longitude and latitude) to the server. The server API
also has the responsibility of reading and parsing the
client’s message and responding accordingly.
To remotely access the EHR of a particular
monitored person, the healthcare professionals use
the App installed on their Android mobile devices
and enter their usernames and passwords to logon to
the App. Subsequently, the App carries out, in a
transparent manner to the healthcare professional,
the UHTP trust negotiation process; which involves
the three levels of authentication previously
described. It silently performs the authentication
process within a secure session. This guarantees the
encryption of the messages exchanged between the
client and the server. If trust negotiation succeeds
and the healthcare professional has sufficient rights
to access the requested EHR, then access will be
granted. This application was tested to be fully
functional running on an Android mobile device
emulator. It can be installed on a wide range of
mobile devices running Android as an operating
system. It can also operate on wireless connections
and mobile infrastructure. This application has
demonstrated the successful integration of trust
negotiation and the TLS protocol. These
experimental works confirm that by applying the
proposed trust negotiation approach, the expected
analysis results can be achieved. The developed
application is also practical and easy to adopt, as
users are not required to have any additional
knowledge or expertise in the use of the underlying
technologies. The results collected from this
experiment show significant improvements in
overcoming security concerns. The improvements in
the security of the remote monitoring systems are
achieved by providing extra protective features to
the access control and authorization process before
the release of any data over unsecured network.
4 CONCLUSIONS
The approaches proposed in this study ensure that
patients’ EHRs are only disclosed to the authorized
healthcare professional, on the registered device and
at the appropriate locations. They ensure the
confidentiality of information, by securing its
transmission, using Transport Layer Security (TLS)
as the underlying protocol. Building on the strengths
of this protocol, a trust negotiation approach is
developed. This approach authenticates the person
receiving the care, the person administering it, the
mobile device used in accessing the health
information, as well as the location where the
healthcare is administered. However, this study did
not address the security issues arising from the use
of the remote monitoring system on the patient’s
side. Future research needs to take a more holistic
view for elderly health monitoring.
REFERENCES
Ajayi, O., Sinnott, R. & Stell, A. 2007. Formalising
Dynamic Trust Negotiations in Decentralised
Collaborative e-Health Systems. In: Availability,
Reliability and Security, 2007 ARES 2007. The Second
International Conference on, 10-13 April 2007 2007.
3-10.
Asokan, N. & Tarkkala, L. 2005. Issues in initializing
security. In: Signal Processing and Information
Technology, 2005. Proceedings of the Fifth IEEE
International Symposium on, 21-21 Dec. 2005. 460-
465.
Han, R.-F., Wang, H.-X., Wang, Y.-H. & Zuo, K.-L. 2009.
Membership-Based Access Control for Trust
Negotiation in Open Systems. In: Information
Assurance and Security, 2009, IAS '09. Fifth
International Conference on, 18-20 Aug. 2009. 189-
192.
Kim, J., Choi, H.-S., Wang, H., Agoulmine, N., Deerv, M.
J. & Hong, J. W.-K. 2010. POSTECH's U-Health
Smart Home for elderly monitoring and support. In:
World of Wireless Mobile and Multimedia Networks
(WoWMoM), 2010 IEEE International Symposium on
a, 2010. 1-6.
Seamons, K. 2004. TrustBuilder: Automated Trust
Negotiation in Open Systems. 3rd Annual PKI R&D
Workshop. Gaithersburg- Brigham Young University.
Vawdrey, D. K., Sundelin, T. L., Seamons, K. E. &
Knutson, C. D. 2003. Trust negotiation for
authentication and authorization in healthcare
information systems. In: Engineering in Medicine and
Biology Society, 2003. Proceedings of the 25th Annual
International Conference of the IEEE, 17-21 Sept.
2003. 1406-1409 Vol.2
Figure 6: The App’s screen shot.
IMPROVING E-HEALTH SECURITY THROUGH TRUST NEGOTIATION
177