Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30840
Privacy Issues in Pervasive Healthcare Monitoring System: A Review

Authors: Rusyaizila Ramli, Nasriah Zakaria, Putra Sumari


Privacy issues commonly discussed among researchers, practitioners, and end-users in pervasive healthcare. Pervasive healthcare systems are applications that can support patient-s need anytime and anywhere. However, pervasive healthcare raises privacy concerns since it can lead to situations where patients may not be aware that their private information is being shared and becomes vulnerable to threat. We have systematically analyzed the privacy issues and present a summary in tabular form to show the relationship among the issues. The six issues identified are medical information misuse, prescription leakage, medical information eavesdropping, social implications for the patient, patient difficulties in managing privacy settings, and lack of support in designing privacy-sensitive applications. We narrow down the issues and chose to focus on the issue of 'lack of support in designing privacysensitive applications' by proposing a privacy-sensitive architecture specifically designed for pervasive healthcare monitoring systems.

Keywords: Human Factors, Pervasive Healthcare, PrivacyIssues

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2373


[1] Varshney, U.: Pervasive healthcare and wireless health monitoring. Mob.Netw. Appl. 12 (2007) 113-127
[2] Kosseim, P., Emam, K.E.: Privacy Interests in Prescription Data, Part I: Prescriber Privacy. IEEE Security and Privacy 7 (2009) 72-76
[3] Westin, A.F.: Privacy and Freedom. The Bodley Head Ltd (1970)
[4] Jenkins, D., Gerred, S.: Electrocardiogram (ECG, RKG) library. Vol. 2009
[5] Weiser, M.: Hot topics-ubiquitous computing. Computer 26 (1993) 71- 72
[6] Abowd, G.D., Mynatt, E.D.: Charting past, present, and future research in ubiquitous computing. ACM Trans. Comput.-Hum. Interact. 7 (2000) 29-58
[7] Schilit, B., Hong, J., Gruteser, M.: Wireless Location Privacy Protection. Computer 36 (2003) 135-137
[8] Beckwith, R.: Designing for Ubiquity: The Perception of Privacy. IEEE Pervasive Computing 2 (2003) 40-46
[9] Kai, W., Yan, S., Xukai, Z., Durresi, A., Shiaofen, F.: Pervasive andTrustworthy Healthcare. Advanced Information Networking and Applications - Workshops, 2008. AINAW 2008. 22nd International Conference (2008) 750-755
[10] Goethe, J.W., Bronzino, J.D.: An expert system for monitoring psychiatric treatment. Engineering in Medicine and Biology Magazine, IEEE 14 (1995) 776-780
[11] A.J, R.: Wireless physiological monitoring for psychiatric patients. Mechanical and Mechatronic Engineering, Vol. MScEng. University of Stellenbosch (2008)
[12] Varshney, U.: Managing Comprehensive Wireless Patient Monitoring Pervasive Health Conference and Workshops, 2006 (2006) 1-4
[13] Dai, P.-D., Zhang, T.-Y., Wang, Z.-M., Chen, J.X., Wang, K.-Q.: Privacy Interests in Prescription Data, Part 2: Patient Privacy. Computing in Science and Engg. 7 (2009) 75-78
[14] Adams, A., Martina, M., Sasse, A., Sasse, M.A.: Privacy in Multimedia Communications: Protecting Users, Not Just Data. Springer (2001) 49- 64
[15] Cornwell, J., Fette, I., Hsieh, G., Prabaker, M., Rao, J., Tang, K., Vaniea, K., Bauer, L.Cranor, L., Hong, J., McLaren, B., Reiter, M., Sadeh, N.: User-Controllable Security and Privacy for Pervasive Computing. 8th IEEE Workshop on Mobile Computing Systems and Applications (HotMobile 2007), Vol. 8 (2007)
[16] Yahoo Web Messenger,
[17] Microsoft: Windows Live Messenger,
[18] Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., Rao, J.: Understanding and Capturing People-s Privacy Policies in a Mobile Social Networking Application. Journal of Personal and Ubiquitous Computing (2008) 14
[19] Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. Proceedings of the 2nd international conference on Mobile systems, applications, and services. ACM, Boston, MA, USA (2004)
[20] Hong, J., Satyanarayanan, M., Cybenko, G.: Security & Privacy. Pervasive Computing, IEEE (2007)
[21] Kara, A.: Protecting Privacy in Remote-Patient Monitoring. Computer 34 (2001) 24-27
[22] Kelley, P.G., Drielsma, P.H., Sadeh, N., Cranor, L.F.: User-Controllable Learning of Security and Privacy Policies. ACM CCS 2008 Conference (2008)
[23] Kim, J., Beresford, A., Stajano, F.: Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper). Ubiquitous Convergence Technology (2007) 263-272
[24] Martino, L.D., Qun, N., Dan, L., Bertino, E.: Multi-domain and privacyaware role based access control in eHealth. Pervasive Computing Technologies for Healthcare, 2008. PervasiveHealth 2008. Second International Conference (2008) 131-134
[25] Puzar, M., Plagemann, T., Roudier, Y.: Security and privacy issues in middleware for emergency and rescue applications. Pervasive Computing Technologies for Healthcare, 2008. PervasiveHealth 2008. Second International Conference (2008) 89-92
[26] Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., Rao, J.: Understanding and capturing people's privacy policies in a mobile social networking application. Personal Ubiquitous Comput. 13 (2009) 401-412
[27] Weerasinghe, D., Elmufti, K., Rajarajan, M., Rakocevic, V.: Patient's privacy protection with anonymous access to medical services. Pervasive Computing Technologies for Healthcare, 2008. PervasiveHealth 2008. (2008)127-130
[28] Adlam, T.D., Evans, N., Gibbs, C., Orpwood, R.: User Evaluation of Smart Flats for People with Dementia. Pervasive Health Conference and Workshops, 2006 (2006) 1-4
[29] Butz, A., Kruger, A.: User-centered development of a pervasive healthcare application. Pervasive Health Conference and Workshops (2006) 1-8
[30] Dong, C., Dulay, N.: Privacy Preserving Trust Negotiation for Pervasive Healthcare. Pervasive Health Conference and Workshops, 2006 (2006) 1-9
[31] Elmufti, K., Weerasinghe, D., Rajarajan, M., Rakocevic, V., Khan, S.: Privacy in Mobile Web Services eHealth. Pervasive Health Conference and Workshops, 2006 (2006) 1-6
[32] Jacobsson, M., Niemegeers, I.: Privacy and anonymity in personal networks. Pervasive Computing and Communications Workshops, 2005. PerCom 2005 Workshops. Third IEEE International Conference on (2005) 130-135
[33] Jae Hun, L., Jin Kyu, P., Sang Wook, K.: User-Directed Privacy Protection in the Ubiquitous Environment. Embedded and Ubiquitous Computing, 2008. EUC '08. IEEE/IFIP International Conference on, Vol. 2 (2008) 37-42
[34] Jasemian, Y.: Security and privacy in a wireless remote medical system for home healthcare purpose. Pervasive Health Conference and Workshops, 2006 (2006) 1-7
[35] Ahamed, S.I., Talukder, N., Kameas, A.D.: Towards privacy protection in pervasive healthcare. Intelligent Environments, 2007. IE 07. 3rd IET International Conference on (2007) 296-303