Conceptual framework for the security of mobile health applications on Android platform

被引:68
作者
Hussain, Muzammil [1 ]
Zaidan, A. A. [2 ]
Zidan, B. B. [2 ]
Iqbal, S. [1 ]
Ahmed, M. M. [3 ]
Albahri, O. S. [2 ]
Albahri, A. S. [2 ]
机构
[1] Univ Management & Technol, Sch Syst & Technol, Dept Comp Sci, Lahore, Pakistan
[2] Univ Pendidikan Sultan Idris, Fac Arts Comp & Creat Ind, Dept Comp, Tanjong Malim, Perak, Malaysia
[3] CUST, Dept Comp Sci, Islamabad, Pakistan
关键词
POLICY ENFORCEMENT; TELEMEDICINE; MALWARE; METHODOLOGY; FEATURES; PRIVACY; RECORDS; USAGE;
D O I
10.1016/j.tele.2018.03.005
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Mobile Health (mHealth) applications are readily accessible to the average user of mobile devices, and despite the potential of mHealth applications to improve the availability, affordability and effectiveness of delivering healthcare services, they handle sensitive medical data, and as such, have also the potential to carry substantial risks to the security and privacy of their users. Developers of applications are usually unknown, and users are unaware of how their data are being managed and used. This is combined with the emergence of new threats due to the deficiency in mobile applications development or the design ambiguities of the current mobile operating systems. A number of mobile operating systems are available in the market, but the Android platform has gained the topmost popularity. However, Android security model is short of completely ensuring the privacy and security of users' data, including the data of mHealth applications. Despite the security mechanisms provided by Android such as permissions and sandboxing, mHealth applications are still plagued by serious privacy and security issues. These security issues need to be addressed in order to improve the acceptance of mHealth applications among users and the efficacy of mHealth applications in the healthcare systems. Thus, this paper presents a conceptual framework to improve the security of medical data associated with Android mHealth applications, as well as to protect the privacy of their users. Based on the literature review that suggested the need for the intended security framework, three-distinct and successive phases are presented, each of which is described in a separate section. First, discussed the design process of the first phase to develop a security framework for mHealth apps to ensure the security and privacy of sensitive medical data. The second phase is discussed who to achieve the implementation of a prototypic proof-of-concept version of the framework. Finally, the third phase ending discussed the evaluation process in terms of effectiveness and efficiency for the proposed framework.
引用
收藏
页码:1335 / 1354
页数:20
相关论文
共 164 条
[81]  
Bai GD, 2010, L N INST COMP SCI SO, V50, P326
[82]   A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android [J].
Barrera, David ;
Kayacik, H. Guenes ;
van Oorschot, P. C. ;
Somayaji, Anil .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :73-84
[83]   Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices [J].
Becher, Michael ;
Freiling, Felix C. ;
Hoffmann, Johannes ;
Holz, Thorsten ;
Uellenbeck, Sebastian ;
Wolf, Christopher .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :96-111
[84]  
Bellard F, 2005, USENIX Association Proceedings of the FREENIX/Open Source Track, P41
[85]   Repackaging Android Applications for Auditing Access to Private Data [J].
Berthome, P. ;
Fecherolle, T. ;
Guilloteau, N. ;
Lalande, J. -F. .
2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, :388-396
[86]  
Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792
[87]  
Bugiel S., 2012, Towards a framework for android security modules: Extending se android type enforcement to android middleware
[88]  
Bugiel S., 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, P51
[89]  
Chen QA, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P1037
[90]  
Chin E, 2011, Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys '11, New York, NY, USA, P239, DOI DOI 10.1145/1999995.2000018