Privacy Security and Resilience in Mobile Healthcare Applications
Privacy Security and Resilience in Mobile Healthcare Applications
To cite this article: Wenjun Lin, Ming Xu, Jingyi He & Wenjun Zhang (2023) Privacy, security and
resilience in mobile healthcare applications, Enterprise Information Systems, 17:3, 1939896,
DOI: 10.1080/17517575.2021.1939896
a
Department of Mechanical Engineering, University of Saskatchewan, Saskatoon, SK, Canada; bFaculty of
Nursing, University of Alberta, Edmonton, Alberta, Canada
1. Introduction
Healthcare burden is one of the major social and economic problems around the world,
especially in an ageing society, where it entails tremendous health expenses and labour
resources. Traditional hospital-centric healthcare suffers from excessive in-hospital wait
ing times. One of the most complaint issues recorded is the dissatisfaction in the length of
waiting time in hospitals. Patients are dissatisfied by the inconveniencies and unavailable
time of appointment slots, especially for patients with urgent needs. In some cases like
emergency departments, if not dealt with effectively, the waiting time problem could lead
to a huge loss of human life. Therefore, it is emerging to pose up-and-coming healthcare
solutions to reduce the waiting time and release the heavy burden of the existing
healthcare system.
Mobile applications, also known as ‘apps’, have been seen rapid growth with the
release of affordable smart devices (e.g., smartphones, tablet computers). There is
a massive opportunity for health service systems to take advantage of mobile apps to
enhance the efficiency of healthcare information management systems and to improve
the patients’ service quality (Aceto, Persico, and Pescapé 2020; Lancharoen, Suksawang,
and Naenna 2020; Li et al. 2019). On the flip side of the coin, concerns, such as security,
privacy, usability and resilience, and so on, have limited the adoption of the technology
(Al-Muhtadi et al. 2019; Hathaliya and Tanwar 2020). Since health information (e.g.,
phenomena, health condition, and emergency) is relatively sensitive for users, any
inappropriate disclosure may violate user privacy (Liang et al. 2012; Rahmadika and Rhee
2018). Users may also worry about their critical health data being tampered with when
their health data are stored in untrusted cloud servers (Zhou et al. 2013; Loft et al. 2021). In
addition, the mobile device is usually operated in a wireless environment and different
devices have various hardware and operating systems (OSs) which might create compat
ibility issues that might cause system unavailability like data loss and a single point of
failure (Lo’ai et al. 2015).
To cope with the issues above, in this paper we treat mobile apps, operating systems,
databases, and their related communication services as a whole system called mobile
network system (MNS). The infrastructure-substance (I-S) framework (Zhang and Lin 2010;
Zhang and Van Luttervelt 2011; Zhang, Wang, and Lin 2019) along with a general model
ling methodology for a system ontology (Cai et al. 2017; Wang et al. 2014; Zhang and
Wang 2016) are used to build the system, in which an individual’s privacy is secured in
a highly resilient system. The remaining part of this paper is organised as follows.
Section 2 provides an overview of studies related to security and resilience for privacy
protection. Section 3 presents the MNS and a list of system design principles to achieve
a high degree of resilience in privacy protection. Section 4 demonstrates the principles’
application by a mobile app for hospital appointment scheduling. Finally, Section 5
concludes this paper with discussions of benefits and future works.
2.2. Resilience
The concept of resilience was originally referred to tissue recovery from damages. Later,
the concept has been expanded into the field of the natural ecosystem and material
science, and a human-centred system or a sociology system (Holling 1973). Zhang and Lin
(2010) maybe among one of the earliest researchers who study the resilience of data
system. In their work, derived data was described for a data system recovery. This
mechanism is similar with the idea of the derived attribute in data management (Zhang
1994), and the idea of functional redundancy in mechanical systems (Zhang and Van
Luttervelt 2011). It is noted that a general categorisation of different types of redundancy
in the context of system and system design may be referred to (Fan et al. 2015; Sun et al.
