engineering privacy for mobile health data collection ...1266242/...mobile health (mhealth) systems...

77
Engineering Privacy for Mobile Health Data Collection Systems in the Primary Care Leonardo HORN Iwaya

Upload: others

Post on 23-Jan-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systems in the Primary CareMobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning of Community- Based Primary Health Care (CBPHC). In particular, Mobile Health Data Collection Systems (MDCSs) are used by CHWs to collect health-related data about the families that they treat, replacing paper-based approaches. Although MDCSs improve the efficiency of CBPHC, existing solutions lack adequate privacy and security safeguards.

To bridge this knowledge gap between the research areas of mHealth and privacy, we start by asking: How to design secure and privacy-pre- serving systems for Mobile Health Data Collection Systems? To answer this question, an engineering approach is chosen to analyse and design privacy and security mechanisms for MDCSs.

Among the main contributions, a comprehensive literature review of the Brazilian mHealth ecosystem is presented. On the privacy engineering side, the contributions are a Privacy Impact Assessment (PIA) for the GeoHealth MDCS and three mechanisms: SecourHealth, a security framework for data encryption and user authentication; an Ontology- based Data Sharing System (O-DSS) that provides obfuscation and anonymisation functions; and, an electronic consent (e-Consent) tool for obtaining and handling informed consent.

Engineering Privacy for Mobile Health Data Collection System

s in the Primary Care

Leonardo horn Iwaya

Engineering Privacy for Mobile Health Data Collection Systems in the Primary Care

Leonardo HORN Iwaya

Print & layout University Printing Office, Karlstad 2018

Doctoral Thesis Karlstad University Studies, 2019:1ISBN 978-91-7063-900-5 (Print)ISBN 978-91-7063-995-1 (pdf)ISSN 1403-8099

Page 2: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systems in the Primary Care

Leonardo Horn Iwaya

Leonardo Horn Iw

aya | Engineering Privacy for M

obile Health D

ata Collection System

s in the Primary C

are | 2019:1

Engineering Privacy for Mobile Health Data Collection Systems in the Primary Care

Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning of Community-Based Primary Health Care (CBPHC). In particular, Mobile Health Data Collection Systems (MDCSs) are used by CHWs to collect health-related data about the families that they treat, replacing paper-based approaches. Although MDCSs improve the efficiency of CBPHC, existing solutions lack adequate privacy and security safeguards.

To bridge this knowledge gap between the research areas of mHealth and privacy, we start by asking: How to design secure and privacy-preserving systems for Mobile Health Data Collection Systems? To answer this question, an engineering approach is chosen to analyse and design privacy and security mechanisms for MDCSs.

Among the main contributions, a comprehensive literature review of the Brazilian mHealth ecosystem is presented. On the privacy engineering side, the contributions are a Privacy Impact Assessment (PIA) for the GeoHealth MDCS and three mechanisms: SecourHealth, a security framework for data encryption and user authentication; an Ontology-based Data Sharing System (O-DSS) that provides obfuscation and anonymisation functions; and, an electronic consent (e-Consent) tool for obtaining and handling informed consent.

DOCTORAL THESIS | Karlstad University Studies | 2019:1

Faculty of Health, Science and Technology

Computer Science

DOCTORAL THESIS | Karlstad University Studies | 2019:1

ISSN 1403-8099

ISBN 978-91-7063-995-1 (pdf)

ISBN 978-91-7063-900-5 (Print)

Page 3: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

DOCTORAL THESIS | Karlstad University Studies | 2019:1

Engineering Privacy for Mobile

Health Data Collection

Systems in the Primary Care

Leonardo Horn Iwaya

Page 4: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Print: Universitetstryckeriet, Karlstad 2018

Distribution:Karlstad University Faculty of Health, Science and TechnologyDepartment of Mathematics and Computer ScienceSE-651 88 Karlstad, Sweden+46 54 700 10 00

© The author

ISSN 1403-8099

urn:nbn:se:kau:diva-70216

Karlstad University Studies | 2019:1

DOCTORAL THESIS

Leonardo Horn Iwaya

Engineering Privacy for Mobile Health Data Collection Systems in the Primary Care

WWW.KAU.SE

ISBN 978-91-7063-995-1 (pdf)

ISBN 978-91-7063-900-5 (Print)

Page 5: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

iii

Engineering Privacy for Mobile HealthData Collection Systems in the Primary CareLeonardo Horn Iwaya

Department of Mathematics and Computer Science

AbstractMobile health (mHealth) systems empower Community Health Workers(CHWs) around the world, by supporting the provisioning of Community-Based Primary Health Care (CBPHC) – primary care outside the health facil-ity into people’s homes. In particular, Mobile Health Data Collection Systems(MDCSs) are used by CHWs to collect health-related data about the familiesthat they treat, replacing paper-based approaches for health surveys. AlthoughMDCSs significantly improve the overall efficiency of CBPHC, existing andproposed solutions lack adequate privacy and security safeguards. In order tobridge this knowledge gap between the research areas of mHealth and privacy,the main research question of this thesis is: How to design secure and privacy-preserving systems for Mobile Health Data Collection Systems? To answer thisquestion, the Design Method is chosen as an engineering approach to analyseand design privacy and security mechanisms for MDCSs. Among the maincontributions, a comprehensive literature review of the Brazilian mHealthecosystem is presented. This review led us to focus on MDCSs due to theirimpact on Brazil’s CBPHC, the Family Health Strategy programme. On theprivacy engineering side, the contributions are a Privacy Impact Assessment(PIA) for the GeoHealth MDCS and three mechanisms: (a) SecourHealth,a security framework for data encryption and user authentication; (b) anOntology-based Data Sharing System (O-DSS) that provides obfuscation andanonymisation functions; and, (c) an electronic consent (e-Consent) tool forobtaining and handling informed consent. Additionally, practical experienceis shared about designing a MDCS, GeoHealth, and deploying it in a large-scale experimental study. In conclusion, the contributions of this thesis offerguidance to mHealth practitioners, encouraging them to adopt the principlesof privacy by design and by default in their projects.

Keywords: Privacy, data protection, information security, mobile health,community-based primary health care, privacy impact assessment, consentmanagement, anonymisation.

Page 6: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning
Page 7: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

v

AcknowledgementsI take this opportunity to express my gratitude and appreciation to the amaz-ing people that helped throughout my doctoral studies. Without your helpthis would never have been possible.

First and foremost, I would like to thanks my wonderful family for all theencouragement. Despite the geographical distance your love has always beendeeply felt, making life so much easier and enjoyable. To my cherished parentsand grandparents, thank you for supporting me in all my endeavors and thankyou for being the best teachers that one could ever have – education is indeedfreedom. To my beloved wife, Corinne, thank you for lifting my spirits andsplashing colour in my life. I sincerely cannot thank you enough.

I am also grateful to my inspiring supervisors Simone Fischer-Hübner,Leonardo Martucci, and Rose-Mharie Åhlfeldt. Thank you so much for yourattention and dedication during my entire PhD education at Karlstad Univer-sity. You have helped me polish my skills and comprehend science at its highestlevel. Also, thank you for your understanding and genuine camaraderie. Yourinfluence is not only positive to my scientific career but also to my personaldevelopment as an individual.

I would also like show my gratitude to collaborators in foreign institutions.Especially, thank you to professors Tereza Cristina Carvalho and Marcos Sim-plício at University of São Paulo and former co-workers at the Laboratory ofComputer Networks and Architecture. Also thanks to academics at Univer-sity of Trento, particularly Ronald Chenu-Abente, Alethia Hume and FaustoGiunchiglia. And thank you to Jane Li from the Australian eHealth ResearchCentre (CSIRO). Having worked with so many brilliant researchers has trulyenriched my academic experience.

Many thanks as well to all my friends, near and far, that always managed tokeep in touch. Thanks to my fellow students and colleagues at Datavetenskapthat create such an incredible working environment. In particular to my col-leagues in the Privacy and Security research group, for sharing so many em-pathetic conversations about the PhD life. An enthusiastic thanks to the boardgames crew for the all the fun, food and laughter. Thanks to the rock climbing,innebandy and shorinji kempo teams for rescuing me from a desk-bound life.And I am also grateful for my Brazilian friends in my hometown that havealways maintained contact and received me back with open arms as time wenton.

This research was, besides Karlstad University, partly funded by:

• the Seventh Framework Programme for Research of the European Com-munity in the project SmartSociety (under grant no. 600854);

• the Swedish Knowledge Foundation in the project High Quality Net-worked Services in a Mobile World (HITS);

• the Nordic Digital Health Center (NDHC) – a cooperative projectbetween the county of Värmland, the municipality of Karlstad, KarlstadUniversity and Stiftelsen Compare Karlstad;

Page 8: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

vi

• and, the DigitalWell Research – a partnership between Region Värmlandand Karlstad University (Dnr RV2017-545).

Karlstad (Sweden), November 2018 Leonardo Horn Iwaya

Page 9: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

vii

List of Appended PapersI. L.H. Iwaya, M.A.L. Gomes, M.A. Simplício, T.C.M.B. Carvalho,

C.K. Dominicini, R.R.M. Sakuragui, M.S. Rebelo, M.A. Gutierrez, M.Näslund and P. Håkansson. Mobile Health in Emerging Countries: ASurvey of Research Initiatives in Brazil. International Journal of MedicalInformatics, Volume 82, Issue 5, May 2013, pp. 283-298, ISSN 1386-5056.

II. M.A. Simplício, L.H. Iwaya, B.M. Barros, T.C.M.B. Carvalho and M.Näslund. SecourHealth: A Delay-Tolerant Security Framework for Mo-bile Health Data Collection. IEEE Journal of Biomedical and HealthInformatics, vol. 19, no. 2, pp. 761-772, March 2015.

III. J.H.G. Sá, M.S. Rebelo, A. Brentani, S. Grisi, L.H. Iwaya, M.A. Simplí-cio Jr., T.C.M.B. Carvalho and M.A. Gutierrez. Georeferenced and Se-cure Mobile Health System for Large Scale Data Collection in PrimaryCare. International Journal of Medical Informatics, Volume 94, pp. 91-99, 2016.

IV. L. H. Iwaya, S. Fischer-Hübner, R. M. Åhlfeldt and L. A. Martucci.mHealth: A Privacy Threat Analysis for Public Health SurveillanceSystems . 2018 IEEE 31st International Symposium on Computer-BasedMedical Systems (CBMS), Karlstad, 2018, pp. 42-47.

V. L. H. Iwaya, S. Fischer-Hübner, R. M. Åhlfeldt and L. A. Martucci. Mo-bile Health Systems for Community-Based Primary Care: IdentifyingControls and Mitigating Privacy Threats. Under submission.

VI. L.H. Iwaya, F. Giunchiglia, L.A. Martucci, A. Hume, S. Fischer-Hübner and R. Chenu-Abente. Ontology-based Obfuscation and An-onymisation for Privacy: A Case Study on Healthcare. Privacy andIdentity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5,9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh,UK, August 16-21, 2015, pp. 343–358, Revised Selected Papers.

VII. L. H. Iwaya, J. Li, S. Fischer-Hübner, R. M. Åhlfeldt and L. A. Martucci.E-Consent for Data Privacy: Consent Management for Mobile HealthTechnologies in Public Health Surveys and Disease Surveillance. Undersubmission.

Comments on my ParticipationPaper I I am the main author and the proposer of the publication. I parti-cipated in the entire writing process but specially Sections “Mobile health inBrazil” and “Analysis and Discussion”.

Paper II I participated in the entire writing process but specially in Section“Implementation”, i.e., SecourHealth’s implementation and testing.

Page 10: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

viii

Paper III I participated in the entire writing process but specially in Sub-section “GeoHealth’s security features”.

Paper IV I am the main author and the proposer of the publication. I parti-cipated in the entire writing process and I am also the researcher who led theprivacy impact assessment.

Paper V I am the main author and the proposer of the publication. I parti-cipated in the entire writing process and I am also the researcher who led theprivacy impact assessment.

Paper VI I participated in the entire writing process but specially in Sections“Background and related work” and “Obfuscation and anonymisation for HIS”. Iam also the main author of the publication.

Paper VII I am the main author and the proposer of the publication. Iparticipated in the entire writing process and I am also the researcher who ledthe design of the consent management system.

Other publications• B.M. Barros, L.H. Iwaya, M.A. Simplício Jr., T.C. M. B. Carvalho,

A. Méhes and M. Näslund. Classifying security threats in cloud net-working. In Proceedings of the 5th International Conference on CloudComputing and Services Science, pages 214–220, 2015.

• M.A. Simplício, T.C.M.B. Carvalho, C.K. Dominicini, P. Håkansson,L.H. Iwaya and M. Näslund. Method and apparatus for securing a con-nection in a communications network. Patent US 2015/0281958, Octo-ber 2015.

• M. Näslund, T.C.M.B. Carvalho, L.H. Iwaya and M.A. Simplício. En-crypting and storing data, Patent US 2016/0156464, June 2016.

• L.H. Iwaya, A. Voronkov, L.A. Martucci, S. Lindskog and S. Fischer-Hübner. Firewall Usability and Visualization: A Systematic LiteratureReview, Karlstad University Studies, ISBN 978-91-7063-718-6, 2016.

• L.H. Iwaya, L.A. Martucci and S. Fischer-Hübner. Towards a PrivacyImpact Assessment Template for Mobile Health Data Collection Sys-tems, In Proceedings of the 5th International Conference on M4DMobile Communication Technology for Development, pages 189–200,2016.

• L.H. Iwaya. Secure and Privacy-aware Data Collection and Processingin Mobile Health Systems, Licentiate thesis, Karlstads universitet, 2016.

Page 11: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

ix

• A. Voronkov, L.H. Iwaya, L.A. Martucci and S. Lindskog. SystematicLiterature Review on Usability of Firewall Configuration, ACM Com-puting Surveys (CSUR), pages 87:1–87:35, 2017.

• S. Fischer-Hübner, L.A. Martucci, L. Fritsch, T. Pulls, S. Herold, L.H. Iwaya, S. Alfredsson and A. Zuccato. A MOOC on Privacy byDesign and the GDPR. In Proceedings of the 11th World Conferenceon Information Security Education (WISE), 2018.

