Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A platform for secure monitoring and sharing of generic health data in the cloud
Thilakanathan D., Chen S., Nepal S., Calvo R., Alem L. Future Generation Computer Systems35 102-113,2014.Type:Article
Date Reviewed: Oct 13 2014

The hype of using the cloud for just about anything has led to an increase in its application in various fields, such as engineering and medical research. This paper discusses the use of mobile devices to conveniently allow doctors to monitor patient data and keep it secure with cloud resources.

The paper is a good start for investigating health informatics and the kinds of challenges faced from the computing side of hosting large amounts of data and keeping it encrypted to protect its privacy. The paper describes the ElGamal encryption algorithm with details on how it can be used to keep data secure.

At first glance, the paper seemed like just another application implemented through mobile devices connecting to cloud services and keeping everything secure. However, I was pleasantly surprised by the results discussed. The authors go into detail about the security protocols used and system security, topics that are usually missing when such experiments are conducted. The authors test the two-way communication and the time it takes with security protocols on and off. This showed that uploading takes longer as large packets are uploaded from mobile devices and can be improved if encryption protocols are used. This highlights a need for improvement when fast uploads are needed to monitor necessary data, such as ECGs of patients with 30-second delays; monitoring patients’ periodic levels of necessary data from where they are through mobile devices would be very useful and would revolutionize patient treatment.

Reviewer:  Mariam Kiran Review #: CR142819 (1501-0051)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (C.2.0 ... )
 
 
Cloud Computing (C.2.4 ... )
 
 
Medical Information Systems (J.3 ... )
 
 
Life And Medical Sciences (J.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy