Loading…
Patient’s data privacy and security in mHealth applications: a Charles proxy-based recommendation
Mobile Health (mHealth) applications play an essential role in healthcare. The usage of mHealth apps is rapidly increasing, and it provides services, such as vitals, medication, and appointments, to patients and physicians. These apps significantly ease for patients to manage their health. Using sen...
Saved in:
Published in: | Soft computing (Berlin, Germany) Germany), 2023-12, Vol.27 (23), p.18165-18180 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Mobile Health (mHealth) applications play an essential role in healthcare. The usage of mHealth apps is rapidly increasing, and it provides services, such as vitals, medication, and appointments, to patients and physicians. These apps significantly ease for patients to manage their health. Using sensitive health information and communication channels by mHealth apps has potential privacy and security hazards for patient’s privacy and security. mHealth apps are primarily dependent on a remote server online. Someone can monitor, alter, and divert communication through public infrastructure. Many mHealth applications did not utilize any encryption method for client–server communication, making it an imminent risk for patients' data security and privacy. In this study, we proposed a framework to develop the mHealth application and apply the security parameters to reduce the risk of data breaches, such as data confidentiality, integrity, and availability. Also, the study aims to identify the transport layer security issues relevant to the client–server of mHealth apps. To test the health data subset of Android and iOS apps collected from their Play Store and evaluate client security by the Charles Proxy tool. At the end of the paper, we presented the principal results of how many apps have vulnerabilities concerned with transport security. We compared our results for the transport layer of SSL and TLS certificates and chipper suit strength to show the performance of our proposed framework. |
---|---|
ISSN: | 1432-7643 1433-7479 |
DOI: | 10.1007/s00500-023-09265-8 |