Page 12: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning
Page 13: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

xi

ContentsList of Appended Papers vii

Introductory Summary 1

1 Introduction 3

2 Background 42.1 Primary Health Care . . . . . . . . . . . . . . . . . . . . . . 5

2.1.1 Community-Based Primary Health Care . . . . . . . 52.1.2 Brazil’s Family Health Strategy . . . . . . . . . . . . 6

2.2 Mobile Health . . . . . . . . . . . . . . . . . . . . . . . . . 92.2.1 Mobile Health Data Collection Systems . . . . . . . . 112.2.2 eSUS and MDCSs in Brazil . . . . . . . . . . . . . . 12

2.3 Privacy, Security and mHealth . . . . . . . . . . . . . . . . . 142.3.1 Privacy Law for Mobile Health . . . . . . . . . . . . 162.3.2 Legal Frameworks EU GDPR and BR LGPD . . . . 17

2.4 Privacy Engineering . . . . . . . . . . . . . . . . . . . . . . 192.4.1 Privacy by Design . . . . . . . . . . . . . . . . . . . 192.4.2 Privacy Impact Assessments . . . . . . . . . . . . . . 202.4.3 Privacy-Enhancing Technologies . . . . . . . . . . . . 232.4.4 Security and Privacy-Enhancing Mechanisms for MDCSs 25

3 Research Question 29

4 Research Method 30

5 Contributions 325.1 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

6 Related Work 346.1 Mobile Health for LMICs . . . . . . . . . . . . . . . . . . . 346.2 Security for MDCSs . . . . . . . . . . . . . . . . . . . . . . 356.3 Design and Deployment of MDCSs . . . . . . . . . . . . . . 356.4 Privacy Impact Assessment for MDCSs . . . . . . . . . . . . 366.5 Obfuscation and Anonymisation of Health Data . . . . . . . 376.6 Consent Management Systems . . . . . . . . . . . . . . . . . 37

7 Summary of Appended Papers 38

8 Conclusions and Future Work 41

Paper IMobile Health in Emerging Countries: A Survey of Re-search Initiatives in Brazil 55

Page 14: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

xii

1 Introduction 601.1 Related work . . . . . . . . . . . . . . . . . . . . . . . . . . 611.2 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . 62

2 An overview of health care in Brazil 62

3 Key research areas in mHealth 63

4 Mobile health in Brazil 654.1 Health surveys & surveillance . . . . . . . . . . . . . . . . . 664.2 Patient records . . . . . . . . . . . . . . . . . . . . . . . . . 694.3 Patient monitoring . . . . . . . . . . . . . . . . . . . . . . . 714.4 Decision support systems . . . . . . . . . . . . . . . . . . . . 744.5 Treatment compliance . . . . . . . . . . . . . . . . . . . . . 754.6 Awareness raising . . . . . . . . . . . . . . . . . . . . . . . . 764.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

5 Analysis and discussion 76

6 Conclusions 82

Paper IISecourHealth: A Delay-Tolerant Security Framework forMobile Health Data Collection 94

1 Introduction 97

2 Scenario assumptions and requirements 992.1 Tolerance to delays and lack of connectivity . . . . . . . . . . 1002.2 Protection against device theft or loss . . . . . . . . . . . . . 1002.3 Secure data exchange between mobile device and server . . . . 1012.4 Lightweight and low cost solution . . . . . . . . . . . . . . . 1012.5 Device sharing . . . . . . . . . . . . . . . . . . . . . . . . . 1012.6 Usability . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

3 The SecourHealth framework 1023.1 Preliminaries and notation . . . . . . . . . . . . . . . . . . . 1023.2 User registration . . . . . . . . . . . . . . . . . . . . . . . . 1033.3 Offline user authentication . . . . . . . . . . . . . . . . . . . 1043.4 Secure Data Storage . . . . . . . . . . . . . . . . . . . . . . . 106

3.4.1 No forward secrecy (Knofs ) . . . . . . . . . . . . . . . 1063.4.2 Weak forward secrecy (Kwfs ) . . . . . . . . . . . . . . 1063.4.3 Strong forward secrecy (Ksfs ) . . . . . . . . . . . . . 1073.4.4 Key generation and usage – summary . . . . . . . . . 108

3.5 Data exchange with server . . . . . . . . . . . . . . . . . . . 110

Page 15: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

xiii

4 Analysis 1114.1 Tolerance to delays and lack of connectivity . . . . . . . . . . 1124.2 Protection against device theft or loss . . . . . . . . . . . . . 1124.3 Secure data exchange between mobile device and server . . . . 1134.4 Lightweight and low cost solution . . . . . . . . . . . . . . . 1134.5 Device sharing . . . . . . . . . . . . . . . . . . . . . . . . . 1134.6 Usability . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

5 Implementation 1135.1 Platform characteristics . . . . . . . . . . . . . . . . . . . . . 1155.2 Cryptographic algorithms adopted . . . . . . . . . . . . . . . 1155.3 Pilot application . . . . . . . . . . . . . . . . . . . . . . . . 1155.4 Benchmark results . . . . . . . . . . . . . . . . . . . . . . . 115

6 Related work 117

7 Conclusion 1197.1 Future work . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

Paper IIIGeoreferenced and Secure Mobile Health System forLarge Scale Data Collection in Primary Care 124

1 Introduction 128

2 Related projects in Brazil and worldwide 130

3 Scenario description and requirements 1313.1 Data gathering in the family health strategy . . . . . . . . . . 1313.2 Potential improvements to the data gathering process . . . . . 132

4 GeoHealth 1334.1 GeoHealth-mobile . . . . . . . . . . . . . . . . . . . . . . . 1354.2 GeoHealth-web . . . . . . . . . . . . . . . . . . . . . . . . . 1364.3 Security features . . . . . . . . . . . . . . . . . . . . . . . . 137

5 Status and discussion 1385.1 System deployment . . . . . . . . . . . . . . . . . . . . . . . 1385.2 Continuous training . . . . . . . . . . . . . . . . . . . . . . 1395.3 Improved efficiency and data quality . . . . . . . . . . . . . . 1405.4 Use of collected data . . . . . . . . . . . . . . . . . . . . . . 1415.5 Cost of the solution . . . . . . . . . . . . . . . . . . . . . . . 1415.6 Comparison to other systems . . . . . . . . . . . . . . . . . 142

6 Conclusions 143

Page 16: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

xiv

Paper IVmHealth: A Privacy Threat Analysis for Public HealthSurveillance Systems 148

1 Introduction 151

2 Related work 152

3 Methodology 153

4 System characterisation - GeoHealth for public health surveillance154

5 Privacy Threat Analysis 1555.1 Privacy Targets . . . . . . . . . . . . . . . . . . . . . . . . . 1555.2 Identification of Privacy Threats . . . . . . . . . . . . . . . . 155

5.2.1 Threats to data quality . . . . . . . . . . . . . . . . . 1555.2.2 Threats to processing legitimacy & informed consent 1575.2.3 Threats to data subject’s information right . . . . . . 1575.2.4 Threats to data subject’s right to access . . . . . . . . 1585.2.5 Threats to data subject’s right to object . . . . . . . . 1585.2.6 Threats to data security . . . . . . . . . . . . . . . . 1595.2.7 Threats to accountability . . . . . . . . . . . . . . . . 159

6 Results and discussion 160

7 Conclusion 162

Paper VMobile Health Systems for Community-Based PrimaryCare: Identifying Controls and Mitigating PrivacyThreats 165

1 Introduction 168

2 Prior Work & Background 1692.1 MDCSs Worldwide and in Brazil . . . . . . . . . . . . . . . . 1702.2 PIA Frameworks . . . . . . . . . . . . . . . . . . . . . . . . 1702.3 Security & Privacy of MDCSs . . . . . . . . . . . . . . . . . 171

3 Methods 171

4 Results 1724.1 Characterisation of the System . . . . . . . . . . . . . . . . . 1734.2 Definition of Privacy Targets . . . . . . . . . . . . . . . . . . 1734.3 Evaluation of Degree of Protection Demand for each Privacy

Target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1744.4 Identification of Threats for each Privacy Target . . . . . . . 175

Page 17: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

xv

4.5 Identification and Recommendation of Controls to ProtectAgainst Threats . . . . . . . . . . . . . . . . . . . . . . . . . 177

5 Discussion 1775.1 Transparency and Intervenability . . . . . . . . . . . . . . . 1785.2 Informed Consent . . . . . . . . . . . . . . . . . . . . . . . 1805.3 Data Objection and Deletion . . . . . . . . . . . . . . . . . . 1805.4 Security Mechanisms . . . . . . . . . . . . . . . . . . . . . . 1815.5 Anonymisation . . . . . . . . . . . . . . . . . . . . . . . . . 181

6 Limitations 182

7 Conclusion 183

Appendices 187

A Characterisation of the system 187A.1 System View . . . . . . . . . . . . . . . . . . . . . . . . . . 188

A.1.1 GeoHealth-Mobile . . . . . . . . . . . . . . . . . . . 188A.1.2 GeoHealth-Web . . . . . . . . . . . . . . . . . . . . 188

A.2 Functional View . . . . . . . . . . . . . . . . . . . . . . . . 188A.2.1 Overall Goals and Business Process . . . . . . . . . . 188A.2.2 GeoHealth’s Detailed Use Case . . . . . . . . . . . . 189

A.3 Data View . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192A.4 Physical Environment View . . . . . . . . . . . . . . . . . . 192

B Evaluation of degree of protection demand 193B.1 P1 - Quality of Data Processing . . . . . . . . . . . . . . . . 194B.2 P2 - Processing Lawfulness and Informed Consent . . . . . . 197B.3 P3 - Information right of data subject (ex ante Transparency) . 198B.4 P4 - Access right of data subject (ex post Transparency) . . . . 199B.5 P5 - Intervenability . . . . . . . . . . . . . . . . . . . . . . . 200B.6 P6 - Data subject’s right to object . . . . . . . . . . . . . . . 201B.7 P7 - Security of data . . . . . . . . . . . . . . . . . . . . . . . 203B.8 P8 - Accountability . . . . . . . . . . . . . . . . . . . . . . . 204

C Identification of privacy threats 204C.1 Threats to data quality . . . . . . . . . . . . . . . . . . . . . 206C.2 Threats to processing legitimacy & informed consent . . . . . 208C.3 Threats to data subject’s information right . . . . . . . . . . 208C.4 Threats to data subject’s right to access . . . . . . . . . . . . 209C.5 Threats to intervenability . . . . . . . . . . . . . . . . . . . 209C.6 Threats to data subject’s right to object . . . . . . . . . . . . 209C.7 Threats to data security . . . . . . . . . . . . . . . . . . . . . 210C.8 Threats to accountability . . . . . . . . . . . . . . . . . . . . 211

C.8.1 Threats to notification/reporting duties . . . . . . . . 211

Page 18: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

xvi

D Technical and non-technical controls 212D.1 Control descriptions . . . . . . . . . . . . . . . . . . . . . . 212

Paper VIOntology-based Obfuscation and Anonymisation for Pri-vacy: A Case Study on Healthcare 218

1 Introduction 222

2 Data protection regulations and legislation 223

3 Background and related work 2243.1 EHR’s data elements . . . . . . . . . . . . . . . . . . . . . . 2243.2 Conventional anonymisation methods . . . . . . . . . . . . . 2253.3 Ontology-based approaches . . . . . . . . . . . . . . . . . . 226

3.3.1 Access control and context obfuscation . . . . . . . . 2263.3.2 Ontology-Based Anonymisation . . . . . . . . . . . . 227

3.4 Ontology-based Identity Management and Access Control . . 2283.5 Putting things together . . . . . . . . . . . . . . . . . . . . . 228

4 Obfuscation and anonymisation for HIS 2284.1 Ontology-based Data Sharing Service . . . . . . . . . . . . . 229

4.1.1 UC1: Privacy-preserving patient treatment . . . . . . 2304.1.2 UC2: Patient’s granular control of E/PHR . . . . . . 2304.1.3 UC3: Reminder or alert systems . . . . . . . . . . . . 2304.1.4 UC4: Medical research repository . . . . . . . . . . . 2304.1.5 UC5: Nationwide HIS network . . . . . . . . . . . . 230

4.2 SO and DA functions . . . . . . . . . . . . . . . . . . . . . . 2314.2.1 Primary use and semantic obfuscation. . . . . . . . . 2324.2.2 Secondary use and data anonymisation. . . . . . . . . 233

5 Future work 234

6 Conclusions 235

Paper VIIE-Consent for Data Privacy: Consent Management forMobile Health Technologies in Public Health Surveys andDisease Surveillance 238

1 Introduction 241

2 Related work 243

3 Methods 243

Page 19: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

xvii

4 Results 2444.1 Legal and technical requirements . . . . . . . . . . . . . . . . 2444.2 Design considerations . . . . . . . . . . . . . . . . . . . . . . 2454.3 Consent interface . . . . . . . . . . . . . . . . . . . . . . . . 2474.4 Generating Consent Receipts . . . . . . . . . . . . . . . . . . 2484.5 Usability evaluation . . . . . . . . . . . . . . . . . . . . . . . 248

5 Discussions 250

6 Conclusions 251

Page 20: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning
Page 21: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Introductory Summary

“Feliz é aquele que pode recordar com saudade opassado, mas infeliz, com certeza, é quem tem

medo de lembrá-lo.”–

“Happy is the one who can longingly recall thepast, but unhappy, surely, is the one who is

afraid to remember it.”

— A Saga de um Imigrante Japonês. (1985)S. Shumin

1

Page 22: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning
Page 23: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 3

1 IntroductionMobile phones are seemingly ubiquitous in today’s society. Virtually everyonehas a mobile phone, no matter if they live in high-income countries or in low-and middle- income countries (LMICs). As a matter of fact, it has been repor-ted that mobile phones are already more accessible than basic sanitation [77].Throughout the developing world they are used more than any other kind ofmodern technology [58]. Not surprisingly, many industries, governments andresearchers are creating new business models based on the power of mobileemerging markets, a phenomena referred as Mobile for Development (M4D)[47]. Examples are mobile-based systems for financial services, agriculture,digital identity, and health care.

Mobile health (or mHealth) technologies – the use of mobile devices tosupport the delivery of health care – leverage from this ubiquity and showgreat potential to enhance public health and clinical practice in LMICs. In thiscontext, hundreds of mHealth projects have already been developed, targetingissues such as HIV, malaria, tuberculosis (TB), diabetes and antenatal care[3]. Existing solutions provide a range of innovative applications, e.g. forpatient follow-ups, staff training, drug supply chain, patient education, diseasesurveillance, data collection and reporting.

On the one hand, mHealth systems make communication among healthcare providers, researchers and patients easier and offer great promise for im-proving quality of life [58]. On the other hand, the increasing collection anddisclosure of health-related data raise various privacy issues. Several concernsexist on privacy and security of mHealth applications, due to the fact thecollected data often reveal highly sensitive personal information, such as so-cial interactions, location, emotion, and other health conditions [62]. This isparticularly alarming for nationwide mHealth systems for health surveys anddisease surveillance, used to support public health care.

For instance, a case was reported in Haiti in which the government re-quested access to electronic medical records of HIV positive individuals [115].The purpose was to build a national database to calculate HIV prevalence inthe country. Although many organisations complied with the government’srequest, others were uncomfortable disclosing such types of data without pa-tient’s consent. In this kind of situation, the potential absence of privacy lawsand the fact that often such systems are being used to treat vulnerable popula-tions just worsens the situation. Furthermore, many mHealth systems todayprocess a much wider range of health conditions than just HIV.

That brings us to the category of mHealth applications known as MobileHealth Data Collection Systems (MDCSs), which are the main focus of thisthesis. In brief, such systems usually support Community Health Workers(CHWs) in primary care activities [59]. As part of their job, they visit familiesat their homes to provide basic health and medical care. However, they are alsoresponsible for conducting health surveys and reporting various health indicat-ors back to their managers at district- or national-level systems. Health surveysare used to collect data about the families, including information about hous-

Page 24: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

4 Introductory Summary

ing characteristics, sanitary conditions, chronic diseases, and illnesses. Datacollection and reporting that was once done with pen and paper is now beingreplaced by electronic forms.

Ensuring privacy and security for these systems is challenging [59]. Pro-ject managers may face barriers due to the lack of understanding about therelevant privacy laws. At the same time, developers may lack practical ex-perience on translating privacy principles from legal frameworks to actualprivacy-preserving mechanisms. In any case, concerns with privacy and secur-ity severely hinder projects from being fully deployed and scaling-up.

Taking this into account, in this thesis an engineering approach is ad-opted to bridge the knowledge gap between mHealth practitioners and pri-vacy specialists. Departing from the research question, “How to design secureand privacy-preserving systems for Mobile Health Data Collection Systems?”,this thesis offers a series of analyses and novel mechanisms. A review ofthe Brazilian mHealth ecosystem is presented, highlighting the importanceof CHWs and existing solutions. The review also provides insights aboutmHealth market, research, players and maturity of initiatives. In addition,practical experience with the implementation and deployment of a large-scaleMDCSs is also shared. First-hand involvement with the CHWs, health man-agers and developers is essential for designing realistic solutions. Most import-antly, privacy and security analyses for MDCSs were carried out, allowingthe proposal of different mechanisms. Specifically, security mechanisms forauthentication, access control and storage, as well as strategies for obfuscationand anonymisation of data, and management of informed consent.

The remainder of this Introductory Summary is structured as follows.Section 2 provides the research background, defining terms, concepts and tech-nologies covered in the thesis. Section 3 introduces the thesis research question.Section 4 describes the research method that was predominantly adopted inthis work. Section 5 states the scientific contributions achieved with this re-search. Section 6 discusses the relevant related work. Section 7 contains a listof the appended publications. Section 8 presents the research conclusions anddirections for future work.

2 BackgroundPrivacy and health informatics are by nature multidisciplinary research areas.This section introduces the main concepts and terms used throughout thethesis. First, the health-related concepts are presented. Primary Health Care(PHC) and Community-Based Primary Health Care (CBPHC) are defined,laying the foundation to introduce Brazil’s Family Health Strategy (FHS) pro-gramme. Second, the mHealth technology used to support CBPHC activitiesis explained, covering mHealth initiatives carried out around the world and inBrazil more specifically. And finally, we introduce the privacy-related concepts,relevant legal frameworks, and approaches to engineering privacy in MDCSs.

Page 25: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 5

2.1 Primary Health CarePrimary Health Care (PHC) is a model for delivering essential health careservices, introduced in the declaration of the International Conference onPrimary Health Care held in Alma-Ata, Kazakhstan in 1978. This declarationurged from multiple sectors of society urgent action to protect and promotethe health of all people, underlining the importance of PHC. Article VI ofthe 1978 Declaration of Alma-Ata defines PHC as follows [83]:

“Primary health care is essential health care based on practical, sci-entifically sound and socially acceptable methods and technologymade universally accessible to individuals and families in the com-munity through their full participation and at a cost that the com-munity and country can afford to maintain at every stage of theirdevelopment in the spirit of selfreliance and self-determination.It forms an integral part both of the country’s health system, ofwhich it is the central function and main focus, and of the overallsocial and economic development of the community. It is the firstlevel of contact of individuals, the family and community withthe national health system bringing health care as close as possibleto where people live and work, and constitutes the first elementof a continuing health care process.”

