Skip to main content
Top
Published in: Journal of Medical Systems 6/2016

01-06-2016 | Mobile Systems

Security Recommendations for mHealth Apps: Elaboration of a Developer’s Guide

Authors: Enrique Pérez Morera, Isabel de la Torre Díez, Begoña Garcia-Zapirain, Miguel López-Coronado, Jon Arambarri

Published in: Journal of Medical Systems | Issue 6/2016

Login to get access

Abstract

Being the third fastest-growing app category behind games and utilities, mHealth apps are changing the healthcare model, as medicine today involves the data they compile and analyse, information known as Big Data. However, the majority of apps are lacking in security when gathering and dealing with the information, which becomes a serious problem. This article presents a guide regarding security solution, intended to be of great use for developers of mHealth apps. In August 2015 current mobile health apps were sought out in virtual stores such as Android Google Play, Apple iTunes App Store etc., in order to classify them in terms of usefulness. After this search, the most widespread weaknesses in the field of security in the development of these mobile apps were examined, based on sources such as the “OWASP Mobile Security Project, the initiative recently launched by the Office of Civil Rights (OCR), and other articles of scientific interest. An informative, elemental guide has been created for the development of mHealth apps. It includes information about elements of security and its implementation on different levels for all types of mobile health apps based on the data that each app manipulates, the associated calculated risk as a result of the likelihood of occurrence and the threat level resulting from its vulnerabilities - high level (apps for monitoring, diagnosis, treatment and care) from 6 ≤ 9, medium level (calculator, localizer and alarm) from 3 ≤ 6 and low level (informative and educational apps) from 0 ≤ 3. The guide aims to guarantee and facilitate security measures in the development of mobile health applications by programmers unconnected to the ITC and professional health areas.
Literature
25.
go back to reference Calvo-González, D., De la Torre-Díez, I., and López-Coronado, M., Análisis y evolución de aplicaciones móviles en el campo de la salud. I+S Informatica Salud: Sociedad Española Informática Salud 108:63–70, 2014. Calvo-González, D., De la Torre-Díez, I., and López-Coronado, M., Análisis y evolución de aplicaciones móviles en el campo de la salud. I+S Informatica Salud: Sociedad Española Informática Salud 108:63–70, 2014.
30.
go back to reference Martinez-Pérez, B., de la Torre-Díez, I., and Lopez-Coronado, M., Privacy and security in mobile health apps: a review and recommendations. J. Med. Syst. 39:181, 2015.CrossRefPubMed Martinez-Pérez, B., de la Torre-Díez, I., and Lopez-Coronado, M., Privacy and security in mobile health apps: a review and recommendations. J. Med. Syst. 39:181, 2015.CrossRefPubMed
32.
33.
go back to reference Chiou, S. Y., Ying, Z., and Liu, J., Improvement of a privacy authentication scheme based on cloud for medical environment. J. Med. Syst. 40(4):101, 2016.CrossRefPubMed Chiou, S. Y., Ying, Z., and Liu, J., Improvement of a privacy authentication scheme based on cloud for medical environment. J. Med. Syst. 40(4):101, 2016.CrossRefPubMed
34.
go back to reference Chen, Y. L., Liau, R. H., and Chang, L. Y., Applications of multi-channel safety authentication protocols in wireless networks. J. Med. Syst. 40(1):26, 2016.CrossRefPubMed Chen, Y. L., Liau, R. H., and Chang, L. Y., Applications of multi-channel safety authentication protocols in wireless networks. J. Med. Syst. 40(1):26, 2016.CrossRefPubMed
35.
go back to reference Guo, P., Wang, J., Ji, S., Geng, S. H., and Xiong, N. N., A lightweight encryption scheme combined with trust management for privacy-preserving in body sensor networks. J. Med. Syst. 39(12):190, 2015.CrossRefPubMed Guo, P., Wang, J., Ji, S., Geng, S. H., and Xiong, N. N., A lightweight encryption scheme combined with trust management for privacy-preserving in body sensor networks. J. Med. Syst. 39(12):190, 2015.CrossRefPubMed
36.
go back to reference Cho, H., Lim, J., Kim, H., and Yi, J. H., Anti-debugging scheme for protecting mobile apps on android platform. J. Med. Syst. 72(1):232–246, 2016. Cho, H., Lim, J., Kim, H., and Yi, J. H., Anti-debugging scheme for protecting mobile apps on android platform. J. Med. Syst. 72(1):232–246, 2016.
42.
go back to reference Office of the Privacy Commissioner of Canada. Results of the 2014 Global Privacy Enforcement Network Sweep. Available from: https://www.priv.gc.ca/media/nr-c/2014/bg_140910_e.asp (last accessed 14 Mar 2016), 2014. Office of the Privacy Commissioner of Canada. Results of the 2014 Global Privacy Enforcement Network Sweep. Available from: https://​www.​priv.​gc.​ca/​media/​nr-c/​2014/​bg_​140910_​e.​asp (last accessed 14 Mar 2016), 2014.
43.
go back to reference Mobile Connect. Mobile Connect. Available from: https://mobileconnect.io (last accessed 18 Mar 2016), 2016. Mobile Connect. Mobile Connect. Available from: https://​mobileconnect.​io (last accessed 18 Mar 2016), 2016.
Metadata
Title
Security Recommendations for mHealth Apps: Elaboration of a Developer’s Guide
Authors
Enrique Pérez Morera
Isabel de la Torre Díez
Begoña Garcia-Zapirain
Miguel López-Coronado
Jon Arambarri
Publication date
01-06-2016
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 6/2016
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-016-0513-6

Other articles of this Issue 6/2016

Journal of Medical Systems 6/2016 Go to the issue