2011). Woods (2015) considered resilience as a property that covers robustness. In this
work, resilience is spanned by three attributes that are robustness, recoverability and
adaptation. This understanding of resilience is a mixing of means (adaption) and end
(resilience and recoverability and as well as mixing of the three distinct concepts (relia
bility, robustness, and resilience) according to (Zhang and Van Luttervelt 2011) and is not
conducive to developing independent theory for resilience. Further, efforts have been
taken to establish the resilient digital and information system; particularly a method called
forward secrecy was developed to enhance untended wireless networks from intrusion
(Di et al. 2012). In this study, a method was developed to enforce the resource or function
redundancy and ensures the security feature for the entire system, which is similar to the
derived information mechanism and redundancy as proposed by zhang2010principle. In
Taleb, Ksentini, and Sericola (2016)’s work, an idea of relocating and restoring lost state
data from existing resources is used on the next generation mobile system development.
Techniques like visualised network and mobility management were used in place of
redundancy physical equipment.
348 W. LIN ET AL.
Figure 2. The I-S view of the relationship among PSR for MNS.
external resource to a service system (e.g., MNS), as well as external signals (or data),
which represent the semantics of privacy.
• Rule I-3: Choose an adaptive app style based on the function and security
requirements;
• Rule I-4: Evaluate a platform, at local servers or clouds, with both security and
functional requirements. As both service and data storage of mobile apps are moving
towards the clouds, the security obligation needs to be transferred as well due to different
cloud platforms has different service requirements.
Substance aspect
• Rule S-1: Identify and classify privacy information into two categories: attribute and
relationship. The attributes refer to those that define an entity. The relationship refers to
information that links one entity to another entity or others;
• Rule S-2: Specify the responsibilities of users and systems to determine forms to
enhance. There are two forms: legal binding and non-legal binding. Legal binding involves
more steps to establish, which often makes the user shy away or has a poor understanding
of terms and conditions. Therefore, non-legal binding could be chosen as a trade-off;
• Rule S-3: Minimise the information required from users. More information has a higher
cost of losing privacy information;
• Rule S-4: Determine appropriate techniques and algorithms for the security of private
information, for example, encryption and certificate verification;
• Rule S-5: Plan for both data storage and data processing security strategies. There is
a trade-off between data storage security and processing efficiency. Local storage has a higher
degree of security but may have insufficient data processing power. While cloud storage may
have advantages of data processing efficiency, it might have a higher risk of a data breach.
• Rule S-6: Balance among encryption, authentication, authorisation, usability, storage
strategy, encryption, and computational capability for an acceptable security expectation;
• Rule S-7: Develop a life-time management strategy against privacy abuse. Besides the
techniques, human and cultural factors need to be taken into considerations.
Energy aspect
• Rule E-1: Check the energy (e.g., battery) level before running any critical process, like,
heavy encryption, heavy algorithm calculation, or mass data transfer. The system should
be designed to alert users of a low battery situation;
• Rule E-2: Monitor the status of the energy source closely considering environmental
factors such as battery temperature to facilitate a pro-active energy plan.
• Rule R-1: Identify critical functions and design redundancy. For instance, data transporta
tion is a crucial function for a mobile app. The tunnel for data transportation can be either
4G (4th Gen cellular network) or 2G (2nd Gen cellular network), and this forms
a redundancy;
ENTERPRISE INFORMATION SYSTEMS 351
• Rule R-2: Arrange the redundant capacity regarding the critical functions. Capacity refers to
the availability of electricity, computation, storage or bandwidth. Take data storage as an
example. In complement to a remote database, redundancy of storage capacity would be
having a local database as a duplicate safeguard to avoid a loss of data;
• Rule R-3: Design the redundant infrastructure for critical functions. Multiple back-end
services are involved in a mobile apps based system. They include the clouds, web server,
database server and cellular telephone network equipment. Their redundancy is to ensure
a reliable and robust service;
Axiom 4: Error forecasting and handling mechanism. Mobile apps errors are
a combined result from design, coding, operation, as well as resource utilisation.
Suppose that an app has a low success rate to access a remote database due to
uncontrollable factors. The remote database login operation should be treated as
a separate procedure. By decoupling the login procedure, other functions can be oper
ated with improved robustness.