This definition carries in itself the notion of equity in the provision ofhealth care, i.e. universally accessible. It also stresses the community involve-ment, their full participation and responsibility towards improving healthoutcomes. And emphasises that PHC is not only related to the health system,but also to other areas that play a role in health, such as social and economicdevelopment. The Alma-Ata declaration defined PHC forty years ago but itis still relevant to today’s health care systems [43], capturing an ideal to strivefor.

2.1.1 Community-Based Primary Health Care

Community-Based Primary Health Care (CBPHC) is a strategy for PHC thatleverages from the community involvement. It is the joint work of communitymembers, local leaders, public and private organisations to extend health ser-vices beyond health facilities into the communities and their homes. Morerecently, experts have agreed on the following definition of CBPHC [89]:

“CBPHC is a process through which health programs and com-munities work together to improve health and control disease.CBPHC includes the promotion of key behaviors at the house-hold level as well as the provision of health care and health servicesoutside of health facilities at the community level. CBPHC can(and of course should) connect to existing health services, healthprograms, and health care provided at static facilities (includinghealth centers and hospitals) and be closely integrated with them.”

Page 26: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

6 Introductory Summary

In [89], the authors also stress that CBPHC includes multi-sectoral ap-proaches to health improvement – beyond the health services per se – withpositive impact on education, income, nutrition, living standards, and em-powerment. That is, other kinds of programmes that positively correlate withhealth outcomes. Besides, they also identify three different types of CBPHCinterventions [89]: (1) health communication, i.e. disseminating health in-formation to individuals, families and communities; (2) social mobilisationand community involvement for planning, delivering, evaluating and usinghealth services; and, (3) provision of health care in the community (e.g. pre-ventive or curative care).

Interventions are put into operation by various primary care workers andcommunity members, but most remarkable is the role of Community HealthWorkers (CHWs). CHWs are known by several names in different countriesand their working conditions also vary in terms of performed activities, wagesand received training [16]. A widely accepted definition for CHWs was pro-posed by the World Health Organization (WHO) [84]:

“Community health workers should be members of the com-munities where they work, should be selected by the communit-ies, should be answerable to the communities for their activities,should be supported by the health system but not necessarily apart of its organisation, and have shorter training than profes-sional workers.”

CHWs serve as an entry point into the formal health system [20]. In ruraland under-served communities they are most likely the only link between thepopulation and the health system [103]. As part of primary care teams, theyhelp people navigate the maze of health services, helping with referrals, healthpromotion, community engagement and requesting specialised services [85](see Figure 1).

CHWs visit families at their homes in order to provide primary care. Theykeep track of these visitations reporting back to their supervisors and district-or national-level systems. Notwithstanding, they also conduct demographicand health surveys helping to monitor various health indicators of the pop-ulation. Taking advantage of digitisation, many paper-based approaches forhealth surveys and surveillance are now being replaced by computer applic-ations, running on CHWs’ mobile phones. Thus, empowering CHWs andenhancing the quality and efficiency of the entire CBPHC programmes.

Low- and middle-income countries (LMICs) greatly benefit from CBPHCprograms and the work performed by CHWs. In this thesis we further explorethe CBPHC programme implemented in Brazil.

2.1.2 Brazil’s Family Health Strategy

The history of the Brazilian Family Health Strategy (FHS)1 started in 1991when the Ministry of Health established the Programa de Agentes Comunitários

1formerly know as Family Health Programme

Page 27: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 7

Figure 1: The role of CHWs in CBPHC (adapted from [20]).

de Saúde (PACS, Programme of Community Health Agents2 ). The objectiveof PACS was the reduction of infant and maternal mortality, especially inthe Brazilian North and Northeast regions, extending the coverage of healthservices to the poorest and most disadvantaged areas [97, 110]. Based on thesuccessful experience with the PACS in the state of Ceará the FHS was con-ceived as a federal programme in 1993 from a meeting on “Family Health”,convened by the Brazilian Health Minister with the support of United NationsChildren’s Fund (UNICEF) [97]. This was the beginning of the Brazilian ap-proach for CBPHC.

The FHS aims at providing preventive and basic health care. To do so,Primary Care Teams (PCTs) are organised, usually consisting of a physician,a nurse, and about six CHWs – and sometimes supported by a dental and oralhealth team [111] (see Figure 2). Every four or five PCTs also receive supportof other health professionals (e.g. psychologists, pharmacists, physiotherapists)for specialised care [111]. Each PCT covers three to four thousand families,with maximum 150 families per CHW. Recent numbers show that Brazil hasover 256, 000 CHWs delivering primary care to 62 percent of the population(see Table 1).

Besides providing primary care, CHWs are in charge of registering allfamilies in their catchment area, monitoring living conditions (e.g. housingcharacteristics and sanitation) and health status (e.g. chronic patients, pregnantwomen, children’s vaccination). They also resolve low-level problems, suchas checking patient’s medication adherence or dealing with patient referralsto specialised health services. Enrolled families receive monthly visits from adedicated CHWs regardless of need [111]. Concomitantly, they collect demo-

2Community Health Agents (CHAs) is the most common denomination for CHWs in Brazil.

Page 28: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

8 Introductory Summary

Figure 2: Family Health Strategy organisation (adapted from [111]).

Page 29: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 9

1998 20142, 000 PCTs 39, 000 PCTs60, 000 CHWs 256, 000 CHWs- 30, 000 oral health teams7, 000, 000 people (4%) 120, 000, 000 people (62%)

Table 1: FHS’s evolution from 1998 to 2014 (numbers from[66]).

graphic and health data about the families, that are later digitised at the healthfacility, and transmitted to the Sistema de Informação em Saúde para a AtençãoBásica (SISAB, Health Information System for Primary Care). The data is usedto assist the PCTs’ ongoing work in the community, as well as to generateperformance metrics and to support activities of public health surveillance,usually conducted by health managers at a district- or national-level.

In what follows, the technology used to support the work of CHWs in thescope of CBPHC is reviewed. Particularly, mHealth initiatives that improvethe data collection in PHC.

2.2 Mobile HealthToday, mobile devices are ubiquitous. Profound technologies that “weave[d]themselves into the fabric of everyday life until they are indistinguishable from it”[112]. According to the GSM Association, the number of connections (exclud-ing cellular IoT) totalled 7.8 billion globally in 2017 and will reach 9.0 billionby 2025 [46]. Smartphones represent 57 percent of the total mobile connec-tions and by 2025 this number will increase to 77 percent. Even more stunning,for a few years already, reports have shown that more people have access tomobile phones than basic sanitation such as toilets [77]. Considering suchimpressive scalability, it is no surprise that mobile devices and smartphoneswould play a significant role in the field of health information systems.

Mobile health (mHealth) results from the composition of a range of tech-nologies, such as mobile computing, medical sensors, and portable devices toensure health care [55]. Also relying on wireless networking capabilities andthe increasing miniaturisation of computers. A definition of mHealth wasgiven by [61]:

“[...] mobile health, or mHealth, refers to the use of mobile tech-nologies – wearable, implantable, environmental, or portable – byindividuals who monitor or manage their own health, perhapswith the assistance of individual caregivers or provider organiz-ations. The technology might support clinical care – includingdiagnosis and disease management – or wellness goals such as los-ing weight, eating a healthy diet, quitting smoking, or becomingphysically fit.” [61].

Existing mHealth systems can be used by nurses, doctors, caregivers, or

Page 30: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

10 Introductory Summary

Figure 3: Categories of mHealth applications and their adoption rate based ona global survey (adapted from [86]).

personal trainers putting the necessary information about their clients at pointof their fingertips. Patients can use mHealth to better manage their medicalconditions and communicating with health care providers. A wide range ofmHealth apps for planning diets and exercises exist, tailored for fitness andwell-being. At the same time, mHealth technologies are also used to assistvarious public health activities (e.g. disease surveillance, health census andalert systems).

Countries of all income levels have already deployed mHealth systemsto some extent; but systems can be fairly different depending on where youlive. High-income countries take advantage of more sophisticated settings, en-abling teleconsultation and remote monitoring of patients from the comfortof their homes [86]. On the other hand, low- and middle- income countries(LMICs) take benefit from the rapid growth of the mobile market and net-work infrastructure. Many initiatives use mobile’s SMS systems for healthcampaigns (raising health awareness), treatment adherence, follow-ups, andreminders to assure medication compliance [21, 86]. Also, mHealth systemsare often used to support frontline health workers, including CHWs, nursesand midwifes in the promotion of primary health care [21, 74, 103]. TheWHO performed a global survey in an attempt to review existing mHealthinitiatives and their levels of adoption within all its member states, revealing awide range of mHealth applications categories [86] (see Figure 3).

Page 31: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 11

In this thesis we are particularly interested in mHealth systems forCBPHC used for public and medical health. These systems usually fall intoa joint category of “Health Surveys & Surveillance”, since heath surveillancedepends on data collection in the first place.

2.2.1 Mobile Health Data Collection Systems

Public health surveillance is the continuous, systematic collection, analysis andinterpretation of health-related data needed for the planning, implementation,and evaluation of public health practice – to reduce morbidity and mortalityand to improve health [42]. In public health3, surveillance is necessary to [87]:(a) serve as early warning systems to impede public health emergencies; (b)document the impact of an intervention, or track progress towards specifiedgoals; and, (c) monitor and clarify the epidemiology of health problems, toallow priorities to be set and to inform public health policy and strategies.In other words, although surveillance is a rather loaded term in the privacycommunity, there would be no public health without surveillance systems.

Health surveys are the active approach for public health surveillance. Largefield surveys are common practice and offer a reliable way to collect datain LMICs [108]. Paper-based data collection are still the standard methodin many countries, but they are being replaced by mobile applications withelectronic forms, improving the overall efficiency of the process as well as dataquality and responsiveness. The category of mHealth applications for healthsurveys is known as Mobile Health Data Collection Systems (MDCSs) [41].

Various frontline health workers benefit from using MDCSs as part oftheir daily activities of data collection and reporting. In brief, during thehome visitations, they can use smartphones to collect data about the families,transmit it to the health facility through the network (e.g. 3G or 4G), and keepa history of their visitations as well as allowing health managers to visualise inreal-time health reports of the community (as illustrated in Figure 1).

Across the globe many countries are starting to use MDCSs to replace thearchaic paper forms (for a survey, see [101]). Some remarkable examples ofMDCSs are:

• Fiji – the eSTEPS [122] for comparing the data quality provided bypaper-based and electronic health questionnaires.

• South Africa – the Personal Data Collection Toolkit (PDACT) forinterviewer-administered and respondent-administered data collection[100] and the Mobile Researcher [108] to support CHWs.

3“Public health is the science and art of preventing disease, prolonging life and promoting physicalhealth and efficiency through organized community efforts for the sanitation of the environment, thecontrol of community infections, the education of the individual in principles of personal hygiene, theorganization of medical and nursing service for the early diagnosis and preventive treatment of disease,and the development of the social machinery which will ensure to every individual in the communitya standard of living adequate for the maintenance of health.” – Charles-Edward Amory Winslow(1920) [116].

Page 32: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

12 Introductory Summary

Figure 4: Conventional process and data flows for MDCSs (adapted from[56]).

• Tanzania – the Data Entry at the Point of Collection (DEAPOC) forlarge household survey in remote areas [102].

• Thailand – a mHealth application to improve antenatal care and expan-ded programme on immunisation services for the under-served popula-tion [57].

• Ghana – the Mobile Technology for Community Health (MOTECH)Platform [44, 63], used by nurses and CHWs for recording and track-ing the care delivered to women and newborns, and generating reportsmandated by the country’s health authorities.

There are also standardised, general purpose tools that help in the taskof designing forms and sending them to mobile devices, such as the Magpiframework [67] and the Open Data Kit [2]. And more recently, the WorldHealth Organization (WHO) together with group of academic and researchinstitutions and technology partners are developing the Open Smart RegisterPlatform (OpenSRP [82]), which has been used to empower frontline healthworkers to electronically register and track the health of their entire clientpopulation.

2.2.2 eSUS and MDCSs in Brazil

Similarly, many MDCSs are being developed and deployed in Brazil. Andgiven the importance of the FHS for CBPHC, it is natural that various MDCSsfocus on CHWs and the data gathering for the Brazil’s national level HealthInformation System for Primary Care (SISAB) database. The FHS is oneof the most important programmes of the Brazilian universal public healthsystem, Sistema Único de Saúde (SUS). In the past, MDCSs were mainly de-veloped by research groups within universities and health care institutions.Some examples of SISAB-oriented MDCSs are:

Page 33: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 13

• [12]: an early architecture that implemented electronic forms used byCHWs in the FHS for handhelds computers, such as Palm Top andHiebook Reader.

• Colibri Project [91]: a set of tools for data collection, public healthsurveillance and expert systems for monitoring communities within thescope of the FHS.

• LISA-MCP [37]: a mHealth module that implemented one of the formsused by CHWs in the FHS (i.e. family registration) – as part of a lar-ger project called LARIISA, a intelligent system for decision-making inpublic health governance.

• GeoHealth [98]: a system that allowed data collection and analysis inthe scope of the FHS, with security and geo-referencing functionalities,deployed and tested in a large-scale study.

In the past years, the Brazilian Ministry of Health put forward a newstrategy and created the electronic SUS (e-SUS). This nation-wide projectaims to develop, restructure and integrate information systems in order toenable individualised electronic health records of the population. As part ofthis new strategy, we have e-SUS Atenção Básica (e-SUS AB, e-SUS PrimaryCare) to restructure the information systems used for primary care at thenational level. To do so, the the Department of Primary Care (DAB) releasedtwo main system modules: (1) the Prontuário Eletrônico do Cidadão (PEC,Citizen’s Health Record) electronic health record for the health facilities; and,(2) the Coleta de Dados Simplificada (CDS, Simplified Data Collection), theelectronic forms used by CHWs in the primary care. These systems can canbe integrated, but in this thesis more attention is given to the CDS module.

The CDS module runs in a computer at the health facility, so that CHWscan digitise the paper forms or synchronise data directly from mobile phones.Health facilities can keep a local server – if they can afford it – with all thecollected data. Every month they have to send the data to the SISAB, followingspecific standards for exporting data.

More recently, the DAB itself has released its first MDCS known as e-SUSAB Território, developed in collaboration with Bridge Laboratory [11]. Othersystems, however, made by private companies were also being used across thecountry, e.g. eSUS+ ACS [107] and ACS Lite eSUS AB ePHealth [32]. Al-though the Ministry of Health now provides its own system, the decision ofchoosing and implementing a MDCS is still made at the municipality level.Many cities already had an information system in place, so they are not re-quired to change it. In any case, the government provides a data standard fortransmitting data to the national-level database, so that, the municipalities stillhave to upload monthly all the collected data – regardless if it is collected bypaper or electronic forms.

Now that the main concepts related to health care and mHealth systemshave been introduced, we proceed with the background on privacy and secur-ity, for mHealth in general as well as for MDCSs in specific.

Page 34: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

14 Introductory Summary

2.3 Privacy, Security and mHealthIn today’s digital society where personal data is the new oil – a commodityin the digital economy – the concept of privacy grows in importance as far asour digital footprint becomes more unique and traceable, impacting our “real”life. Privacy remains however as an elusive concept virtually impossible to bedefined [104]. There are multiple forms of privacy and they are perceived dif-ferently according to cultural, legal, and personal values. In an effort to steeraway from the intricate philosophical discussion yet providing a workableexplanation for privacy, one can refer to privacy in two simple ways. Privacyas the ability to seclude oneself physically; or, privacy as ability to have con-trol over your own personal information. Broadly speaking, that means thatprivacy has at least two categories: (i) physical privacy, and (ii) informationalprivacy. In this thesis we are particularly focused on the latter, i.e. informationprivacy (also commonly referred as data privacy). A definition for privacy onsuch terms was provided by Westin (1967) [113]:

“Privacy is the claim of individuals, groups, or institutions to de-termine for themselves when, how, and to what extent informa-tion about them is communicated to others. Viewed in terms ofthe relation of the individual to social participation, privacy isthe voluntary and temporary withdrawal of a person from thegeneral society through physical or psychological means, either ina state of solitude or small-group intimacy or, when among largergroups, in a condition of anonymity or reserve.”

Privacy, in this thesis, considering Westin’s definition [113], is restrictedto the privacy of individuals (natural persons); and information privacy refersto their personal data. Closely related to privacy, yet not equivalent, is theconcept of security. As part of today’s information and communication tech-nology, computer security is the discipline of protection of information systems(i.e. hardware, software and information) from theft, damage, disruption ormisdirection. Usually computer security boils down to three core concepts [9]:(1) confidentiality, the concealment of information or resources; (2) integrity,the trustworthiness of data resources; prevention of improper or unauthor-ised change; and, (3) availability, the ability to use the information or resourcedesired. Consequently, it is natural to see an overlap between the conceptsof information privacy and security, specially with regards to confidentiality.In practical terms, confidentiality refers to the authorised access or disclosureof information, comprising notions of secrecy, access-control, sharing, protec-tion of information. Therefore, when it comes to information about a person,information security becomes one of the means for achieving information pri-vacy. For example, individuals expect that their emails should not be read byothers than the recipients, that is a privacy claim. Encryption is the securitytechnology used as a mean to achieve such privacy goal. Nonetheless, someprivacy concepts go beyond security, such as openness and transparency of per-sonal data processing; or even, the right to access and redact one’s informationin a system. Another classical example is the protection of meta communic-

Page 35: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 15

ation data. Usually data confidentiality only concerns the actual content ofdata, but not necessarily the meta data about who is communicating withwhom from where. For such reasons, it is more accurate to say that securityis essential for achieving privacy, but only addressing the security issues is notenough.

Privacy can be also defined as a collective value and a human right. Asa social value, privacy is essential for a functioning democracy; privacy anddemocracy reinforce each other [95]. Ensuring people’s dignity and autonomyis necessary for meaningful democratic participation. Privacy is also explicitlymentioned in Universal Declaration of Human Rights (Art. 12) [4], “No oneshall be subjected to arbitrary interference with his privacy, family, home or cor-respondence, nor to attacks upon his honour and reputation”. Privacy also hasprecedent as freedom of speech (and to hold back information), (Art. 19) [4]:“Everyone has the right to freedom of opinion and expression; this right includesfreedom to hold opinions without interference and to seek, receive and impartinformation and ideas through any media and regardless of frontiers”. Individu-als under extensive scrutiny have their rights and freedoms limited, harmingdemocratic values of the society. Privacy is essential element for societal devel-opment and therefore key in any endeavours of digital development as well.To truly bridge the digital divide, privacy cannot be seen as an optional fea-ture, but rather as a fundamental part of the design process. And that is whatwe refer in this thesis as privacy for development, i.e. privacy-by-design and bydefault for true digital development.

Furthermore, privacy and data protection are sine qua non for high qualityhealth care. The importance of privacy, as mentioned in [22], has been alreadymanifested ages ago in one of the most widely known of Greek medical texts,the Hippocratic Oath:

“What I may see or hear in the course of the treatment or evenoutside of the treatment in regard to the life of men, which on noaccount one must spread abroad, I will keep to myself, holdingsuch things shameful to be spoken about.” – excerpt from theHippocratic Oath [31].

High quality health care requires individuals to share their personal healthinformation with health care professionals [22]. Furthermore, informationshould be complete and accurate. If patients cannot trust that their informa-tion will be kept secure, they will be reluctant to share it (or even to use theservice). If health professionals cannot trust the organisation to keep recordssecure they will not put complete information. In both cases this leads to in-ferior health care. It is therefore paramount that privacy and security concernsare addressed during the design of any health information system.

Having stressed the importance of privacy in the context of health care,we now expand this discussion with more specific guidelines and legal reportsthat address privacy for mHealth systems in LMICs.

Page 36: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

16 Introductory Summary

2.3.1 Privacy Law for Mobile Health

The right to privacy, as already mentioned, is enshrined in various existinglaws and even in the declaration of human rights. Such documents and otherrelevant regulations and standards are the starting point for project leaders anddevelopers to understand the requirements on privacy and data protection.

Some countries (i.e. separate legal jurisdictions), however, do not have aspecific legislation for data privacy [45, 6]. This usually does not imply a legalvoid in the area. Privacy rights might stem from the constitution or consumerrights; and in the case of health care, from medical codes of conduct, and soon. Nonetheless, in such countries, project managers can benefit from somespecific publications, helping them to understand privacy in the context ofmHealth. For instance, [52] presents a list of five guiding principles for mobileprivacy, recommended for projects in LMICs:

Principle 1 Address Surveillance Risks – Projects should take steps to ensurethat user data is secure from third party surveillance, e.g. user discrim-inatory profiling can be made by mobile operators and government.

Principle 2 Limit Data Collection and Use – Projects should limit data col-lection to what is absolutely necessary for the project’s goal, e.g. byemploying access control, data retention policy, and not collect unneces-sary data.

Principle 3 Promote and Facilitate Transparency – Projects should be trans-parent about what data is collected, how it is shared, and how it mightbe used in the future, e.g. user notifications, data transfer policies, audittrails of others that also have access to the data.

Principle 4 Incorporate User Feedback – Projects should give users the abilityto access, amend, and/or delete their data, e.g. create user interfaces,create communication channels to receive feedback from users.

Principle 5 Assume Responsibility – Projects should assume accountabil-ity for potential risks and harms incurred via their projects and plat-forms, e.g. perform risk assessment, plan incident response, notify databreaches.

These guiding principles [52] offer a good starting point for developersand project leaders working with mHealth (specifically). However, in practice,privacy and security still require a case-by-case evaluation. There is no one-size-fits-all guideline, given the complexity, multiplicity of actors, jurisdictions, andhighly culture-specific dimensions of privacy [75]. The ideal case, however,would be to strive for excellence by following regulations such as the EUGDPR, that sets a high standard for privacy. Moreover, many countries in theEU have also specialised national health privacy laws which however need tocomply with the GDPR.

Page 37: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 17

Figure 5: National comprehensive data protection/privacy laws and bills(2018) [6].

2.3.2 Legal Frameworks EU GDPR and BR LGPD

Guiding publications and other reports ( [52, 75]), offer helpful advice to pro-ject leaders and developers working with mHealth in LMICs. However, theseguidelines should be used – if possible – in combination with national legalframeworks that are relevant to your mHealth ecosystem. Today, many coun-tries already have a overarching privacy law in force or at least there is a billin discussion [6].

A well-know example is the European General Data Protection Regula-tion (EU GDPR). The EU GDPR replaces the previous Directive 95/46/EC[1] and was designed to: (a) harmonise privacy and data protection laws acrossEurope; (b) protect and empower all EU citizens privacy and data protection;and, (c) reshape the way organizations across the region approach privacy anddata protection. However, it does not apply only to EU member states butalso to organisations (i.e. data controllers and data processors) outside EUthat offer goods and services to, or that monitor, individuals in the EU. Forthis reason, the EU GDPR casts its net globally and many other countries areupdating their privacy laws so that an adequate level of data security and pro-tection is guaranteed. Thus, allowing cross-border data transfers for businessactivities, and avoiding penalties and administrative fines4. The EU GDPR isconsidered the state-of-the-art on privacy law and it impacts organisations allaround the world.

The Brazilian Lei Geral de Proteção de Dados (BR LGPD, General Lawfor Data Protection) is inspired in the EU GDPR. As of August 2018, Brazil

4“For especially severe violations, listed in Art. 83(5) GDPR, the fine framework can be up to 20million euros, or in the case of an undertaking, up to 4% of their total global turnover of the precedingfiscal year, whichever is higher.” (Art. 83 [34])

Page 38: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

18 Introductory Summary

has seen its bill approved in the senate and sanctioned by the president [10].Organisations have 18 months to adapt to the new law. However, one of themajor differences is that the president vetoed the creation of an AutoridadeNacional de Proteção de Dados (ANPD, National Data Protection Authority),a pillar for the implementation of the new policy. ANPD would be respons-ible for ensuring compliance with the law, that is, who would supervise andapply sanctions if the processing of personal data by some entity was not inaccordance with the legislation. Thus, now it is expected that the executive(government) – instead of the senate – will send a new bill, specific for thecreation of the ANPD.

With that being said, this section does not intend to provide a lengthyexplanation about the EU GDPR, but rather cover just the main conceptsthat will be part of “privacy vocabulary” in this thesis. These concepts areused in both EU GDPR and BR LGPD. For the purpose of the regulations,they are defined as follows (Art. 4 GDPR [34]):

• “personal data” means any information relating to an identified or iden-tifiable natural person (“data subject”); an identifiable natural person isone who can be identified, directly or indirectly, in particular by refer-ence to an identifier such as a name, an identification number, locationdata, an online identifier or to one or more factors specific to the phys-ical, physiological, genetic, mental, economic, cultural or social identityof that natural person;

• “processing” means any operation or set of operations which is per-formed on personal data or on sets of personal data, whether or notby automated means, such as collection, recording, organisation, struc-turing, storage, adaptation or alteration, retrieval, consultation, use, dis-closure by transmission, dissemination or otherwise making available,alignment or combination, restriction, erasure or destruction;

• “controller” means the natural or legal person, public authority, agencyor other body which, alone or jointly with others, determines the pur-poses and means of the processing of personal data; where the purposesand means of such processing are determined by Union or MemberState law, the controller or the specific criteria for its nomination maybe provided for by Union or Member State law;

• “processor” means a natural or legal person, public authority, agencyor other body which processes personal data on behalf of the controller;

• “consent” of the data subject means any freely given, specific, informedand unambiguous indication of the data subject’s wishes by which he orshe, by a statement or by a clear affirmative action, signifies agreementto the processing of personal data relating to him or her;

• “data concerning health” means personal data related to the physicalor mental health of a natural person, including the provision of healthcare services, which reveal information about his or her health status;

Page 39: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 19

• “special categories” means personal data revealing racial or ethnic ori-gin, political opinions, religious or philosophical beliefs, or trade unionmembership, and the processing of genetic data, biometric data for thepurpose of uniquely identifying a natural person, data concerning healthor data concerning a natural person’s sex life or sexual orientation.

Maintaining these concepts in mind help to understand the vocabularyused in the following sections as well as the publications that are part of thisthesis. Other explanations are provided throughout the document, but werefer the reader to the original texts for further details [34, 10].

2.4 Privacy EngineeringGuidelines, principles and policies help in understanding what should be done,but often it is not clear how to actually do it. High-level policies may evencontain some degree of vagueness, which allows for legal interpretation – apositive feature that strengthens the policy enforcement. Hence, it is not theexisting policies that will concretely explain how to address privacy and dataprotection in mHealth projects. The translation from policies to engineeringmethods, techniques and tools is a task for interdisciplinary groups. Just like“quality”, “safety”, and “environmental” regulations that needed to be put intopractice over the past decades, now the same is happening to privacy.

Privacy engineering is therefore this emerging field that aims to close thegap between existing policies and the current practice, systematising and evalu-ating approaches to address privacy in the engineering of information systems[49]. In computer science, the area of software engineering is the one con-cerned with all aspects of software development process, from start to finish:requirements, design, implementation, verification, maintenance, and eventualdiscard. Thus, it is natural that the field of privacy engineering also borrowsfrom software engineering. A definition for privacy engineering was proposedby Gürses et al (2016) [49]:

“[...] privacy engineering as the field of research and practice thatdesigns, implements, adapts, and evaluates theories, methods, tech-niques, and tools to systematically capture and address privacyissues when developing sociotechnical systems.”

This section presents three themes on privacy engineering, that are re-peatedly discussed throughout the thesis. Starting with the seminal idea ofPrivacy by Design (PbD), followed by the methodologies for Privacy Im-pact Assessments (PIAs) and some relevant Privacy-Enhancing Technologies(PETS).

2.4.1 Privacy by Design

Privacy by Design (PbD) is an approach geared towards systems engineering,urging that privacy should be taken into account throughout the entire engin-eering process. Some refer to PbD as a technical approach to a social problem

Page 40: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

20 Introductory Summary

[25]. The concept was originally proposed by Ann Cavoukian during the 90’s[13], and later formulated “as a holistic concept that may be applied to operationsthroughout an organization, end-to-end, including its information technology,business practices, processes, physical design and networked infrastructure” (in the“Resolution on PbD” [106]).

For accomplishing PbD, Cavoukian [13] lays down seven principles:

1. Proactive not reactive; preventative not remedial.

2. Privacy as the default setting.

3. Privacy embedded into design.

4. Full functionality – positive-sum, not zero-sum.

5. End-to-end security – full life-cycle protection.

6. Visibility and transparency – keep it open.

7. Respect for user privacy – keep it user-centric.

These principles characterise various privacy properties rather than prac-tical instructions [25], so that further explanation was later provided on howto operationalise PbD [14]. Some of the methods and techniques used to real-ise PbD are further explained in the next sections. Most interestingly, however,is that PbD inspired a great deal of research in the area of privacy engineering.And as a matter of fact, the idea of PbD was also incorporated in the EUGDPR Art. 25 Data protection by design and by default [34]. More precisely,Data Protection by Design (DPbD) – a form of PbD – requiring data control-lers to “[...] implement appropriate technical and organisational measures, [...]which are designed to implement data-protection principles [...] ensuring that, bydefault, only personal data which are necessary for each specific purpose of the pro-cessing are processed”. For simplicity, only the term PbD is used in this thesis,as well as PIA instead of Data Protection Impact Assessment (DPIA).

2.4.2 Privacy Impact Assessments

For someone to understand privacy, it is crucial to comprehend its technicalaspects (e.g. user profiles, data flows, data holders), its security implications,and also consider particular and cultural elements around privacy in a givencontext. Privacy Impact Assessments (PIAs) are a pragmatic manner to per-form such analysis, and arguably, one of the most well-structured methods thatorganisations can employ to realise PbD in their projects. Actually, PIAs areencouraged or made mandatory in various legal frameworks for privacy anddata protection accross countries (e.g. New Zealand, Canada, Australia, HongKong, European Union) [18]. Although there is no internationally accepteddefinition for PIA, in this thesis we consider the following two definitions:

[PIA is] “a process whereby the potential impacts and implica-tions of proposals that involve potential privacy-invasiveness aresurfaced and examined.” [18].

Page 41: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 21

Or a more detailed construction:

[PIA is] “a methodology for assessing the impacts on privacy ofa project, policy, programme, service, product or other initiativeand, in consultation with stakeholders, for taking remedial actionsas necessary in order to avoid orminimise negative impacts. A PIAis more than a tool: it is a process which should begin at the earliestpossible stages, when there are still opportunities to influence theoutcome of a project. It is a process that should continue untiland even after the project has been deployed.” [120].

In other words, PIAs are some sort of risk analysis for privacy. Multipletechnical and organisational methods are used to conduct a PIA, involvingfor instance: project planning, system documentation, privacy risk analysis,reporting and action plans. Once you have all the methods selected and sys-tematised, you can create a PIA methodology. The methodologies are alsocommonly known as frameworks.

Many PIA frameworks have already been proposed. Some are recommen-ded to a specific jurisdiction and legal framework, whereas others aim for aspecific industry sector, or for a general methodology. A few examples of thesePIA frameworks are listed as follows.

• Sector-specific frameworks:

– [81, 80]: Privacy and Data Protection Impact Assessment Frame-work for RFID Applications (PIA RFID), 2011.

– [33]: Data Protection Impact Assessment Template for Smart Gridand Smart Metering systems (PIA Smart Grids), Smart Grid TaskForce (EU Commission), 2014.

• General frameworks:

– [53]: UK – Conducting privacy impact assessments code of prac-tice, Information Commissioner’s Office (ICO), 2014.

– [78]: AU – Guide to undertaking privacy impact assessments, Of-fice of the Australian Information Commissioner (OAIC), 2014.

– [19]: FR – Privacy Impact Assessment (PIA) Methodology, Com-mision nationale de l’informatique et des libertés (CNIL), 2018.

– [54]: ISO/IEC 29134 Information technology – Security tech-niques – Guidelines for privacy impact assessment, InternationalOrganization for Standardization (ISO), 2017.

The PIA RFID and PIA Smart Grids are examples of sector-specific frame-works. For instance, the PIA RFID framework [81, 80] was developed byindustry players and endorsed by the Article 29 Working Party5 [120]. Such

5The Article 29 Data Protection Working Party was set up under the Directive 95/46/ECof the European Parliament and of the Council of 24 October 1995 on the protection of in-dividuals with regard to the processing of personal data and on the free movement of suchdata. It has advisory status and acts independently. (http://ec.europa.eu/justice/data-protection/article-29/index_en.htm)

Page 42: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

22 Introductory Summary

approach creates a PIA template that is pertinent for a specific industry sector,which are particularly important for industries that have projects involvingnew technologies – of which privacy impacts are not fully understood yet.

However, the PIA RFID was later generalised in a systematic methodology[79] and it is no longer limited to RFID applications. Other well-known PIAframeworks were proposed by data protection authorities in different coun-tries, such as the ICO’s PIA [53], the OAIC’s PIA [78], and the CNIL’s PIA[19]. And more recently, the ISO also released a standard for PIAs numberedISO/IEC 29134:2017 [54].

Most frameworks are fairly similar, but the systematic methodology forPIAs proposed in [79] is probably the most rigorous of all. It is akin to existingstandards for risk management, such as ISO/IEC 27000 series NIST SpecialPublications 800 series [79], which is beneficial if the PIA should be integratedinto an organisation’s risk management processes. However, because this ap-proach entails a fairly extensive privacy threat analysis it can demand moreresources and time if compared to more streamlined approaches, such as theICO’s and OAIC’s PIA frameworks.

In the context of mHealth, developers could benefit from PIA frameworks,and actually for MDCSs they should be seen as mandatory due to the largearray on sensitive personal data that is collected. In fact, some authors alreadyproposed a code of conduct on privacy for mHealth applications, suggestingthe creation of a PIA template for mHealth apps [71].

In general, a PIA should be considered every time a new project starts orwhen there are significant changes to a existing system that processes personaldata (see Figure 6). It usually starts with a threshold analysis, to decide if aPIA is really necessary. If the data processing is likely to result in a high-riskto the rights and freedoms of natural persons (data subjects) (EU GDPR Art.35(1) [34]) a PIA must be carried out by the data controller. In such case, thePIA needs to be planned and stakeholders should be consulted throughoutthe process. Once the plan is ready, the system’s scope and purposes shouldbe described, and most importantly, all the processed personal data has tobe mapped, using a data flow diagram. Subsequently, all the privacy threatsshould be identified and technical or organisational controls should be assignedto minimise, mitigate or eliminate the identified threats. Lastly, a residual riskanalysis is performed, clearly stating to what extent the risks are controlledand/or accepted by the organisation. All the documentation is compiled ina final PIA Report, that is submitted to the data protection authority, andusually encouraged to be disseminated in two other versions (internal andexternal).

By carrying out the PIA, project managers and system designers are com-pelled to rethink all the personal data that is collected, and encouraged tominimise data collection to satisfy just a limited and specific set of purposes.The PIA also helps to identify privacy pitfalls before development starts andallowing changes in the early stages. Lastly, it helps to identify the technicaland organisational privacy-preserving controls that should be put in place. Al-though organisational controls are essential for privacy, the scope of this thesis

Page 43: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 23

Figure 6: General process for Privacy Impact Assessments.

concentrates on the technical controls. In particular, the privacy-preservingtechnologies for MDCSs, including PETs as well as security mechanisms.

2.4.3 Privacy-Enhancing Technologies

At this point, concrete systems concepts can be finally introduced, i.e. soft-ware components used to safeguard the right to privacy of an individual. Thetechnical approaches for protecting privacy, usually in accordance with privacylaws, are widely known as Privacy-Enhancing Technologies (PETs). PETs areessential part of the privacy engineering field.

An early definition for PETs used the term “privacy-enhancing to refer avariety of technologies that safeguard personal privacy by minimising or eliminat-ing the collection of identifiable data” [51]. This definition was later extended“to include security technologies to protect the confidentiality, integrity and availab-ility of personal data.” [35]; and other authors also add, “preventing unnecessaryor unwanted processing of personal data, without the loss of the functionality ofthe information system” [109].

PETs are also described in terms of the privacy properties that theyprovide, such as anonymity, pseudonymity, unlinkability, undetectability andunobservability – besides the security properties of confidentiality, integrityand availability. These privacy properties can be defined as follows [90]:

• Anonymity of a subject means that the subject is not identifiable withina set of subjects, the anonymity set. For instance, allow a user to usea resource or service (e.g. send or receive messages) without disclosingthe user’s identity.

• Pseudonymity is the use of pseudonyms as identifier. A subject is pseud-onymous if a pseudonym is used as identifier instead of one of its realnames. For instance, to protect the user’s identity in cases where an-onymity cannot be provided (e.g. if the user has to be held accountable

Page 44: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

24 Introductory Summary

for his/her activities).

• Unlinkability of two or more items of interest (IOIs, e.g. subjects, mes-sages, actions, ...) from an attacker’s perspective means that within thesystem (comprising these and possibly other items), the attacker can-not sufficiently distinguish whether these IOIs are related or not. Forinstance, ensures that a user may make use of resources and serviceswithout other being able to link these uses together (e.g. user sendsvarious messages that cannot be associated).

• Undetectability of an IOI from an attacker’s perspective means thatthe attacker cannot sufficiently distinguish whether it exists or not. Forinstance, messages sent over a channel are not sufficiently discerniblefrom random noise.

• Unobservability of an IOI means (1) undetectability of the IOI againstall subjects uninvolved in it and (2) anonymity of the subject(s) involvedin the IOI even against the other subject(s) involved in that IOI. Forinstance, ensures that a usermay use a resource or service without others,especially third-parties, being able to observe that the resource or serviceis being used (e.g. user sends a message but nobody would be able toknow that).

In health care systems, anonymisation or pseudonymisation of health re-cords is common, especially when using patient’s health data for secondarypurposes. Unlinkability is also useful, for instance, in laboratory tests whenthe patient’s pseudonym should be unlinkable to the patient’s real name forthe laboratory personnel. However, the privacy properties of undetectabilityand unobservability are usually impractical or even not desired in a clinicalcontext. PETs for health care tend to emphasise aspects of confidentiality andintegrity, using encryption and access control mechanisms, for privacy andsafety reasons. Patients are also normally concerned about having control overtheir data. In fact, this is known as the “privacy as control” paradigm. Privacyas control starts from the assumption that the disclosure of personal data is in-evitable in an increasingly networked world, and thus, the organisations haveto establish trust through transparency and policy enforcement mechanisms[48].

PETs is an area of its own, with various categories and countless mechan-isms. This section does not aim to cover PETs in a broad way, but rather focuson a few important security and privacy-enhancing mechanisms that are partof this thesis, in the context of MDCSs. First, security mechanisms, includingkey management, authentication, encrypted communication and storage aredescribed. Second, data anonymisation and obfuscation schemes for sharingpersonal health data. Finally, consent management for obtaining and handlinginformed consent.

Page 45: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 25

Figure 7: Scenario characteristics that influence the security of MDCSs.

2.4.4 Security and Privacy-Enhancing Mechanisms for MDCSs

In the context of primary care, CHWs equipped with smartphones use theMDCSs in their daily activities while visiting the families in their catchmentarea. This application scenario has some distinct characteristics regarding se-curity. As illustrated in Figure 7, the main aspects that need to be consideredare:

• Secure data exchange: the data at-rest and in-transit needs to be securelystored and transmitted through the mobile network operator.

• Light weight and low cost: implementations should consider the lim-ited computing power of smartphones and employ lightweight cryp-tography.

• Device theft or loss: smartphones are can be lost or stolen and the datastored in the memory cards could be compromised.

• Network delay and disconnection: network coverage is not always pos-sible, so the mobile application should continue working while offline.

• Device sharing: smartphones are shared among CHWs, but the systemshould allow access only the data of the families that they are responsiblefor.

• Usability: security functions should be intuitive (or seamless) and notget in the way of the CHWs’ main tasks.

Given these aspects, some cryptographic mechanisms and protocols areparticularly useful for MDCSs. Essentially, MDCSs need a Key ManagementMechanism (KMM) to provide Authentication and Key Exchange (AKE)

Page 46: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

26 Introductory Summary

between parties (user’s mobile and application server). Authentication proto-cols and key derivation schemes for such applications usually rely on symmet-ric cryptography using passwords. These protocols should also give supportfor online and offline user authentication. In addition, encryption schemesshould ensure the confidentiality of at-rest an in-transit data, allowing securecommunication and storage. These security concepts and building blocks areintroduced in the following sections.

Authentication and Key Derivation

Authenticating users in the system remains a challenge in modern computersecurity. It is well-known that authentication can be based on a combinationof factors, such as [92]: biometrics (“what the user is”), security tokens (“whatthe user has”), or passwords (“what the user knows”). Although there is anincreasing move towards (at least) two-factor authentication schemes, secretpasswords are still the most widespread strategy.

Password-based authentication is everywhere, because it is a simple, cost-effective and efficient method of maintaining a shared secret between a humanbeing and a computer system. Furthermore, the advantages of using passwordstend to out shadow the disadvantages, i.e. problems of choosing strong buteasy-to-remember passwords. For these reasons, it is likely that passwords willcontinue to be used for quite some time into the future [96]; by itself or aspart of multi-factor authentication schemes.

Password-based systems normally employ Key Derivation Functions(KDFs), cryptographic algorithms for generating a pseudo-random string ofbits from the password itself [99, sec. 2.4]. KDFs internally employ a one-wayfunction (e.g. hash), so that recovering the password from the KDF’s outputturns out to be computationally infeasible [27]. The output generated from apassword is usually used in two ways: (a) it can be locally stored in the formof a token for future verification; or (b) it can be used as the secret key for dataencryption and/or authentication. However, attackers can still attempt a dic-tionary attack [99, sec. 8.1] and test many different passwords combinationsuntil a match is found (i.e. brute-force).

KDFs usually rely on two strategies for preventing such brute-force attacks.The first strategy is to deliberately raise the cost of every password guess interms of computational resources, such as: processing time and/or memoryusage. Some examples of password hashing functions that do that are: thebcrypt, that uses an iteration count as a cost parameter to make it slower [94];and, the scrypt, that uses large amount of memory to limit large-scale customhardware attacks [88]. The second strategy is to take as input not only theuser-memorisable password, but also a sequence of random bits known as salt6 [99, sec. 3.2]. The presence of such random variable thwarts several attacksbased on pre-built tables of common passwords, i.e. forces the attacker tocreate a new table from the scratch for every different salt. The salt can, thus,

6Salt is a random string that is concatenated with a password ( s al t | |pas swor d ), added to theinput before being passed as argument to the one-way function.

Page 47: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 27

be seen as an index into a large set of possible keys derived from the password,that does not have to be memorised by users or kept in secret.

Password-based Remote Authentication and Key Exchange

In principle, KDFs can be used for data communication. That is, if the localand remote systems share the same password, they could exchange data byrevealing to each other the salt employed for generating the key that protectssuch data. However, since this would allow attackers to use the same salt inan offline dictionary attack, KDFs are usually employed only for local datastorage, establishing a secure channel between the human user and the localsystem.

Data transmission to remote locations usually employs Password Authen-ticated Key Exchange (PAKE) protocols. Such schemes allow two or moreparties who share a password to authenticate each other and create a securechannel to protect their communication (e.g. [8, 7]). To be considered secure,a PAKE solutions must ensure that an unauthorised party (that fully controlsthe communication channel but does not know the password) is unable tolearn the resulting key and is, as much as possible, unable to guess the pass-word using offline brute force attacks. Some examples of secure PAKE are theAuthenticated Key Exchange [7] and the Secure Remote Password protocol[93], which mHealth developers can leverage from and use for creating securechannels for communication.

Secure Data Storage

Once user and server have agreed on a common shared key by means of a PAKEprotocol, this key can then be used to protect the data stored in the mobilephone. To do so, a secure storage mechanism should encrypt all the sensitiveinformation, including: (a) configuration files and users’ data; (b) sensitivedata collected from the families and temporarily stored in the smartphone;and, (c) transmitted data that is sent to the server. Hence, encryption assuresdata confidentiality letting only authorised parties to read data. This mechan-ism should employ lightweight encryption algorithms owing to constrainedcomputing power of low-end smartphones [39], even though today manysmartphones can actually perform a typical AES with key length 256-bit.

However, encryption carries the risk of rendering your data useless ifanything goes wrong with the key management process (e.g. losing keys).In other words, developers should be aware that the key management addscomplexity since at least on the server-side its necessary to store partial valuesto rebuild users’ keys in order to decrypt and to consolidate received data.

Data Anonymisation and Obfuscation

In the context of MDCSs (see Figure 8), data is shared among the primarycare team for the primary purpose of medical treatment. Health managersalso have access to the data, to perform data analysis for public health surveil-lance (district- or national-level). Such activities can have direct impact in the

Page 48: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

28 Introductory Summary

Figure 8: Obfuscation and anonymisation for MDCSs.

community, by prioritising care and providing target campaigns for healthpromotion. However, MDCSs can also be leveraged to create rich statisticaldatabases for researchers in health-related areas. In such cases, the collecteddata is being used for secondary purposes.

When using data for primary purposes, access control is the most com-mon strategy to enforce confidentiality of patient’s information. However, webelieve that besides the typical binary decision of revealing or not a data value,access control can be further improved with data obfuscation. Obfuscation isused to lower the accuracy of a specific data item in a systematic, controlled,and statistically rigorous way [5] to enhance patient’s privacy while retainingits usefulness. For instance, instead of revealing the patient’s age one can re-veal a range of values. Or even, replace a medical condition or disease by amore general term (e.g. “Human Immunodeficiency Virus (HIV) infection”replaced by “Infectious Disease”).

Besides that, for secondary use of health data, anonymisation can be em-ployed, i.e. to protect privacy by making a number of data transformations sothat individuals whom the data describe remain anonymous. The anonymisa-tion process can have variable degrees of robustness [118], depending on howlikely is to: 1) single out an individual in the dataset; 2) link records concern-ing the same individual; or, 3) infer the value of one attribute based on othervalues. In essence, all these circumstances should be avoided, resulting in ananonymised dataset. Therefore, anonymised data is not considered personaldata, so that, privacy and data protection laws would no longer apply.

Obtaining and Handling Informed Consent

Obtaining informed consent is common practice in health care. It is used forgetting patient’s permission before conducting a clinical interventions, disclos-ing personal information, or enrolling a person in a clinical trial. Regardlessthe case, an informed consent implies that the person can give consent basedon a clear appreciation and understanding of the facts. A valid informed con-

Page 49: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 29

sent values the person’s autonomy and the right to be treated ethically [121].Likewise, informed consent is also enshrined in privacy laws over the dec-

ades, because it becomes more clear that processing of personal data can alsonegatively impact one’s dignity. Data controllers can use informed consent as alawful basis for processing personal data. As mentioned earlier, the EU GDPRsets a high standard for consent, stressing that it ought to be a freely given,specific, informed and unambiguous indication of the data subject’s wishes[119]. Again, emphasising the person’s autonomy, but also stressing the needto inform. Nowadays, traditional “terms & conditions” for privacy fall shortin providing clear and understandable information for users. In addition, mak-ing users understand is difficult and today the consent seems to be written asmuch as to lawyers and policy-makers as it is to users [17].

In the context of MDCSs, data of entire communities are used to supportvarious health care providers and government agencies. Areas of public healthare exempted of obtaining consent of data subjects (Recital 54, [34]), but noteverything in MDCSs is public health, e.g. research. Data subjects should havethe opportunity to give their consent only to certain areas of research or partsof research projects (Recital 33, [34]). Besides, consent also empowers datasubjects, not only by raising awareness about privacy, but also allowing themto withdraw consent and stop the data processing – to some extent.

Engineers have proposed new interfaces to convey adequate informationto users in order to obtain informed consent, in areas such as identity man-agement [60] and participation in mobile-mediated research [114]. On theother hand, for handling the consent data structures are being designed to cap-ture Consent Receipts (similar to a customer receipt) in human- and machine-readable formats [65], as well as more sophisticated architectures enabling theprovision of user consent as a service [105].

3 Research QuestionThis thesis addresses the following research question.

How to design secure and privacy-preserving systems forMobile Health DataCollection Systems?

By design we mean the whole system design process of analysis, spe-cification, modeling, implementation, test, deployment and evaluationof a solution. Mobile systems bring various challenges associated tolimited computing capacities, vulnerabilities of wireless communicationchannels, and human-computer interaction. In the context of mHealthtechnologies, privacy and information security are paramount due tothe sensitivity of health information. Although there is no one-size-fits-all solution, this thesis helps to close the security and privacy gap inMDCSs for health surveys and surveillance. Altogether, the papers in-cluded in this thesis compose a serie of steps towards answering thisresearch question.

Page 50: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

30 Introductory Summary

Figure 9: Design Method main steps.

