the encryption and decryption of the patient’s data by considering the access policies. Once the data is encrypted the data would be stored in the servers. This would help everyone to download the file but the file can only be decrypted if the user satisfies the access policy. For key generation different algorithms were used which were responsible for the encryption or decryption of the data.
Fan et al., (2010), were associated with conducting dynamic integrity checking along with multiple secret sharing so as to make sure about the confidentiality and the dependability. Usage of the orthogonal vectors helped in the process of dynamic integrity checking. The main goals of this paper included the confidentiality along with the dynamic integrity assurance and dependability.
In the paper by Li, Lou, and Ren, (2010), were associated with considering two of the major security issues and this includes the secure and dependable distributed data storage and the fine-grained access control. The major requirements of the data storage includes the confidentiality, integrity and the dependability. The way by which the confidentiality has been obtained is by making use of the public key encryption, whereas the integrity of the data has been obtained by making use of the Message Authentication code or the MAC schemes. Lastly the dependability has been achieved by making use of the SKC or the Symmetric Key cryptography. For the SKC it is very essential that each of the patient should know about the individuals who are authorized to access their data and should also encrypt their data with each of the authorized users by making use of pair ways keys. However there exists several drawbacks of this process. The PKC makes use of the attribute based encryption. Finally the authors of the report concluded to the fact that the usage of the ABE based schemes is the best way of ensuring security of the data.
Wang et al., (2011), were associated with proposing a data scheme along with the dynamic integrity assurance and this was based upon the secret sharing and erasure coding. The data integrity schemes were mostly dependent upon the principles of algebraic signatures. The verification of the data in this is possible without the presence of the original form. This is a very secure and efficient way of securing the data from different type of attacks.
Dynamic Integrity Checking with Multiple Secret Sharing
In today’s world the usage of the WSN or the Wireless Sensor Network is very common which is widely being used for in-house patient monitoring. In the similar fashion Corchado et al., (2010), were associated with proposing a distributed tele-monitoring system which was associated with the usage of the SYLPH model or the Service laYers over Light Physical devices model. This is considered to be a service oriented architecture model which has the objective of distributing the resources amongst the various WSN so as to make them executable over various wireless devices in an independent way. This model can also be used for the purpose of connecting other networks which are present in the other wireless technologies.
Shin, Lee, and Park, (2011), were associated with the usage of the IR or Infrared sensor based monitoring system which were installed in the house for the purpose of collecting data related to motion values of the patients along with other type of values like the level of activities, level of mobility and many more. Support Vector Data Description or the SVDD was used for the purpose of differentiating the normal and the abnormal behaviours. In addition to this the behaviour pattern classification algorithm was used for the purpose of classifying the behavioural patterns. This system eliminated the need of PC as the WSN were installed in the houses. Eventually the nodes were connected with the server of the hospitals by making use of the internet.
A very important role is played by the Mobile phones while monitoring the patient’s data. Receiving, processing and transmitting of the patients data is done in details. Barnickel, Karahan, and Meyer, (2010), was associated with proposing HealthNet mobile monitoring in which the BSN or the Body Sensor Networks are embedded in the cloths of the patient so as to collect the various body parameters and communicate those collected data with the mobile phone of the patients. In the experiment conducted in this paper the sensors as well as the central hubs were embedded in the shirts of the patients by which the collection of the vital signals are done by the sensors. This in followed by transmission of the data to the central hub where the data are communicated with the mobile phones by making use of the Bluetooth links. The confidentiality in this system is achieved by making use of the AES128 whereas the authentication was achieved by making use of the SHA.
Secure and Dependable Distributed Data Storage and Fine-grained Access Control
In the paper by Haché, Lemaire, and Baddour, (2011), a novel monitoring Wearable Mobility Monitoring System was introduced and the major reason lying behind the establishment of this model in entirely dependent upon the smart phone approach. This system is easy wearable on the belts of the patients which would be helping in monitoring of the patients mobility along with taking of photographs in case of any kind of change in the state of the patient. This photographs are in turn used for analysis.
For in-home patient monitoring the usage of Bluetooth enabled devices has also increased. One such similar in-house health monitoring system was proposed by Cheng, and Zhuang, (2010), which was used for the purpose of detecting the Alzheimer diseases. The Bluetooth monitoring device is carried by the patients in their home which consists of an access point that is placed in one of the rooms which is followed by connection of all this with the local database. In case of movement of the patient from one room to another, then the monitoring device is associated with selecting one of the access points that is having the strongest signal strength. After establishment of the connection is done the location as well as the movements of the patients are traced and stored by utilizing the Bluetooth communication. Forwarding of the information is done along with the corresponding timestamps to the decision engines present in the hospitals.