• Rule R-7: Forecast and locate possible vulnerability from algorithms, logical procedure, and
the relationship between different system components;
4. Case study
To explain how the design principles may be applied to designing an MNS which
processes healthcare information, a mobile app is demonstrated here. The app is devel
oped for outpatients to make doctor appointments based on Dai (2016)’s previous work.
Functions are added in this work to improve the system’s resilience and security. Note that
although only a mobile app design is illustrated, the whole MNS system should actually
include software, OS, hardware, and communication system, database, and so on.
352 W. LIN ET AL.
The app is developed on a laptop with Windows 10 OS. The primary development
platform is Eclipse which integrated with JDK (Java Development Kit) and Android SDK
(Software Development Kit). The app is expected to operate in a wireless environment like
2 G/4 G or WiFi (Wireless Fidelity). On the same device, the Google Map android app is also
required.
attributes of the action (Register) include symptoms, time, and location that a patient
requests an appointment. The last attribute is marked as registration geographical loca
tion (RGL). For hospitals, attributes such as hospital identity (ID), hospital geographical
location (HGL) and address are identified.
Application of Rule S-3 (minimise information required): The PGL in Figure 6 is being
monitored by the app when running. According to rule S-3, PGL should not be stored or
transmitted because it is closely related to personal identity. In contrast, personal location
information about registration (RGL in Figure 8) can be stored in local storage or trans
ferred to remote servers and databases as evidence of registration. This helps to avoid
354 W. LIN ET AL.
potential issues like data compromise from transferring privacy data like the patient
location.
One of the most critical issues is what part of the location-related data should be
transferred and stored to avoid compromise of personal privacy. According to Rule S-3,
PGL should not be stored or transferred as it is closely related to personal identity. By
contrast, the personal location information regarding registration, i.e., RGL in Figure 6, can
be stored either in the local storage or transferred to a remote server and database, as
evidence of registration.
Application of Rule S-5 (management for data storage, use and transfer): A choice among
local storage, remote server, and the clouds are made considering security, communica
tion efficiency and cost. For instance, patients’ personal health No. and symptom descrip
tions are stored locally. This avoids the risk of patients’ private information leaked from
a centralised database.
Further, two management rules are established. First, only the data owner or device
owner has access to the data follows the authentication strategy and technique. Data
access should not be permitted without the owner’s formal consent. Second, for the data
stored remotely, tools such as the identity shielding technique are applied. This technique
makes information breach through the data mining technique be difficult.
Application of Rule S-6 (Authentication and certification): Authentications are established
with patients’ health No. and credentials like password and fingerprint. When the app
ENTERPRISE INFORMATION SYSTEMS 355
Figure 5. Screenshot of the app at login screen with (right) and without (left) a soft keyboard.
transfers the health No. and credentials to the server, the communication is secured by
HTTPS (HyperText Transfer Protocol Secure) protocol. The protocol encrypted data with
certifications. In the app, the public/private key pairs and certificates are managed by
Keytool from JDK.
Energy aspect
Application of Rule E-1 and E-2 (Energy monitoring): The OS’s attribute
‘ACTION_BATTERY_CHANGED’ is used to monitor the state of a system, in particular, the
real-time battery charge level. In this way, users can decide whether to use a heavy energy
consumption service, e.g., the Google Map navigation.
System resilience
Application of Rule R-1 (Identify critical functions and design redundancy): Critical information
such as patients’ current geographic data, symptom descriptions and designated hospital
have dual-backup, i.e., one copy at a cloud database and one copy at a local database.
Application of Rule R-6 (Monitoring the state of the system function): The OS’s
‘enableNetwork’ method to monitor whether the Internet is connected or not. The result
triggers the app to choose which redundant resource to use. For example, to load critical
information from the local database when the Internet is not available.
356 W. LIN ET AL.
Application of Rule R-7 (Error forecasting): Potential errors are estimated, as: (1) error
occurs while requesting a database connection; (2) users forget login credentials; (3)
the app failed to launch; (4) insufficient power while performing a critical process.
