HOME           //           ABOUT           //           COMMITTEE           //           REGISTRATION           //           AUTHORS           //           PROGRAM          //            HOTEL&TRAVEL
 
  • Tutorial 1: DevOps in Health-Clouds: Experiences from the perspectives of Developers, Administrators and Users in FI-STAR
Benjamin Ertl, Steinbuch Centre for Computing (SCC) at the Karlsruhe Institute of Technology (KIT), Germany
Anastasius Gavras, Eurescom GmbH, Germany
Stefan Covaci, Technische Universität Berlin, Germany
Room: R2 - William Dawes
        The "cloudification" in industrial and governmental areas including smart cities is challenged by many problems like high mobility, dynamic environments, ubiquitous high bandwidth networks, limits of qualification in public administration and security. All these challenges need to be addressed holistically in future "health-clouds". The integration of health care is a primary objective of local governments since the cost of health care is currently increasing faster than the GDP in most countries. In addition, societies globally are undergoing fundamental and unprecedented demographic changes, which amplify the health-care delivery and expenditure challenges.Europe has mobilized a significant part of its industry in a Public-Private-Partnership on Future Internet (FI-PPP), which is a European program for Internet-enabled innovation. The FI-PPP will accelerate the development and adoption of future Internet technologies in Europe, advance the European market for smart infrastructures, and increase the effectiveness and cost efficiency of business processes through innovative services and delivery mechanisms. This initiative aims among others to deliver technologies that respond to the current societal challenges.In this context the FI-STAR project establishes early trials of services and applications in the health care sector by building on top of future Internet technologies developed in the program. The project's ambition is to augment smart cities infrastructures by creating a sustainable ecosystem for all stakeholders in the global health care and adjacent markets based on FI-PPP specifications.FI-STAR is a unique opportunity to deliver standardized and certified software including a safe, secure and resilient application-delivery platform, taking advantage of all Cloud Computing and Big Data benefits and guaranteeing the protection of sensitive and personal data.The tutorial will demonstrate the experiences from different perspectives as administrators, developers and users of the FI-PPP technology for decentralized e-health services in smart cities and provide an insight on the effectiveness- and efficiency-gains achieved by the different stakeholders and across supply-chains centred on the e-health platform provider. A practical, hands-on example of the creation and deployment of a generic health-telemonitoring application using the FI-STAR Platform will be given.
  • Tutorial 2: The design and implementation of an Information Accountability Framework for eHealth systems
Daniel Grunwell and Tony Sahama, Science and Engineering Faculty, Queensland University of Technology Brisbane, Australia
Room: R2 - William Dawes
        This tutorial primarily focuses on the implementation of Information Accountability (IA) protocols defined in an Information Accountability Framework (IAF) in eHealth systems. Concerns over the security and privacy of patient information are one of the biggest hindrances to sharing health information and the wide adoption of eHealth systems. At present, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' (HCP) requirements. While consumers want control over their information, healthcare professionals want access to as much information as required in order to make well-informed decisions and provide quality care. This conflict is evident in the review of Australia's PCEHR system [1] and in recent studies of patient control of access to their eHealth information [2]. In order to balance these requirements, the use of an Information Accountability Framework devised for eHealth systems has been proposed. Through the use of IA protocols, so-called AccountableeHealth systems (AeH) create an eHealth environment where health information is available to the right person at the right time without rigid barriers whilst empowering the consumers with information control and transparency. In this half-day tutorial, we will discuss and describe the technical challenges surrounding the implementation of the IAF protocols into existing eHealth systems and demonstrate their use. The functionality of the protocols and AeH systems will be demonstrated, and an example of the implementation of the IAF protocols into an existing eHealth system will be presented and discussed.
  • Tutorial 3: Security and Privacy in e-Health
Xiaodong Lin, Faculty of Business and Information Technology, University of Ontario Institute of Technology
Xiaohui Liang, Assistant Professor with the Department of Computer Science at the University of Massachusetts, Boston
Hongwei Li, University of Electronic Science and Technology of China.
Room: R2 - William Dawes
        E-Health Systems are envisioned as a promising approach to improving health care and reducing healthcare costs through information and communications technologies, where security and privacy are crucial for its success and large scale deployment. In this tutorial, we will first introduce cyber security and privacy challenges in e-Health Systems. Then, we will discuss existing security and privacy enhancing technologies, particularly cryptographic techniques. Afterwards, we will focus on two important topics in e-Health Systems, namely medical data outsourcing and medical cyber physical systems.
        In e-Health systems, a large amount of medical data are collected and shared. Hence, an e-Health system must extend its scale to provide efficient and secure services. Media cloud computing, which treats computing as a utility, leases out the computing and storage capacities to the public patients and physicians. It is a revolutionary computing paradigm which enables dynamic resource allocation, self-demand services, measurement of service, transparency of resource, etc. As such, a patient can remotely store her data on the cloud server, namely data outsourcing, and then open her cloud data to the physicians. Note that the outsourced medical data may contain sensitive and private information (e.g., medical case and diagnostic report). It is often necessary to encrypt the medical data before they are uploaded to the cloud. However, the encrypted data cannot provide good usability due to the difficulty of searching over encrypted data. To address this issue, Searchable Symmetric Encryption (SSE) technology has been proposed in literature as a fundamental approach to enable keyword search over encrypted cloud data. The existing searchable encryption schemes can achieve fuzzy keyword search, ranked keyword search and multi-keyword search, etc. In this tutorial, we will present background and main features of SSE and also introduce a secure and efficient dynamic searchable symmetric encryption scheme.
        Medical Cyber Physical Systems (MCPS) are life-critical, context-aware, and networked systems of medical devices that provide tight integration of and coordination between the cyber world of computing and communications and the physical world. Recent advances in mobile and wearable healthcare, communication, and cloud computing technologies are making MCPS a promising platform for scientific advancement and development of new tools that may improve patients’ health and wellbeing. Coming along with the potential social economic and personal healthcare benefits are significant security, privacy, and trustworthiness challenges in MCPS, due to unreliable embedded software controlling medical devices, weak computing and networking capabilities of medical devices, and adaptive privacy requirements introduced by complicated physiological dynamics of patient bodies. In this tutorial, we will introduce the background, existing problems and security solutions of wearable devices and mobile medical devices.
        Finally, we will present our view of future directions in this research area.
  • Tutorial 4: Data Privacy in Cloud Based Healthcare Systems
Mehdi Bahrami, Cloud Lab, Electrical Engineering and Computer Science, University of California Merced
Arshia Khan, Department of Computer Science, University of Minnesota Duluth
Room: R5 - Molly Pitcher
        This tutorial reviews major data encryption methods as one of the solution to protect, and to maintain data privacy in the cloud computing systems. The Tutorial highlights light-weight data encryption methods that allow mobile healthcare devices to store data on clouds with minimal computation overheads. The light-weight methods can e used on mobile devices to store data in the cloud (s) without using cloud computing resources for encryption. Finally, the tutorial highlights audiences' experiences through a discussion session.


 
PROGRAM AT A GLANCE >>

TECHNICAL
PROGRAM >>


KEYNOTE SPEAKERS >>

WORKSHOPS >>

TUTORIALS >>

PANELS >>
 
HOME           //           ABOUT           //           COMMITTEE           //           REGISTRATION           //           AUTHORS           //           PROGRAM          //            HOTEL&TRAVEL                                                                        ©2015 IEEE COMMUNICATIONS SOCIETY