Secure Patient Data Sharing in Mobile Ubiquitous Environments
Muntader MhsnhasanDepartment of Computers Techniques Engineering, College of Technical Engineering, Islamic University of Najaf, Najaf, Iraq; Department of Computers Techniques Engineering, College of Technical Engineering, Islamic University of Najaf of Al Diwaniyah, Al Diwaniyah, Iraq iu.tech.eng.iu.muntatheralmusawi@gmail.com0009-0009-1334-5183
Dr.K. Venkatesh GuruAssistant Professor, School of Computing, SRM Institute of Science and Technology, Trichy, India venkatek3@srmist.edu.in0000-0002-1679-9668
S. JeyachandranDepartment of Marine Engineering, AMET University, Kanathur, Tamil Nadu, India gpmek@ametuniv.ac.in0009-0007-8881-0911
Dr.A.V. PrabuAssociate Professor, Department of Electronics and Communication Engineering, Koneru Lakshmaiah Education Foundation, Green Fileds, Vaddeswaram, Andhra Pradesh, India prabu.deva@kluniversity.in0000-0002-0423-3405
Sandyarani VadlamudiAssistant Professor, Department of Artificial Intelligence and Machine Learning, New Horizon College of Engineering, Bangalore, India vs.sandya@gmail.com0009-0000-4467-4291
Dr. Nidhi MishraAssistant Professor, Department of CS & IT, Kalinga University, Raipur, India ku.nidhimishra@kalingauniversity.ac.in0009-0001-9755-7950
Keywords: Secure Data Sharing, Mobile Health, Ubiquitous Computing, Patient Privacy, Data Integrity, Role-Based Access, Healthcare IT Security.
Abstract
Mobile and ubiquitous computing have positively transformed healthcare by allowing constant access to a patient's data through various devices and platforms. While this has enhanced the quality and efficiency of healthcare services, concerns regarding the protection of sensitive information, such as data security and patient privacy, still pose serious challenges. With rapid and distributed systems, safeguarding sensitive health information regarding confidentiality, integrity, and access control remains challenging. This paper addresses the problem of secure patient data sharing in mobile ubiquitous environments by examining the risks of unauthorized access, data modification, and information exposure. It examines existing protective measures employed in healthcare institutions that utilize encryption and authentication mechanisms alongside role-based access control. Subsequently, this paper proposes a comprehensive security model for the healthcare sphere that uses sophisticated encryption and contextual access control. Selected case studies illustrate the impact of implemented solutions and their subsequent successes and failures on healthcare providers and patients. The paper also presents strategic recommendations from interdisciplinary sources to reinforce the security framework for mobile health applications. Along with analyzing the legal and ethical aspects, its purpose is to demonstrate the importance of safeguarding sensitive information and adhering to data privacy regulations. This research emphasizes the collaboration between the medical field, Information Technology specialists, and lawmakers to create effective strategies for managing patient confidentiality. Furthermore, the security of mobile health systems must be enhanced to maintain patient trust and advance the field of medicine.