4 Research MethodThis research can be categorised as applied science: a discipline of sciencethat applies existing scientific knowledge to develop more (knowledge and)practical applications, such as technology and inventions. Technology is ofcourse supported by scientific knowledge, but also “other organised knowledgeto practical tasks by social systems involving people and machines” [24]. In orderto answer the research question, “How to design secure and privacy-preservingsystems for Mobile Health Data Collection Systems?”, the engineering DesignMethod [26, sec. 1.3.2] was adopted as predominant research strategy, as analternative approach to the Scientific Method [24]. In short, the Design Methodcomprises eight main steps, that cyclically iterate from one to another everytime assumptions should be redefined.

The Design Method starts with the (1) problem definition, basically ques-tioning: [Who] need(s) [what] because [why]?. What is the problem? Who hasthe problem? Why is it important to solve? So, rather than scientific curiosity,the design is actually driven by needs of society [26].

The second step is the (2) background research, i.e. the state-of-the-artthat includes scientific knowledge, but it also includes devices, components,market and economic conditions [26]. These steps correspond to the problemcharacterisation and observations in the scientific method.

After understanding the problem and existing solutions, the third step isto (3) specify requirements, i.e. the characteristics that your solution shouldmeet. Requirements specification is based on what is known from other exist-ing solutions, as well as by consulting users that need it. Again, this step wouldcorrespond to the formulation of a hypothesis, or proposing an explanation.

The fourth step is to (4) propose a solution. Researchers should brain-storm solutions within their group and choose the one that better satisfies theproject goals, meeting all (or most) requirements. The fifth step, the solutionis then further (5) detailed and modeled, by means of modeling languages,drawings, and so forth. This need of a model is important to predict the beha-

Page 51: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 31

vior of the solution before prototyping [26]. Similarly, the scientific methodneeds to define the experiment and its procedures.

Once researchers have a clear idea of what to do, they start the sixth step,to (6) build a prototype. In the scientific method this is the test of the hypo-thesis by experimentation. The seventh step is the (7) test and redesign ofthe prototype by multiple iterations. Similar to the evaluation and improve-ment steps in the scientific method. And at last, in both methods, researchersshould (8) communicate results, through technical reports, publications anddocumentation.

The Design Method was applied throughout the research with varyinglevels of completeness, as described below:

Paper I is a survey or review paper. A survey deals with the problem of iden-tification, analysis and synthesis of the state-of-the-art in and specificarea. In this case, to understand the current situation of mHealth initiat-ives in Brazil. The research is relevant to mHealth developers, academy,industry and government agencies that could benefit from mHealthsolutions in similar settings. By carrying out the survey we initiatedthe background research process, which resulted in a well-structuredreview of the state-of-the-art. This background research was performedthrough a “ad-hoc literature review”, searching various publicly availableelectronic documents, including scholar databases, general online liter-ature, and scientific venues specialized on health-oriented technology.The results were communicated by means of a scientific publication.(The remaining steps of the Design Method are not required for surveypapers.)

Paper II describes a security framework for MDCS, named SecourHealth.The initial problem referred to the design of a security framework for aMDCS that was to be implemented in the city of São Paulo (Brazil). Rel-evant publications were found during our ad hoc background research,from which solutions could be however improved and/or adapted toour settings. A new solution was proposed, modeled, prototyped andtested in order to demonstrate its feasibility. The results were commu-nicated by means of a scientific publication.

Paper III describes a georeferenced and secure MDCS, named GeoHealth.The problem refers to the design of a MDCS that could support pub-lic primary health care in the city of São Paulo. A specific backgroundresearch reveled that existing solution could not meet all desired require-ments (e.g. health data quality, security, georeferencing). A new MDCSwas therefore proposed, modeled, prototyped and tested in order todemonstrate its feasibility. The results were communicated by meansof a scientific publication.

Papers IV and V present a Privacy Impact Assessment (PIA) for GeoHealth.PIA as a methodology, supports a in-depth analysis of the problem ofprivacy in MDCSs. It helped to not only identify the privacy threats

Page 52: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

32 Introductory Summary

but also identify the technical and organisational controls to mitigateprivacy risks. This PIA for GeoHealth also partially contributes to thebackground research of the thesis, but it is also a proposed solutionfor reliasing privacy by design. The results are communicated in theform of scientific publications.

Paper VI outlines a preliminary ontology-based data sharing system (O-DSS)for medical information. The problem refers to a solution to trans-fer and share individuals’ health information in a privacy-preservingmanner, by exploiting ontology-based obfuscation and anonymisationfunctions. The specific background research shows that although thereexist viable solutions to be used, they should be linked to realistic usecases and adapted accordingly. An O-DSS was therefore proposed andexemplified with use cases, yet it should be still further developed. Par-tial results were communicated by means of a scientific publication.

Paper VII addresses the problem of electronic consent (e-Consent) forMDCSs. The background research reveals many approaches for ob-taining and handling informed consent, but they need to be adapted andintegrated to MDCSs. A user interface is therefore proposed, modeled,prototyped and tested to evaluate its usability; and a data structure isalso adopted for storing and managing consent. For the usability eval-uation of the proposed e-Consent tool, a mixed-methods approach ofcognitive walk-through, questionnaire and interviews with experts onthe field was used. Thus, enabling a qualitative evaluation on the prin-ciples of informed consent (i.e. information disclosure, comprehension,voluntariness and agreement). The results are communicated in a sci-entific publication.

5 ContributionsAs a result of the research, this thesis adds to the body of knowledge of securityand privacy for mHealth systems with three overarching contributions:

• Analysis of mHealth ecosystem in Brazil providing a comprehensivereview of existing initiatives and evidence about the lack of security inmost projects (Paper I).

• Sharing experience in developing and deploying a secure MDCS in dif-ferent communities and in large-scale research experiment (Paper III).

• Analyses and proposals of security and privacy-enhancing mechanismsfor MDCSs (Papers II-IV-V-VI-VII).

These overarching contributions comprise multiple partial contributionsmade in Papers I–VII, which are illustrated in Figure 10 and listed as follows.

1. Analysis of the Mobile Health Ecosystem in Brazil. An in-depth analysisabout mHealth initiatives in Brazil is provided (Paper I). Review papers

Page 53: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 33

Figure 10: Overarching contributions of the thesis.

help researchers to understand current front-runners, target users, typesof health applications, adopted devices, and security problems in exist-ing proposals. In addition, it helps to understand the impact of mHealthsolutions in primary care settings, potential nation-wide projects, busi-ness opportunities and potential research areas. And in particular, itevidences the security gap in mHealth, whereas many solutions (in Pa-per I) have shown little or no concern about protecting collected andprocessed data. Such results allow better understanding of the mHealthscenario, and most importantly, further motivate the main research ques-tion of the thesis.

2. Sharing Experience in Developing andDeploying MDCSs for Primary Care.GeoHealth is proposed as a secure, low-cost and high-impact MDCS(Paper III). In this research the experience of designing and deploying aMDCS is shared, showing that such systems can significantly improvethe efficiency and quality of the entire process of health surveys and sur-veillance in the primary care. Furthermore, GeoHealth stands out fromother systems for having strong security features, which were crucial fordeploying it in a large-scale. Designing and deploying GeoHealth, partlyanswers the research question, by describing the entire software develop-ment process of a MDCS and the integration of security features, as wellas enabling firsthand experience with many stakeholders (e.g. CHWs,health managers, developers, families).

3. Privacy Analysis of MDCS and Proposal of Security and Privacy-EnhancingMechanisms. In order to further understand the privacy issues in MDCSs,a PIA is carried out using the GeoHealth as a study case (Papers IV andV). The PIA comprises the characterisation of the system, data flows ofpersonal information, threat analysis and identification of controls. Arange of technical mechanisms for privacy and data protection are in-troduced, namely: (a) the SecourHealth, a delay-tolerant security frame-work designed specifically for MDCSs (Paper II); (b) the Ontology-

Page 54: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

34 Introductory Summary

based Data Sharing System (O-DSS) for enforcing anonymisation andobfuscation of health data (Paper VI); and, (c) an application for obtain-ing and handling informed consent within the context of CBPHC (Pa-per VII). These results, also partly answer the research question, towardfurther understanding the privacy and security issues and providingtechnical controls.

5.1 LimitationsIn spite of the contributions, we would like to remark some limitations of ourwork. Firstly, the research question presents a complex multi-faceted problem,and even though the problem can be seen as solved, some dimensions oraspects of it remain to be addressed. The vast majority of privacy aspectsrelevant to MDCSs were identified, but not all of them were addressed indetail. The focus of this thesis was put on technical privacy controls andthus non-technical privacy controls were not discussed in the thesis with thesame emphasis and rigour. In fact, the proposed controls, which we elaboratedin more detail, are essentially technical, addressing security, anonymisation,and consent management. Non-technical measures still to complement thesetechnical controls and need to be further detailed in future.

Secondly, regarding privacy law, this thesis considers mainly the EuropeanGDPR [34] and Brazilian LGPD [10]. Researchers and developers workingwith other MDCSs used in different countries should be attentive to the regu-lations and privacy laws that apply in their jurisdiction. In addition, althoughMDCSs share various functions, every country has it is particular programmefor primary health care, and stakeholders may change as well as the purposespecification for data processing. Thus, potentially adding new assumptionsand considerations to the privacy analysis.

Finally, among the proposals, the O-DSS was not prototyped and tested,owing that just its conceptual architecture has been presented. The e-Consentprototype should preferable be further developed and tested with health work-ers and data subjects, in order to evaluate its usability and effectiveness in thefield.

6 Related WorkThis section reviews the state-of-the-art associated to the thesis. Related liter-ature and existing solutions are discussed and (if possible) compared to thepublications listed in Section 7.

6.1 Mobile Health for LMICsAlong the years, various reports have been published on eHealth and mHealthinitiatives in LMICs. Some remarkable publications were made by interna-tional organisations, such as: United Nations Foundation [21], Earth Institute

Page 55: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 35

[74], and World Health Organization [86]. At the same time, a few nation-specific reviews were performed for countries such as India [38] and China[64]. Taken together, global and local efforts were consolidating “mHealth forLMICs” as an emerging field of research.

However, there was still no comprehensive surveys for Brazil, so thatthe mHealth ecosystem remained to be investigated. The work presentedin Paper I contributes with an in-depth analysis of the Brazilian initiativeson mHealth. As a result, the survey provides a critical analysis of mHealthprojects and stakeholders, and also sharing knowledge that was originally onlyavailable in Brazilian Portuguese.

Apart from that, researchers have made other valuable contributions in thepast years. A systematic review of mHealth projects provides a critical analysisabout what works (or not) and why in Africa [3]. And other authors alsomade a more general review of the state-of-the-art in mHealth [15]. Altogether,both are essential readings for researchers, policy makers, project managersand developers working with mHealth in LMICs.

6.2 Security for MDCSsAlthough much has been published about mHealth security, there are notmany papers that address MDCSs specifically. Requirements such as offline au-thentication and delay-tolerant transmission of data make MDCSs particularlychallenging. Classic approaches such as HTTP over TLS require persistent con-nectivity, and handshakes for establishing keys are often onerous for low-speed2G and 3G mobile phone networks. In addition, developers also tend to avoidsolutions that rely on public-keys and certificates, because of the additionalinfrastructure costs.

These requirements of MDCSs led researchers to propose tailored securitysolutions. Prominent contributions were made by a research group at BergenUniversity [41, 40, 69, 70]. In this series of works, the authors proposed asecurity framework for MDCSs covering: user and server authentication, se-cure data storage, and secure communication. Their solution was integrated inopen-source projects, such as openXdata7 and Open Data Kit (ODK)8. How-ever, the differences between their proposal and the SecourHealth framework(Paper II), are: (a) forward secrecy is added to stored data, and (b) the key man-agement for mutual authentication and data exchange is simpler. SecourHealthwas also implemented within the GeoHealth MDCS, deployed in large-scalein a pioneering project in the city of São Paulo.

6.3 Design and Deployment of MDCSsAs already mentioned, Brazil’s Department of Primary Care (DAB) controlsthe Health Information System for Primary Care (SISAB), aggregating datafrom all municipalities in the country. One of DAB’s strategy is the e-SUS

7http://www.openxdata.org/8https://opendatakit.org/

Page 56: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

36 Introductory Summary

Atenção Básica (e-SUS AB, Primary Care) as part of the SISAB. Today, allforms used in the Brazil’s CBPHC are specified by the DAB, both in paperand electronic formats, streamlining communication with SISAB.

However, various MDCSs were developed before the e-SUS AB became areality. Most systems were developed by researchers in projects like Colibri[91] and Borboleta [23, 30]. Such solutions were mainly focused on replacingpaper-based forms with electronic ones and small-scale prototypes, leading tothe following limitations: (1) they lack support for remote data communic-ation, obliging users to synchronise the collected data only when inside thehealth units; (2) they do not provide strong security mechanisms for protect-ing the data stored in the device; and (3) they have no feature for dealingwith families having no formal address. These are probably among the reasonswhy, to the best of our knowledge, they have never been broadly adopted inpractice.

The proposed MDCS (GeoHealth, Paper III) copes with these limitations,by providing: support for offline and online data collection; protection of datain-transit and at-rest; and georeferencing data (i.e. GPS for locating families).Moreover, GeoHealth was deployed and tested in a large-scale (total of 28,324families/96,061 people), proving to be a feasible and low-cost solution (approx.monthly cost of USD 0.04 per inhabitant). Now the DAB itself and otherprivate companies have released their MDCSs. At last corroborating previouswork on MDCSs conducted not only in Brazil but globally with positiveresults for CBPHC.

6.4 Privacy Impact Assessment for MDCSsAlthough MDCSs are essential for PHC, they are also inherently privacy-invasive technologies that allow surveillance of entire communities. If thegeneral public and health care providers cannot trust the system they will notuse it. Privacy incidents in relation to health data can have severe implicationsfor both, data subjects (e.g. discrimination, reputation damage) and healthprofessional (e.g. prosecution and dismissal). If organisations fail to addressthe privacy issues they might face lawsuits, financial penalties, public backlashand damage to their reputation. It is therefore critical to conduct PrivacyImpact Assessments (PIA) for such systems.

For this reason, a PIA was carried out using GeoHealth as main studycase (Paper IV and V). To the best of our knowledge, there is no relatedwork on PIAs for MDCSs yet. In fact, it is difficult to find PIA reports evenfor mHealth systems in general, possibly because such reports yield negativeresults, i.e. highlighting privacy issues in the system.

GeoHealth’s PIA is based on the PIA RFID framework [79]. The privacythreat analysis and identification of controls were derived from relevant literat-ure on mHealth privacy [61] as well as the original threats and controls fromthe PIA RFID [80, 81]. As main contributions, this PIA compiles a exhaust-ive list of privacy threats and controls for MDCSs. Furthermore, it offers aconcrete example for mHealth project managers and developers regarding the

Page 57: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 37

engineering of privacy in their systems.

6.5 Obfuscation and Anonymisation of Health DataThis thesis also investigates how to use ontologies for handling textual datavalues (e.g. diseases, medical procedures, drugs) to decrease semantic loss alongthe obfuscation and anonymisation process. Ontology-based obfuscation andanonymisation can be used in wide range of systems to enforce fine-grainedaccess control and data minimisation. However, in this thesis only use cases inhealth care were investigated (in Paper VI). MDCSs is one example, in whichhealth data used for secondary purposes can be obfuscated or anonymisedbefore sharing it (e.g. research and statistics).

The conceptual architecture for the Ontology-based Data Sharing System(O-DSS) was inspired by two main proposals: the ontology-based anonymisa-tion for electronic health records (EHRs) [72, 73]; and, the data obfuscationbased on user context [117]. As a result, we exemplified how to use obfuscationfunctions in the Peer Manager9 platform [50], defining them as obligationsin a privacy policy. In addition, this mechanism could be implemented inhealth systems (e.g. E/PHRs) leveraging from real medical ontologies (e.g.SNOMED-CT10 ).

6.6 Consent Management SystemsAs aforementioned, consent is critical for personal privacy, but obtaining trulyinformed consent is not trivial. Making users understand the nature of pro-cessing of personal data is difficult. Worse still, current practices in the in-dustry with ill-defined purposes and excessive collection of personal data justmake this task harder. Thus, asking the user’s informed consent before collec-tion helps to balance this problem of information asymmetry. To the best ofour knowledge, there are no “e-Consent” solutions for MDCSs nor for othermHealth systems in primary care or public health surveillance yet.

Considering this, we contribute with the design of an e-Consent mechan-ism for obtaining and handling consent, inspired in the Participant-CenteredConsent (PCC) toolkit and Kantara’s Consent Receipt specification. The PCCtoolkit defines the process and the interfaces for electronic informed consent(e-Consent), used for app-mediated research studies. [28, 114]. Apple’s Re-searchKit11 adopted this toolkit in 2015 and it has been tested in multipleprojects [29, 76]. Apart from obtaining consent, organisations also have theresponsibility of managing and archiving it. The burden of proof falls under

9The Peer Manager works as an user-centered identity management platform that keeps user’sinformation private. This framework was built upon the privacy policy language PPL (PrimeLifePolicy Language), with which every user can control his personal information by imposing accessand usage control restrictions. The Peer Manager is part of the SmartSociety research project(http://smart-society-project.eu/).

10Systematized Nomenclature of Medicine - Clinical Terms (SNOMED-CT).11ResearchKit is an open source framework introduced by Apple that allows researchers and

developers to create powerful apps for medical research. (http://researchkit.org/)

Page 58: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

38 Introductory Summary

the data controller. With that in mind, the Kantara initiative has proposed theConsent Receipt [65], as a data structure to capture the minimum viable datafor a consent. This receipt can be then stored in human- and machine-readableformats.

The proposed e-Consent tool was also evaluated in regards to its usabilityand adherence to principles of informed consent [36]. Namely, evaluatinguser perceptions on information disclosure, comprehension, voluntariness andagreement; in the pursue of obtaining truly informed and valid consent.

Nonetheless, more sophisticated systems have been proposed for handlingand enforcing consent (i.e. authorisation). Most notably, the MyData initiat-ive [105] and the ForgeRock’s Identity Platform12, both using User-ManagedAccess (UMA) [68], a protocol standard based on OAuth13. Authorisationproblems are however outside the scope of this thesis.

7 Summary of Appended PapersPaper I – Mobile Health in Emerging Countries: A Survey of ResearchInitiatives in Brazil

Mobile health consists basically in the application of mobile devices and com-munication capabilities for expanding the coverage and improving the effect-iveness of health care programs. This technology is particularly promisingfor developing countries, in which health authorities can take advantage ofthe flourishing mobile technology market to bring adequate health care to un-served or underserved communities. Specifically, mHealth can effectively im-prove basic care and help combating endemic diseases not so often encounteredin developed countries. This huge potential has lead to intensive research ef-forts not only in emerging countries and also around the world, creating anumber of innovative solutions. In this paper we provide a comprehensive sur-vey of mHealth research initiatives developed specifically for tackling healthchallenges in Brazil, an emerging country with a flourishing mobile market.This study identifies the main providers of solution, the areas of deployment,the health conditions that are focus of attention, the types of devices used, thetarget users, the (lack of) attention to data security issues, among others. Ourgoal is to discuss gaps, opportunities and tendencies observed in the country,giving some insight on the challenges faced by the mHealth technology insimilar scenarios.

Paper II – SecourHealth: A Delay-Tolerant Security Framework for Mo-bile Health Data Collection

Security is one of the most imperative requirements for the success of systemsthat deal with highly sensitive data, such as medical information. However,

12ForgeRock’s Identity Platform (https://www.forgerock.com/platform)13OAuth, is an open protocol to allow secure authorisation in a simple and standard method

from web, mobile and desktop applications. (https://oauth.net)

Page 59: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 39

many existing mobile health solutions focused on collecting patients’ dataat their homes that do not include security among their main requirements.Aiming to tackle this issue, this paper presents SecourHealth, a lightweightsecurity framework focused on highly sensitive data collection applications.SecourHealth provides many security services for both stored and in-transitdata, displaying interesting features such as tolerance to lack of connectivity(a common issue when promoting health in remote locations) and the abilityto protect data even if the device is lost/stolen or shared by different datacollection agents. Together with the system’s description and analysis, we alsoshow how SecourHealth can be integrated into a real data collection solutioncurrently deployed in the city of São Paulo, Brazil.

Paper III – Georeferenced and Secure Mobile Health System for LargeScale Data Collection in Primary Care

The Primary Care Information System (SIAB) concentrates basic health careinformation from all regions of Brazil, providing a rich database for health-related action planning. This data is collected by Family Health Teams (FHTs)in periodical visits to enrolled families in targeted areas. The fact that this pro-cedure relies on paper forms, however, degrades the quality of the informationprovided to health care authorities and slows down the process of decisionmaking. Aiming to overcome such issues, this article describes GeoHealth, adata gathering application that allows FHTs to use a 3G- and GPS-enabledsmartphone for collecting the families’ data. Besides quick data validation anddelivery, GeoHealth provides strong security features and allows more data tobe collected (e.g., the precise location of families having no formal address andextra fields not present in standardized paper forms). We discuss the system’sdeployment at 6 primary care units in the city of São Paulo, where a totalof 33.675 families are regularly surveyed. The results obtained show that theprocess is a low-cost and interesting approach for primary care data collectionand analysis.

Paper IV – mHealth: A Privacy Threat Analysis for Public Health Sur-veillance Systems

Community Health Workers (CHWs) have been using Mobile Health DataCollection Systems (MDCSs) for supporting the delivery of primary health-care and carrying out public health surveys, feeding national-level databaseswith families’ personal data. Such systems are used for public surveillance andto manage sensitive data (i.e., health data), so addressing the privacy issues iscrucial for successfully deploying MDCSs. In this paper we present a compre-hensive privacy threat analysis for MDCSs, discuss the privacy challenges andprovide recommendations that are specially useful to health managers and de-velopers. We ground our analysis on a large-scale MDCS used for primary care(GeoHealth) and a well-known Privacy Impact Assessment (PIA) methodo-logy. The threat analysis is based on a compilation of relevant privacy threatsfrom the literature as well as brain-storming sessions with privacy and security

Page 60: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

40 Introductory Summary

experts. Among the main findings, we observe that existing MDCSs do not em-ploy adequate controls for achieving transparency and interveinability. Thus,threatening fundamental privacy principles regarded as data quality, right toaccess and right to object. Furthermore, it is noticeable that although therehas been significant research to deal with data security issues, the attentionwith privacy in its multiple dimensions is prominently lacking.

Paper V – Mobile Health Systems for Community-Based Primary Care:Identifying Controls and Mitigating Privacy Threats

This research expands the PIA presented in Paper IV. It describes the entireprocess of the GeoHealth’s PIA, but emphasizing controls and mitigationstrategies to handle negative privacy impacts. Extensive documentation is alsoprovided in the form of appendices, in order to ensure the research reprodu-cibility. All the PIA steps were based on discussions among the researchers(privacy and security experts), and in particular, the identification of threatsand controls was based on literature reviews and working group meetingsamong the group. Moreover, we also received feedback from specialists inprimary care and software developers of other similar MDCSs in Brazil. TheGeoHealth PIA is based on 8 Privacy Principles and 26 Privacy Targets de-rived from the European General Data Protection Regulation (EU GDPR).Associated with that, 22 threat groups with a total of 97 sub-threats and 41recommended controls were identified. Among the main findings, we observethat privacy principles can be enhanced on existing MDCSs with controls formanaging consent, transparency, intervenability and data minimisation.

Paper VI – Ontology-based Obfuscation and Anonymisation for Privacy:A Case Study on Healthcare

Healthcare Information Systems typically fall into the group of systems inwhich the need of data sharing conflicts with the privacy. A myriad of thesesystems have to, however, constantly communicate among each other. Oneof the ways to address the dilemma between data sharing and privacy is touse data obfuscation by lowering data accuracy to guarantee patient’s privacywhile retaining its usefulness. Even though many obfuscation methods areable to handle numerical values, the obfuscation of non-numerical values (e.g.,textual information) is not as trivial, yet extremely important to preserve datautility along the process. In this paper, we preliminary investigate how toexploit ontologies to create obfuscation mechanism for releasing personal andelectronic health records (PHR and EHR) to selected audiences with differ-ent degrees of obfuscation. Data minimisation and access control should besupported to enforce different actors, e.g., doctors, nurses and managers, willget access to no more information than needed for their tasks. Besides that,ontology-based obfuscation can also be used for the particular case of dataanonymisation. In such case, the obfuscation has to comply with a specificcriteria to provide anonymity, so that the data set could be safely released.This research contributes to: state the problems in the area; review related

Page 61: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 41

privacy and data protection legal requirements; discuss ontology-based obfus-cation and anonymisation methods; and define relevant healthcare use cases.As a result, we present the early concept of our Ontology-based Data SharingService (O-DSS) that enforces patient’s privacy by means of obfuscation andanonymisation functions.

Paper VII – E-Consent for Data Privacy: Consent Management for Mo-bile Health Technologies in Public Health Surveys and Disease Surveil-lance

Community health workers in primary care programs increasingly use Mo-bile Health Data Collection Systems (MDCSs) to report their activities andconduct health surveys, replacing paper-based approaches. The mHealth sys-tems are inherently privacy invasive, thus informing individuals and obtainingtheir consent is important to protect their right to privacy. In this paper, weintroduce an e-Consent tool tailored for MDCSs. It is developed based on therequirement analysis of consent management for data privacy and built uponthe solutions of Participant-Centered Consent toolkit and Consent Receiptspecification. The e-Consent solution has been evaluated in a usability study.The study results show that the design is useful for informing individuals onthe nature of data processing, privacy and protection and allowing them tomake informed decisions.

8 Conclusions and Future WorkInitiatives of mHealth can truly revolutionise the delivery of health care inLMICs. Particularly in middle-income countries, researchers and governmentcan benefit from favorable economic conditions and reliable network infra-structure, unlocking mHealth to its full potential. This thesis contributed fordescribing the mHealth ecosystem in Brazil as well as tackling the privacy andsecurity problems, health care imperatives for achieving trust. Nation-wideMDCSs were the main target our research, considering that such systems havetremendous impact in Brazil’s PHC by empowering CHWs.

Notwithstanding, dealing with privacy as a broad legal concept requirescareful analysis of existing laws. Based on the privacy principles enshrined inlegal frameworks, it is required from practitioners to interpret juridical con-cepts into the system’s design. There is however a considerable knowledgegap in the mHealth community regarding how to actually engineer privacyinto the systems. Given that, this research offers concrete examples of privacy-preserving mechanisms to solve identified issues, and thus, helps project man-agers and developers with such translations from policy to engineering. As aresult, mHealth initiatives have a higher probability of being widely deployedand scaling-up.

Privacy engineering needs to be broadly adopted within the Mobile forDevelopment (M4D) community. Various documents indeed already stateprinciples for digital development that put privacy and security as critical pil-

Page 62: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

42 Introductory Summary

lars for sustainable solutions. Project leaders and practitioners, in consultationwith privacy engineers, should further examine the existing solutions and ad-apt them to their reality. Privacy issues are specially pressing in the context ofmHealth, because most of these systems in LMICs extend the health care tovulnerable parts of the population, in which the violations of privacy rightscan cause embarrassment and discrimination, at greater detriment of one’sdignity.

In summary, this thesis confirms previous research, supporting the claimthat MDCSs are simple and effective solutions for improving the deliveryof CBPHC. Moreover, it further analyses privacy and security in MDCSs,stressing the need and introducing new feasible solutions. Here we explainedhow to: (a) carry out a PIA for MDCSs, enabling stakeholders to surface allthe privacy-invasive characteristics of the systems, derive privacy principlesfrom relevant legal frameworks, identify privacy threats and propose con-trols to mitigate risks; (b) design security mechanisms for password-basedauthentication and key exchange, encrypted storage and communication, thatare sufficiently lightweight for low-budget resource settings; (c) design obfus-cation and anonymisation functions to enforce data minimisation, allowingfine-grained access control during disclosure of data for primary purposes aswell as complete de-identification when sharing data for secondary purposes;and (d) design consent management systems to obtain and handle individu-als’ informed consent, emphasising the need of making users understand thenature of data processing, and utilising simple data structures for capturingthe consent.

Security and privacy do not have to be complicated black-boxes, and be-sides, various controls are actually not even technical but organisational meas-ures for enhancing system’s transparency and openness. New regulations, suchas the EU GDPR and BR LGPD, provide us the state-of-the-art on privacylaw and should be recognised widely. It is an opportunity to call for Privacyfor Development (P4D) in the ICT4D and M4D communities, whereas therespect for one’s privacy is indispensable for real development.

In this regard, other research challenges on privacy were identified. Futurework on privacy for MDCSs concerns transparency and intervenability. Trans-parency of processing activities can be achieved by providing data subjectsadequate information about the systems, and making this information easyto access and to understand. A range of transparency-enhancing tools couldbe also be adopted, giving users insights on privacy policies, data processingactivities, disclosures to third-parties, tracking algorithms, or data controller’sreputation regarding privacy.

Additionally, intervenability refers to multiple privacy rights, such as theright to access, to object, to be forgotten, to correct, to withdraw consent andto data portability. Regarding the right to access, data subjects should haveaccess to their data, and to see what data was collected, how it is processed andto whom it is shared; and also providing electronic copies of the one’s data andsupporting data portability. On the right to object, data subjects should havethe ability to object to the processing of personal data, as well as ensuring the

Page 63: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 43

right to delete or block data; and including the right to be forgotten. Finally,when consent is used as a lawful basis for data processing , data subjects shouldalso have the right to withdraw consent, as easily as it was to give consent.

Transparency and intervenability are challenging because currentlyMDCSs are designed to be used only by health care providers. Adding ainterface for all the data subjects incurs in higher costs for developing andmaintaining the system. Nonetheless, patient’s access is something that isalready reality for more traditional electronic health records systems – at leastin high-income nations – and could be implemented in MDCSs in a similarfashion.

Finally, some broader implications for privacy in mHealth applicationsremain to be understood. Countries of all income levels have reported initi-atives and projects on mHealth during the past decades. The digitisation ofhealth care already entails serious privacy considerations, but for some newtechnologies it is still hard to predict the possible impacts of privacy and dataprotection. For instance, areas such as big data and artificial intelligence, inwhich research can greatly benefit public health and clinical practice, at theexpense of increasing people’s profiling, automated-decision making, and in-discriminate or excessive processing of personal data. Therefore, innovativemHealth systems that leverage from such new technologies should carefullyconsider the impacts on privacy, or for that matter respect to people’s rightsand freedoms.

References[1] Directive 95/46/EC of the European Parliament and of the Council of

24 October 1995 on the protection of individuals with regard to the pro-cessing of personal data and on the free movement of such data. OfficialJournal L No.281, 23 Nov 1995.

[2] Y. Anokwa, C. Hartung, W. Brunette, G. Borriello, and A. Lerer. Opensource data collection in the developing world. Computer, 42(10):97–99,Oct 2009. IEEE.

[3] Clara B. Aranda-Jan, Neo Mohutsiwa-Dibe, and Svetla Loukanova. Sys-tematic review on what works, what does not work and why of imple-mentation of mobile health (mhealth) projects in africa. BMC PublicHealth, 14(1):188, Feb 2014.

[4] UN General Assembly. Universal declaration of human rights. UNGeneral Assembly, 1948.

[5] David E. Bakken, Rupa Parameswaran, Douglas M. Blough, Andy A.Franz, and Ty J. Palmer. Data obfuscation: Anonymity and desensit-ization of usable data sets. IEEE Security & Privacy, (6):34–41, 2004.

Page 64: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

44 Introductory Summary

[6] David Banisar. National comprehensive data protection/privacy laws andbills 2018. https://ssrn.com/abstract=1951416, 2018. Principlesfor Digital Development, 10.2139/ssrn.1951416.

[7] Mihir Bellare, David Pointcheval, and Phillip Rogaway. Authenticatedkey exchange secure against dictionary attacks. In Advances in CryptologyEUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science,pages 139–155. Springer Berlin Heidelberg, 2000.

[8] Steven M. Bellovin and Michael Merritt. Encrypted key exchange:password-based protocols secure against dictionary attacks. In Researchin Security and Privacy, 1992. Proceedings., 1992 IEEE Computer SocietySymposium on, pages 72–84, 1992.

[9] Matt Bishop. Introduction to Computer Security. Addison-Wesley, 2005.

[10] BRASIL. Lei no 12.965, de 23 de abril de 2014. dispõe sobre a proteçãode dados pessoais e altera a lei no 12.965, de 23 de abril de 2014 (marcocivil da internet). Diário Oficial da União, (August), 2018.

[11] Bridge Laboratory. Laboratório Bridge. https://bridge.ufsc.br/. Archived at: http://www.webcitation.org/70ypwNeam Ac-cessed: 2018-07-17.

[12] V. Cavicchioli-Neto, H. F. Gagliardi, L. B. Furlan, D. B. Requena,A. E. M. Bousquat, I. T. Pisa, and D. Alves. Uma arquitetura computa-cional móvel para avaliar a qualidade do sistema público de saúde na regiãometropolitana de São Paulo. In X Congresso Brasileiro de Informática emSaúde, volume 10, pages p.1–6, 2006.