5. Conclusion
The study is motivated by recent attention to the privacy issues in healthcare mobile apps
(Al-Muhtadi et al. 2019; Hathaliya and Tanwar 2020). The private healthcare information
will be compromised to a large extent if a system’s security resilience is not adequate. In
general, systematic consideration of the privacy issues is lacking in the development of
a mobile app. The concept such as resilience privacy security is not clear in the literature.
The main contribution of this study is advancing the understanding of privacy, privacy
security, resilience in security, and their relationships. A set of mobile apps based system
design principles are brought up for comprehensive privacy protections. Also, a mobile
healthcare app is developed to demonstrate how to reduce patients waiting time and
keep their privacy in protection using the design principles.
There are a few limitations of the present study. For one, it may be insufficient in
literature coverage. In future, a systematic review process, which proves to be valuable in
literature (Bokolo Anthony 2021; Ng et al. 2018; Tsang et al. 2021), will be applied to
reviewing articles related to the security of privacy protection and its related resilience
design. For another, proof of the effectiveness of the design principles is needed. We plan
to work with our industry partners and use the MNS for their patient scheduling. Data
ENTERPRISE INFORMATION SYSTEMS 357
collected from case studies will be compared to those from their current system. From
there, we will be able to demonstrate the effectiveness of our principles.
Several future endeavours could potentially be carried out. (1) An analysis could be
performed on the relationship between PSR and other attributes like scalability, usability
and system performance etc. Also, analysis strategies could be investigated for trading-off
among those attributes towards different implementation contexts. (2) A detailed guide
for testing and evaluating PSR in mobile app-based systems could be developed. Once
a system is developed, an applicable and affordable way is needed to test and evaluate all
its attributes. (3) Human factors to PSR need attention, especially how cultural factors may
affect the performance of PSR.
Acknowledgments
Part of the work presented in this paper is based on a Master of Science thesis of Xu (2019), and
herewith this is acknowledged.
Disclosure of statement
No potential conflict of interest was reported by the author(s).
ORCID
Wenjun Lin http://orcid.org/0000-0002-3907-1995
Wenjun Zhang http://orcid.org/0000-0001-7973-8769
References
Aceto, G., V. Persico, and P. Antonio. 2020. “Industry 4.0 And Health: Internet of Things, Big Data, and
Cloud Computing for Healthcare 4.0.” Journal of Industrial Information Integration 18: 100129.
Al-Muhtadi, J., B. Shahzad, K. Saleem, W. Jameel, and M. A. Orgun. 2019. “Cybersecurity and Privacy
Issues for Socially Integrated Mobile Healthcare Applications Operating in a Multi-cloud
Environment.” Health Informatics Journal 25 (2): 315–329. doi:10.1177/1460458217706184.
Alpár, G., J.-H. Hoepman, and J. Siljee. 2011. “The Identity Crisis. Security, Privacy and Usability Issues
in Identity Management.” arXiv Preprint arXiv: 1101.0427.
Avancha, S., A. Baxi, and D. Kotz. 2012. “Privacy in Mobile Technology for Personal Healthcare.” ACM
Computing Surveys (CSUR) 45 (1): 1–54. doi:10.1145/2379776.2379779.
Bokolo, Anthony Jnr. 2021. “Managing digital transformation of smart cities through enterprise
architecture – a review and research agenda.” Enterprise InformationSystems 15 (3): 299–331.
doi:10.1080/17517575.2020
Cai, M. Y., Y. Lin, Z. Gao, C. W. Yuan, and W. J. Zhang. 2017. “Comparison of AH and MFM for Work
Domain Analysis in Light of Interface Design.” In IEEE Inte national Systems Engineering Symposium
(ISSE), 1–6. Vienna, Austria: IEEE.
Chen, H., C. E. Beaudoin, and T. Hong. 2017. “Securing Online Privacy: An Empirical Test on Internet
Scam Victimization, Online Privacy Concerns, and Privacy Protection Behaviors.” Computers in
Human Behavior 70: 291–302. doi:10.1016/j.chb.2017.01.003.
