The 8th IEEE International Workshop on Trusted Collaboration

Research Article

Security Analysis of Mobile Applications: A Case Study of a Collaboration Tool in Healthcare

Download149 downloads
  • @INPROCEEDINGS{10.4108/icst.collaboratecom.2013.254212,
        author={Julian Jang-Jaccard and Jane Li and Surya Nepal and Leila Alem},
        title={Security Analysis of Mobile Applications: A Case Study of a Collaboration Tool in Healthcare},
        proceedings={The 8th IEEE International Workshop on Trusted Collaboration},
        publisher={ICST},
        proceedings_a={TRUSTCOL},
        year={2013},
        month={11},
        keywords={mobile devices security analysis health applications collaboration},
        doi={10.4108/icst.collaboratecom.2013.254212}
    }
    
  • Julian Jang-Jaccard
    Jane Li
    Surya Nepal
    Leila Alem
    Year: 2013
    Security Analysis of Mobile Applications: A Case Study of a Collaboration Tool in Healthcare
    TRUSTCOL
    ICST
    DOI: 10.4108/icst.collaboratecom.2013.254212
Julian Jang-Jaccard1, Jane Li1, Surya Nepal1,*, Leila Alem1
  • 1: CSIRO Computational Informatics
*Contact email: surya.nepal@csiro.au

Abstract

Mobile-based collaboration tools are increasingly used for communication and information sharing in delivering healthcare services that need collaboration across different geographical locations. Some of the typical features found in the collaboration tools include video conferencing facility, images/documents exchange in real-time, and annotations to point and draw on shared rich media content. Though the innovations and conveniences of such collaboration tools are well understood, security implications of such systems are often overlooked. As a result, necessary security mechanisms are not supported by them. This can lead to serious security threats and privacy violations. In this paper, we first present a collaboration tool which was developed to facilitate the collaborations among health care providers using pervasive mobile devices for delivering health services to remote and regional areas. We provide a comprehensive security analysis of the tool. The aim of the analysis is to understand a variety of end-to-end security mechanisms needed in different layers of the system. We also provide security recommendations which can improve the overall security of the system.