Meet Inspiring Speakers and Experts at our 3000+ Global Conference Series Events with over 1000+ Conferences, 1000+ Symposiums
and 1000+ Workshops on Medical, Pharma, Engineering, Science, Technology and Business.

Explore and learn more about Conference Series : World's leading Event Organizer

Back

Mary Mehrnoosh Eshaghian-Wilner

Mary Mehrnoosh Eshaghian-Wilner

University of Southern California, USA

Title: Security in pervasive healthcare systems

Biography

Biography: Mary Mehrnoosh Eshaghian-Wilner

Abstract

Current healthcare and wellness monitoring devices make medical follow-up convenient. A Secure Body Unit (SBU) such as a wearable computing device allows for autonomous collection of a patient’s physiological data, such as glucose levels and blood pressure. This data can be sent to the patient’s smartphone and then to a physician for review. This process relies extensively on network connectivity, and yet current healthcare IT endeavors do not pay enough attention to protecting this highly-sensitive physiological data. Therefore, we propose a generic infrastructure that can be used by health technologies to enhance data security. A patient’s smartphone can use the industry-standard RSA protocol to safely exchange a secure key with the SBU. The health device can then use this key along with the AES algorithm to encrypt its data before transmitting it to the smartphone. The smartphone is then able to decrypt the health data with its copy of the secure key. This data is converted into a readable health report which is sent to the Physician Interface System (PIS), a generic web-based system maintained by a health provider that houses patient medical records. This transmission can occur over the ‘https’ protocol, which is widely deployed and considered secure. Overall, this architecture is a noninvasive method of physiological data protection and can be applied to any generic health technology infrastructure. It utilizes reliable protocols like https, RSA, and AES over more complex alternatives. As the proliferation of smart devices continues, this generally applicable method of data protection is an imperative.

Speaker Presentations

Speaker PPTs Click Here