Collins, T. 2006. “NHS Trust Uncovers Password Sharing Risk to Patient Data.” ComputerWeekly.com.
ComputerWeekly.com, July 10, 2006. https://www.computerweekly.com/news/2240077810/
NHS-trust-uncovers-password-sharing-risk-to-patient-data.
358 W. LIN ET AL.
Dai, F. 2016. “On Development of a Green Web-based System for Reducing Waiting Times of
Outpatients.” PhD diss., MSc Thesis, Division of Biomedical Engineering, University of
Saskatchewan . . .
Di, P., G. O. Roberto, C. Soriente, and G. Tsudik. 2012. “United We Stand: Intrusion Resilience in
Mobile Unattended WSNs.” IEEE Transactions on Mobile Computing 12 (7): 1456–1468.
Fan, L. X., M. Y. Cai, Y. Lin, and W. J. Zhang. 2015. “Axiomatic Design Theory: Further Notes and Its
Guideline to Applications.” International Journal of Materials & Product Technology 51 (4):
359–374. doi:10.1504/IJMPT.2015.072557.
Hathaliya, J. J., and S. Tanwar. 2020. “An Exhaustive Survey on Security and Privacy Issues in
Healthcare 4.0.” Computer Communications 153: 311–335. doi:10.1016/j.comcom.2020.02.018.
Holling, C. S. 1973. “Resilience and Stability of Ecological Systems.” Annual Review of Ecology and
Systematics 4 (1): 1–23. doi:10.1146/annurev.es.04.110173.000245.
Huang, D., X. Zhang, M. Kang, and J. Luo. 2010. “MobiCloud: Building Secure Cloud Framework for
Mobile Computing and Communication.” In fifth IEEE international symposium on service oriented
system engineering, 27–34. Nanjing, China: Ieee.
Khan, F., and O. Reyad. 2020. “Application of Intelligent Multi Agent Based Systems for E-Healthcare
Security.” arXiv Preprint arXiv: 2004.01256.
Lancharoen, S., P. Suksawang, and T. Naenna. 2020. “Readiness Assessment of Information
Integration in a Hospital Using an Analytic Network Process Method for Decision-making in
a Healthcare Network.” International Journal of Engineering Business Management 12:
1847979019899318. doi:10.1177/1847979019899318.
Li, Y., H. Wang, L. Yingying, and L. Li. 2019. “Patient Assignment Scheduling in a Cloud Healthcare
System Based on Petri Net and Greedy-based Heuristic.” Enterprise Information Systems 13 (4):
515–533. doi:10.1080/17517575.2018.1526323.
Liang, X., M. Barua, C. Le, R. Lu, X. Shen, X. Li, and H. Y. Luo. 2012. “Enabling Pervasive Healthcare
through Continuous Remote Health Monitoring.” IEEE Wireless Communications 19 (6): 10–18.
doi:10.1109/MWC.2012.6393513.
Lo’ai, T., N. Alassaf, W. Bakheder, and A. Tawalbeh. 2015. “Resilience Mobile Cloud Computing:
Features, Applications and Challenges.” In Fifth International Conference on e-Learning (econf),
280–284. Manama, Bahrain: IEEE.
Loft, P., H. Ying, H. Janicke, and I. Wagner. 2021. “Dying of a Hundred Good Symptoms: Why Good
Security Can Still Fail-a Literature Review and Analysis.” Enterprise Information Systems 15 (4):
448–473. doi:10.1080/17517575.2019.1605000.
Mozilla. “Web Technology for Developers”.Last accessed 16 December 2020. https://developer.
mozilla.org/en-US/docs/DOM/window.navigator.battery
Ng, C. K., C. H. Wu, K. L. Yung, W. H. Ip, and T. Cheung. 2018. “A Semantic Similarity Analysis of
Internet of Things.” Enterprise Information Systems 12 (7): 820–855. doi:10.1080/
17517575.2018.1464666.
Ogbeyemi, A., W. Lin, F. Zhang, and W. Zhang. 2020. “Human Factors among Workers in a Small
Manufacturing Enterprise: A Case Study.”
