Investigating Privacy Preserving Healthcare Social Network
Keywords:Healthcare Network, Social Network, Privacy
AbstractAs health information is valuable, thieves will continue to steal it. Likewise, insufficiently trained employees at organizations or even individuals that pay less attention to creating a privacy-aware culture will suffer data losses when unprotected devices are lost, stolen or sniffed. In this work, sensors are exploited to collect and generate data to be processed, clustered and shared via locally developed application to improve social networking in context of privacy preserving healthcare. The solution is developed for Android operating system. It provides the user with a set of network related social services. In addition to (i) showing specific places (ii) sharing the user location; (iii) showing nearby friends; (iv) getting and sharing weather temperature, it clusters nearby friends; calculates and shares distance moved, calories burned and active time; calculates tracking and shares the user heart rate,. Data privacy model is presented using data session levels and user roles to ensure privacy within healthcare social network.
. M. Blackstock, R. Lea, and A. Friday, “Uniting online social networks with places and things,” in Proc. of the Second International Workshop on Web of Things, New York, NY, USA, 2011, pp. 5:1–5:6.
. C. Aggarwal, T.F. Abdelzaher, “Integrating Sensors and Social Networks”, Social Network Data Analytics, chapter 14, pp. 379-412, Springer, 2011.
. E. Miluzzo, N. D. Lane, S. B. Eisenman, A. T. Campbell, “CenceMe: Injecting Sensing Presence into Social Network Applications using Mobile Phones”, in Proc. of the 2nd European Conference on Smart Sensing and Context, Springer, October, 2007, pp. 1-28.
. R. Ganti, N. Pham, H. Ahmadi, S. Nangia, and T. Abdelzaher, “GreenGPS: A Participatory Sensing Fuel-Efficient Maps Application”, in Proc. of Mobisys, San Francisco, CA, June 2010, pp. 151-164.
. Q. Memon, S. Khoja, “Academic Program Administration via Semantic Web – A Case Study”, Proceedings of International Conference on Electrical, Computer, and Systems Science and Engineering, Dubai, Volume 37, pp. 695-698, 2009.
. Q. Memon, S. A. Khoja, “Semantic Web Approach for Program Assessment”, International Journal of Engineering Education, Vol. 25, No. 5, pp. 1020-1028, 2009
. A. Moravejosharieh, H. Modares, R. Salleh, “Overview of Mobile IPv6 Security,” in Proc. of 3rd International Conference on Intelligent Systems, Modelling and Simulation, 2012, pp. 584-587, DDI: 10.1109/ISMS.2012.9.
. Q. Memon, "A New Approach to Video Security over Networks", International Journal of Computer Applications in Technology, Vol. 25, 2006, pp. 72-83.
. Y. Altshuler, Y. Elovici, N. Aharony, and A. Pentland, Security and Privacy in Social Networks, Springer, 2012.
. M. Huber, M. Mulazzani, E. Weippl, G. Kitzler, and S. Goluch, “Exploiting social networking sites for spam,” in Proc. of 17th ACM Conference on Computer and Communications Security, NY, USA, 2010, pp. 693–695.
. B. Fung, K. Wang, R. Chen, and P. S. Yu, “Privacy-Preserving Data Publishing: A Survey of Recent Developments,” ACM Computing Surveys, (CSUR), Vol. 42, No. 4, 2010, doi: 10.1145/1749603.1749605
. Q. Memon, S. A. Khoja, “RFID based Patient Tracking in Regional Collaborative Healthcare”, International Journal of Computer Applications in Technology, Vol. 45, No. 4, 2012, pp. 231–244, doi: 10.1504/IJCAT.2012.051123
. Q. Memon, S Akhtar, AA Aly, “Role management in adhoc networks,” Proceedings of the Spring Simulaiton Multi conference-Vol.1, 2007, pp. 131-137.
. K. M. Karkanen, “Walking/running Heart Rate Monitoring System,” U.S. Patent 6013009, Jan 11, 2000.