Privacy Issues in Pervasive Healthcare Monitoring System: A Review

Privacy issues commonly discussed among researchers, practitioners, and end-users in pervasive healthcare. Pervasive healthcare systems are applications that can support patient-s need anytime and anywhere. However, pervasive healthcare raises privacy concerns since it can lead to situations where patients may not be aware that their private information is being shared and becomes vulnerable to threat. We have systematically analyzed the privacy issues and present a summary in tabular form to show the relationship among the issues. The six issues identified are medical information misuse, prescription leakage, medical information eavesdropping, social implications for the patient, patient difficulties in managing privacy settings, and lack of support in designing privacy-sensitive applications. We narrow down the issues and chose to focus on the issue of 'lack of support in designing privacysensitive applications' by proposing a privacy-sensitive architecture specifically designed for pervasive healthcare monitoring systems.




References:
[1] Varshney, U.: Pervasive healthcare and wireless health monitoring.
Mob.Netw. Appl. 12 (2007) 113-127
[2] Kosseim, P., Emam, K.E.: Privacy Interests in Prescription Data, Part I:
Prescriber Privacy. IEEE Security and Privacy 7 (2009) 72-76
[3] Westin, A.F.: Privacy and Freedom. The Bodley Head Ltd (1970)
[4] Jenkins, D., Gerred, S.: Electrocardiogram (ECG, RKG) library. Vol.
2009
[5] Weiser, M.: Hot topics-ubiquitous computing. Computer 26 (1993) 71-
72
[6] Abowd, G.D., Mynatt, E.D.: Charting past, present, and future research
in ubiquitous computing. ACM Trans. Comput.-Hum. Interact. 7
(2000) 29-58
[7] Schilit, B., Hong, J., Gruteser, M.: Wireless Location Privacy
Protection. Computer 36 (2003) 135-137
[8] Beckwith, R.: Designing for Ubiquity: The Perception of Privacy. IEEE
Pervasive Computing 2 (2003) 40-46
[9] Kai, W., Yan, S., Xukai, Z., Durresi, A., Shiaofen, F.: Pervasive
andTrustworthy Healthcare. Advanced Information Networking and
Applications - Workshops, 2008. AINAW 2008. 22nd International
Conference (2008) 750-755
[10] Goethe, J.W., Bronzino, J.D.: An expert system for monitoring
psychiatric treatment. Engineering in Medicine and Biology Magazine,
IEEE 14 (1995) 776-780
[11] A.J, R.: Wireless physiological monitoring for psychiatric patients.
Mechanical and Mechatronic Engineering, Vol. MScEng. University of
Stellenbosch (2008)
[12] Varshney, U.: Managing Comprehensive Wireless Patient Monitoring
Pervasive Health Conference and Workshops, 2006 (2006) 1-4
[13] Dai, P.-D., Zhang, T.-Y., Wang, Z.-M., Chen, J.X., Wang, K.-Q.:
Privacy Interests in Prescription Data, Part 2: Patient Privacy.
Computing in Science and Engg. 7 (2009) 75-78
[14] Adams, A., Martina, M., Sasse, A., Sasse, M.A.: Privacy in Multimedia
Communications: Protecting Users, Not Just Data. Springer (2001) 49-
64
[15] Cornwell, J., Fette, I., Hsieh, G., Prabaker, M., Rao, J., Tang, K.,
Vaniea, K., Bauer, L.Cranor, L., Hong, J., McLaren, B., Reiter, M.,
Sadeh, N.: User-Controllable Security and Privacy for Pervasive
Computing. 8th IEEE Workshop on Mobile Computing Systems and
Applications (HotMobile 2007), Vol. 8 (2007)
[16] Yahoo Web Messenger, http://messenger.yahoo.com
[17] Microsoft: Windows Live Messenger,
http://mail.live.com/mail/MSNWebIMDecomm.aspx
[18] Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., Rao,
J.: Understanding and Capturing People-s Privacy Policies in a Mobile
Social Networking Application. Journal of Personal and Ubiquitous
Computing (2008) 14
[19] Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive
ubiquitous computing. Proceedings of the 2nd international conference
on Mobile systems, applications, and services. ACM, Boston, MA,
USA (2004)
[20] Hong, J., Satyanarayanan, M., Cybenko, G.: Security & Privacy.
Pervasive Computing, IEEE (2007)
[21] Kara, A.: Protecting Privacy in Remote-Patient Monitoring. Computer
34 (2001) 24-27
[22] Kelley, P.G., Drielsma, P.H., Sadeh, N., Cranor, L.F.: User-Controllable
Learning of Security and Privacy Policies. ACM CCS 2008
Conference (2008)
[23] Kim, J., Beresford, A., Stajano, F.: Towards a Security Policy for
Ubiquitous Healthcare Systems (Position Paper). Ubiquitous
Convergence Technology (2007) 263-272
[24] Martino, L.D., Qun, N., Dan, L., Bertino, E.: Multi-domain and privacyaware
role based access control in eHealth. Pervasive Computing
Technologies for Healthcare, 2008. PervasiveHealth 2008. Second
International Conference (2008) 131-134
[25] Puzar, M., Plagemann, T., Roudier, Y.: Security and privacy issues in
middleware for emergency and rescue applications. Pervasive
Computing Technologies for Healthcare, 2008. PervasiveHealth 2008.
Second International Conference (2008) 89-92
[26] Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., Rao,
J.: Understanding and capturing people's privacy policies in a mobile
social networking application. Personal Ubiquitous Comput. 13 (2009)
401-412
[27] Weerasinghe, D., Elmufti, K., Rajarajan, M., Rakocevic, V.: Patient's
privacy protection with anonymous access to medical services.
Pervasive Computing Technologies for Healthcare, 2008.
PervasiveHealth 2008. (2008)127-130
[28] Adlam, T.D., Evans, N., Gibbs, C., Orpwood, R.: User Evaluation of
Smart Flats for People with Dementia. Pervasive Health Conference
and Workshops, 2006 (2006) 1-4
[29] Butz, A., Kruger, A.: User-centered development of a pervasive
healthcare application. Pervasive Health Conference and Workshops
(2006) 1-8
[30] Dong, C., Dulay, N.: Privacy Preserving Trust Negotiation for
Pervasive Healthcare. Pervasive Health Conference and Workshops,
2006 (2006) 1-9
[31] Elmufti, K., Weerasinghe, D., Rajarajan, M., Rakocevic, V., Khan, S.:
Privacy in Mobile Web Services eHealth. Pervasive Health Conference
and Workshops, 2006 (2006) 1-6
[32] Jacobsson, M., Niemegeers, I.: Privacy and anonymity in personal
networks. Pervasive Computing and Communications Workshops,
2005. PerCom 2005 Workshops. Third IEEE International Conference
on (2005) 130-135
[33] Jae Hun, L., Jin Kyu, P., Sang Wook, K.: User-Directed Privacy
Protection in the Ubiquitous Environment. Embedded and Ubiquitous
Computing, 2008. EUC '08. IEEE/IFIP International Conference on,
Vol. 2 (2008) 37-42
[34] Jasemian, Y.: Security and privacy in a wireless remote medical system
for home healthcare purpose. Pervasive Health Conference and
Workshops, 2006 (2006) 1-7
[35] Ahamed, S.I., Talukder, N., Kameas, A.D.: Towards privacy protection
in pervasive healthcare. Intelligent Environments, 2007. IE 07. 3rd IET
International Conference on (2007) 296-303