This paper is associated with depicting the security and the privacy of the architecture and implementation of the new system known as the HealthNet mobile electronic health monitoring and data collection system. In this paper various unique security as well as the privacy features of the architecture has been depicted in brief. This paper is mainly used as the system proposed in this paper can help a lot in improving the various kind of tele-monitoring solutions.
This paper is associated with proposing a Bluetooth-enabled in-home patient monitoring system that helps in detection of the Alzheimer’s diseases. This paper has been chosen as this paper proposes a in-home monitoring system which is more flexible in nature and can be applied very easily. Besides this the proposed system is also associated proposing solutions which helps in facilitating the treatment process along with improving the quality of life of the aged peoples as well.
This paper depicted the fact that in recent years the ambient intelligence has been associated with gaining a lot of importance and besides this there is a requirement of developing new innovative solutions as well. This paper has been chosen as this paper helps in understanding one of the distributed tele-monitoring system which has the aim of improving the healthcare and also provides assistance to the dependent people staying in homes. This paper is chosen as the approach proposed in this paper is having the higher capability of recovering from any kind of errors along with providing a better flexibility for making changes in the behaviour during the time of execution.
Data Scheme with Dynamic Integrity Assurance and Secret Sharing
The data of the patient’s acts as a significant factor for performing medical diagnosis and patient’s health care. So the security of the distributed data storages are very important. But due to the presence of distributed architecture creating a secure and efficient storage is very challenging. Another major reason lying behind this problem is due to the resource-constrained nature that the sensor nodes are having. This paper has been chosen as this addresses the challenges that are faced by the Wireless Body Area Networks along with proposing a novel secure and efficient data storage scheme which is assisted by the dynamic integrity checking.
This paper is associated with depicting the fact that mobility plays a vital role in understanding the effectiveness of clinical decision making. In this paper a novel wearable mobility monitoring system is introduced which is known as the WMMS so as to have a ubiquitous measurement of the mobility. The prototype of this has been created by making use of the smart phone-based approach which is associated with allowing in having a all-in-one WMMS. This paper is used as the evaluation of the system helps in providing the capability of detecting the changes of state along with providing the ability to identify the contexts from the photographs.
References:
Barnickel, J., Karahan, H., & Meyer, U. (2010, June). Security and privacy for mobile electronic health monitoring and recording systems. In World of Wireless Mobile and Multimedia Networks (WoWMoM), 2010 IEEE International Symposium on a (pp. 1-6). IEEE.
Cheng, H. T., & Zhuang, W. (2010). Bluetooth-enabled in-home patient monitoring system: Early detection of Alzheimer’s disease. IEEE Wireless Communications, 17(1), 74-79.
Corchado, J. M., Bajo, J., Tapia, D. I., & Abraham, A. (2010). Using heterogeneous wireless sensor networks in a telemonitoring system for healthcare. IEEE transactions on information technology in biomedicine, 14(2), 234-240.
Fan, R., Ping, L. D., Fu, J. Q., & Pan, X. Z. (2010, October). The new secure and efficient data storage approaches for Wireless Body Area Networks. In Wireless Communications and Signal Processing (WCSP), 2010 International Conference on (pp. 1-5). IEEE.
Haché, G., Lemaire, E. D., & Baddour, N. (2011). Wearable mobility monitoring using a multimedia smartphone platform. IEEE transactions on instrumentation and measurement, 60(9), 3153-3161.
Ibraimi, L., Asim, M., & Petkovi?, M. (2009, June). Secure management of personal health records by applying attribute-based encryption. In Wearable Micro and Nano Technologies for Personalized Health (pHealth), 2009 6th International Workshop on (pp. 71-74). IEEE.
Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area networks. IEEE Wireless communications, 17(1).
Shin, J. H., Lee, B., & Park, K. S. (2011). Detection of abnormal living patterns for elderly living alone using support vector data description. IEEE Transactions on Information Technology in Biomedicine, 15(3), 438-448.
Wang, Q., Ren, K., Yu, S., & Lou, W. (2011). Dependable and secure sensor data storage with dynamic integrity assurance. ACM Transactions on Sensor Networks (TOSN), 8(1), 9.