Rahmadika, S., and K.-H. Rhee. 2018. “Blockchain Technology for Providing an Architecture Model of
Decentralized Personal Health Information.” International Journal of Engineering Business
Management 10: 1847979018790589. doi:10.1177/1847979018790589.
Solove, D. J. 2002. “Conceptualizing Privacy.” Calif. L. Rev 90 (4): 1087. doi:10.2307/3481326.
Sun, Z., B. Zhang, L. Cheng, and W. J. Zhang. 2011. “Application of the Redundant Servomotor
Approach to Design of Path Generator with Dynamic Performance Improvement.” Mechanism
and Machine Theory 46 (11): 1784–1795. doi:10.1016/j.mechmachtheory.2011.06.003.
Taleb, T., A. Ksentini, and B. Sericola. 2016. “On Service Resilience in Cloudnative 5G Mobile Systems.”
IEEE Journal on Selected Areas in Communications 34 (3): 483–496. doi:10.1109/
JSAC.2016.2525342.
Tsang, Y. P., C. H. Wu, W. H. Ip, and W.-L. Shiau. 2021. “Exploring the Intellectual Cores of the
blockchain–Internet of Things (Biot).” Journal of Enterprise Information Management ahead-of-
print (ahead–of–print). doi:10.1108/JEIM-10-2020-0395.
ENTERPRISE INFORMATION SYSTEMS 359
Wang, J., R. Dou, R. R. Muddada, and W. Zhang. 2018. “Management of a Holistic Supply Chain
Network for Proactive Resilience: Theory and Case Study.” Computers & Industrial Engineering 125:
668–677. doi:10.1016/j.cie.2017.12.021.
Wang, J., R. R. Muddada, H. Wang, J. Ding, Y. Lin, C. Liu, and W. Zhang. 2014. “Toward a Resilient
Holistic Supply Chain Network System: Concept, Review and Future Direction.” IEEE Systems
Journal 10 (2): 410–421. doi:10.1109/JSYST.2014.2363161.
Woods, D. D. 2015. “Four Concepts for Resilience and the Implications for the Future of Resilience
Engineering.” Reliability Engineering & System Safety 141: 5–9. doi:10.1016/j.ress.2015.03.018.
Xu, M. 2019. “A System Perspective to Privacy, Security and Resilience in Mobile Applications.”
Master’sthesis, University of Saskatchewan.
Zhang, W. 1994. “An Integrated Environment for CAD/CAM of Mechanical Systems.” PhD diss., Delft
University of Technology.
Zhang, W. J., and C. A. Van Luttervelt. 2011. “Toward a Resilient Manufacturing System.” CIRP Annals
60 (1): 469–472. doi:10.1016/j.cirp.2011.03.041.
Zhang, W. J., and J. W. Wang. 2016. “Design Theory and Methodology for Enterprise Systems.”
Enterprise Information Systems 10 (3): 245–248. doi:10.1080/17517575.2015.1080860.
Zhang, W. J., J. W. Wang, and Y. Lin. 2019. “Integrated Design and Operation Management for
Enterprise Systems.” Enterprise Information Systems 13 (4): 424–429. doi:10.1080/
17517575.2019.1597169.
Zhang, W.-J., and Y. Lin. 2010. “On the Principle of Design of Resilient Systems– Application to
Enterprise Information Systems.” Enterprise Information Systems 4 (2): 99–110. doi:10.1080/
17517571003763380.
Zhang, X., J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong. 2009. “Securing Elastic
Applications on Mobile Devices for Cloud Computing.” In Proceedings of the 2009 ACM workshop
on Cloud computing security, 127–134. New York, NY, USA: Association for Computing Machinery.
Zhou, J., Z. Cao, X. Dong, X. Lin, and A. V. Vasilakos. 2013. “Securing M-healthcare Social Networks:
Challenges, Countermeasures and Future Directions.” IEEE Wireless Communications 20 (4): 12–21.
doi:10.1109/MWC.2013.6590046.