[13] Ann Cavoukian. Privacy by design – the 7 foundational principles (re-vised). https://www.ipc.on.ca/wp-content/uploads/Resources/7foundationalprinciples.pdf, 2011. Information and Privacy Com-missioner of Ontario.

[14] Ann Cavoukian. Operationalizing privacy by design: A guide to im-plementing strong privacy practices. http://www.cil.cnrs.fr/CIL/IMG/pdf/operationalizing-pbd-guide.pdf, 2012. Information andPrivacy Commissioner of Ontario.

[15] Arul Chib, Michelle Helena van Velthoven, and Josip Car. mhealthadoption in low-resource environments: A review of the use of mobilehealthcare in developing countries. Journal of Health Communication,20(1):4–34, 2015. PMID: 24673171.

[16] Victoria B. Chou, Ingrid K. Friberg, Mervyn Christian, Neff Walker,and Henry B. Perry. Expanding the population coverage of evidence–based interventions with community health workers to save the lives ofmothers and children: an analysis of potential global impact using the livessaved tool (list). Journal of global health, 7(2), 2017. Edinburgh UniversityGlobal Health Society.

Page 65: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 45

[17] Richard Chow. Privacy-by-design for the security practitioner.https://www.blackhat.com/docs/asia-14/materials/Chow/WP-Asia-14-Chow-Privacy-By-Design-For-The-Security-Practitioner.pdf, 2014. Black Hat Asia 2014.

[18] Roger Clarke. Privacy impact assessment: Its origins and development.Computer Law & Security Review, 25(2):123 – 135, 2009.

[19] CNIL. Privacy Impact Assessment (PIA) methodology.https://www.cnil.fr/sites/default/files/atoms/files/cnil-pia-1-en-methodology.pdf, Feb 2018. Commision Nationale del’Informatique et des Libertés.

[20] Malaria Consortium. Community-based primary healthcare: the key tounlocking health for all. Technical report, Malaria Consortium, 2017.

[21] Vital Wave Consulting. mhealth for development: The opportunity ofmobile technology for health care in the developing world. Technicalreport, United Nations Foundation – Vodafone Foundation Partnership,2009.

[22] Ted Cooper. Managing information privacy & security in healthcare:Privacy and security principles. http://s3.amazonaws.com/rdcms-himss/files/production/public/HIMSSorg/Content/files/CPRIToolkit/version6/v7/D02_Privacy_and_Security_Principles.pdf, 2007. Healthcare Information and ManagementSystems Society.

[23] Rafael Correia, Fábio Kon, and Rubens Kon. Borboleta: a mobile tele-health system for primary homecare. In ACM Symposium on AppliedComputing (SAC’08), pages 1343–1347, New York/NY, USA, 2008. ACM.

[24] Nigel Cross, John Naughton, and David Walker. Design method andscientific method. Design studies, 2(4):195–201, 1981.

[25] George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Ho-epman, Daniel Le Métayer, Rodica Tirtea, and Stefan Schiffner. Privacyand data protection by design - from policy to engineering. ComputingResearch Repository (CoRR), abs/1501.03726, 2015.

[26] George Ellwood Dieter and Linda C Schmidt. Engineering design,volume 3. McGraw-Hill New York, 2013.

[27] Whitfield Diffie, Paul C. Van Oorschot, and Michael J. Wiener. Au-thentication and authenticated key exchanges. Des. Codes Cryptography,2(2):107–125, June 1992.

[28] Megan Doerr, Christine Suver, and John Wilbanks. Developing atransparent, participant-navigated electronic informed consent for mobile-mediated research. 2016. Sage Bionetworks, 10.2139/ssrn.2769129.

Page 66: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

46 Introductory Summary

[29] Megan Doerr, Amy Maguire Truong, Brian M Bot, John Wilbanks,Christine Suver, and Lara M Mangravite. Formative evaluation of par-ticipant experience with mobile econsent in the app-mediated parkinsonmpower study: a mixed methods study. JMIR mHealth and uHealth, 5(2),2017.

[30] Gustavo Duarte, Rafael Correia, Pedro Leal, Helves Domingues, FábioKon, Rubens Kon, and Jo ao Eduardo Ferreira. Borboleta and SaguiSaúde– open source mobile telehealth for public home healthcare. In Proc. of the8th International eHealth, Telemedicine and Health ICT Forum (Med-e-Tel),2010.

[31] Ludwig Edelstein. The Hippocratic Oath, Text, Translation and Interpreta-tion. Baltimore, the Johns Hopkins Press, 1943.

[32] ePHealth. ePHealth Plataforma de Atenção Primária em Saúde Públicae Privada. http://www.ephealth.com.br/. Archived at: http://www.webcitation.org/70yqPTAOy Accessed: 2018-07-17.

[33] EU Commission. Data protection impact assessment tem-plate for smart grid and smart metering systems. https://ec.europa.eu/energy/sites/ener/files/documents/2014_dpia_smart_grids_forces.pdf, 2014. European Commission.

[34] European Commission. Regulation (EU) 2016/679 of the European Par-liament and of the Council of 27 April 2016 on the protection of naturalpersons with regard to the processing of personal data and on the freemovement of such data, and repealing Directive 95/46/EC (General DataProtection Regulation). Official Journal of the European Union, (April),2016.

[35] Simone Fischer-Hübner. IT-Security and Privacy: Design and Use ofPrivacy-Enhancing Security Mechanisms. Number no. 1958 in IT-securityand Privacy: Design and Use of Privacy-enhancing Security Mechanisms.Springer Berlin Heidelberg, 2001.

[36] Batya Friedman, Peyina Lin, and Jessica K Miller. Informed consent bydesign. Security and Usability, pages 503–530, 2005.

[37] João Frota, Mauro Oliveira, Luiz Andrade, Ivana Barreto, and CésarFilho. Integrating mobile devices in a Brazilian health governance frame-work. In Proceedings of International Conference on Advances of Informa-tion & Communication Technology in Health Care, pages 177–181, 2011.

[38] Krishnan Ganapathy and Aditi Ravindra. mhealth: A potential tool forhealth care delivery in India. Making the eHealth Connection, 2008.

[39] Samson Gejibo, Federico Mancini, Khalid A. Mughal, Remi Valvik, andJørn Klungsøyr. Challenges in implementing an end-to-end secure pro-tocol for java me-based mobile data collection in low-budget settings. In

Page 67: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 47

Gilles Barthe, Benjamin Livshits, and Riccardo Scandariato, editors, Engin-eering Secure Software and Systems, pages 38–45, Berlin, Heidelberg, 2012.Springer Berlin Heidelberg.

[40] Samson Hussien Gejibo. Towards a Secure Framework for mHealth. ACase Study in Mobile Data Collection Systems. PhD thesis, The Universityof Bergen, 2015.

[41] Samson Hussien Gejibo, Federico Mancini, Khalid A. Mughal, RemiA. B. Valvik, and Jørn Klungsøyr. Secure data storage for mobile datacollection systems. In Proceedings of the International Conference on Man-agement of Emergent Digital EcoSystems, MEDES ’12, pages 131–144, NewYork, NY, USA, 2012. ACM.

[42] R.R. German, L.M. Lee, J.M. Horan, R.L. Milstein, CA Pertowski,MN Waller, and Guidelines Working Group Centers for Disease Con-trol and Prevention (CDC). Updated guidelines for evaluating publichealth surveillance systems: recommendations from the guidelines work-ing group. MMWR. Recommendations and reports : Morbidity andmortalityweekly report. Recommendations and reports, 50(RR-13):1–35; quiz CE1–7,July 2001.

[43] Stephen Gillam. Is the declaration of alma ata still relevant to primaryhealth care? BMJ, 336(7643):536–538, 2008. BMJ Publishing Group Ltd.

[44] Grameem Foundation. Mobile technology for community health inGhana. https://www.grameenfoundation.org/sites/default/files/MOTECH-Early-Lessons-Learned-March-2011-FINAL.pdf,2012. Accessed: 2018-11-30.

[45] Graham Greenleaf. Global data privacy laws: 89 countries, and acceler-ating. Privacy Laws & Business International Report, (115), 2012.

[46] GSMA. The mobile economy 2018. https://www.gsma.com/mobileeconomy/wp-content/uploads/2018/05/The-Mobile-Economy-2018.pdf, 2018. [Online; accessed 17 September 2018].

[47] GSMA. Mobile for development utilities annual report achiev-ing SDGs 6 and 7: The promise and impact of mobile techno-logy. https://www.gsma.com/mobilefordevelopment/wp-content/uploads/2018/01/Achieving-SDGs-6-and-7-The-promise-and-impact-of-mobile-technology.pdf, 2018. [On-line; accessed 17 September 2018].

[48] Seda Gürses. Can you engineer privacy? Commun. ACM, 57(8):20–23,August 2014.

[49] Seda Gürses and Jose M. del Alamo. Privacy engineering: Shaping anemerging field of research and practice. IEEE Security Privacy, 14(2):40–46,Mar 2016.

Page 68: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

48 Introductory Summary

[50] Mark Hartswood,Marina Jirotka, Ronald Chenu-Abente, Alethia Hume,Fausto Giunchiglia, Leonardo A. Martucci, and Simone Fischer-Hübner.Privacy for peer profiling in collective adaptive systems. In Jan Camenisch,Simone Fischer-Hübner, and Marit Hansen, editors, Privacy and IdentityManagement for the Future Internet in the Age of Globalisation, volume 457of IFIP Advances in Information and Communication Technology, pages237–252. Springer International Publishing, 2015.

[51] Ronald Hes and John Borking. Privacy-enhancing technologies: Thepath to anonymity revised edition. Technical report, Registratiekamer,2000. Achtergrondstudies en Verkenningen.

[52] Hibah Hussain. Dialing down risks: Mobile privacy and informationsecurity in global development projects. Technical report, New AmericaFoundation, 2013. [Online; accessed 10-August-2016].

[53] ICO. Conducting privacy impact assessments code of prac-tice. https://iapp.org/media/pdf/resource_center/ICO_pia-code-of-practice.pdf, 2014. Information Commissioner’s Office(ICO).

[54] ISO/IEC 29134:2017 Information technology – Security techniques –Guidelines for privacy impact assessment. Standard, International Organ-ization for Standardization, Geneva, CH, June 2017.

[55] Robert S.H. Istepanian, Emil Jovanov, and Yuan-ting Zhang. Guesteditorial introduction to the special section on m-health: Beyond seamlessmobility and global wireless health-care connectivity. In IEEE Transactionson Information Technology in Biomedicine, volume 8, pages 405–414, 2004.

[56] Leonardo H. Iwaya, Simone Fischer-Hübner, Rose-Mharie Åhlfeldt, andLeonardo A. Martucci. mhealth: A privacy threat analysis for publichealth surveillance systems. In 2018 IEEE 31st International Symposiumon Computer-Based Medical Systems (CBMS), pages 42–47, June 2018.

[57] Jaranit Kaewkungwal, Pratap Singhasivanon, Amnat Khamsiriwatchara,Surasak Sawang, Pongthep Meankaew, and Apisit Wechsart. Applicationof smart phone in “better border healthcare program”: A module formother and child care. BMC Medical Informatics and Decision Making,10(1):1–12, 2010.

[58] James G. Kahn, Joshua S. Yang, and James S. Kahn. ’mobile’ health needsand opportunities in developing countries. Health Affairs, 29(2):252–258,2010.

[59] Karin Källander, James K Tibenderana, Onome J Akpogheneta, Daniel LStrachan, Zelee Hill, Augustinus H A ten Asbroek, Lesong Conteh,Betty R Kirkwood, and Sylvia R Meek. Mobile health (mhealth) ap-proaches and lessons for increased performance and retention of com-munity health workers in low- and middle-income countries: A review. JMed Internet Res, 15(1):e17, Jan 2013.

Page 69: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 49

[60] Farzaneh Karegar, Nina Gerber, Melanie Volkamer, and Simone Fischer-Hübner. Helping john to make informed decisions on using social login.In Proceedings of the 33rd Annual ACM Symposium on Applied Computing,SAC ’18, pages 1165–1174, New York, NY, USA, 2018. ACM.

[61] David Kotz, Carl A. Gunter, Santosh Kumar, and Jonathan P. Weiner.Privacy and security in mobile health: A research agenda. Computer,49(6):22–30, June 2016. IEEE.

[62] Santosh Kumar,Wendy J. Nilsen, Amy Abernethy, Audie Atienza, KevinPatrick,Misha Pavel,William T. Riley, Albert Shar, Bonnie Spring, DonnaSpruijt-Metz, Donald Hedeker, Vasant Honavar, Richard Kravitz, R. CraigLefebvre, David C. Mohr, Susan A. Murphy, Charlene Quinn, VladimirShusterman, and Dallas Swendeman. Mobile health technology evalu-ation: The mhealth evidence workshop. American Journal of PreventiveMedicine, 45(2):228 – 236, 2013.

[63] Amnesty E. LeFevre, Diwakar Mohan, David Hutchful, Larissa Jennings,Garrett Mehl, Alain Labrique, Karen Romano, and Anitha Moorthy. Mo-bile technology for community health in Ghana: what happens when tech-nical functionality threatens the effectiveness of digital health programs?BMC Medical Informatics and Decision Making, 17(1):27, Mar 2017.

[64] Ian Leslie, Simon Sherrington, Danny Dicks, Nick Gray, and Tao-TaoChang. Mobile communications for medical care - a study of currentand future health care and health promotion applications, and their usein china and elsewhere. Technical report, University of Cambridge andChina Mobile, 2011.

[65] Mark Lizar and David Turner. Consent receipt specification.https://kantarainitiative.org/file-downloads/consent-receipt-specification-v1-1-0/, 2018. Kantara Initiative.

[66] James Macinko and Matthew J. Harris. Brazil’s family health strategy– delivering community-based primary care in a universal health sys-tem. New England Journal of Medicine, 372(23):2177–2181, 2015. PMID:26039598.

[67] Magpi. Mobile - advanced mobile data, message, and visualiza-tion. https://home.magpi.com, 2016. Archived at: http://www.webcitation.org/710KiVoWH Accessed: 2018-07-18.

[68] Eve Maler. Extending the power of consent with user-managed access:A standard architecture for asynchronous, centralizable, internet-scalableconsent. In Security and Privacy Workshops (SPW), 2015 IEEE, pages 175–179. IEEE, 2015.

[69] Federico Mancini, Samson Gejibo, Khalid A. Mughal, Remi A.B. Valvik,and Jørn Klungsøyr. Secure mobile data collection systems for low-budget

Page 70: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

50 Introductory Summary

settings. In Availability, Reliability and Security (ARES), 2012 SeventhInternational Conference on, pages 196–205, Aug 2012. IEEE.

[70] Federico Mancini, Khalid A. Mughal, Samson H. Gejibo, and Jørn Klung-søyr. Adding security to mobile data collection. In e-Health NetworkingApplications and Services (Healthcom), 2011 13th IEEE International Con-ference on, pages 86–89, June 2011.

[71] Eugenio Mantovani, Joan Antokol, Marian Hoekstra, Sjaak Nouwt,Nico Schutte, Peteris Zilgalvis, J.-P. Castro Gómez-Valadés, and ClaudiaPrettner. Towards a Code of Conduct on Privacy for mHealth to FosterTrust Amongst Users of Mobile Health Applications, pages 81–106. SpringerInternational Publishing, Cham, 2017.

[72] Sergio Martínez, David Sánchez, and Aïda Valls. Ontology-based an-onymization of categorical values. In Proc. of the 7t ℎ Int. Conf. on Mod-eling Decisions for Artificial Intelligence (MDAI), volume 6408 of LNCS,pages 243–254. Springer, Oct. 2010.

[73] Sergio Martínez, David Sánchez, and Aïda Valls. A semantic frameworkto protect the privacy of electronic health records with non-numericalattributes. J. of Biomedical Informatics, 46(2):294–303, 2013.

[74] Patricia Mechael, Hima Batavia, Nadi Kaonga, Sarah Searle, Ada Kwan,Adina Goldberger, Lin Fu, and James Ossman. Barriers and gaps affect-ing mHealth in low and middle income countries: A policy white paper.Technical report, Center for Global Health and Economic DevelopmentEarth Institute, Columbia University, 2010.

[75] mHA. Patient privacy in a mobile world: A framework to addressprivacy law issues in mobile health. https://www.mhealthknowledge.org/sites/default/files/10_trustlaw_connect_report.pdf,2013.

[76] Sarah Moore, Anne-Marie Tassé, Adrian Thorogood, Ingrid Winship,Ma’n Zawati, and Megan Doerr. Consent processes for mobile app medi-ated research: Systematic review. JMIR Mhealth Uhealth, 5(8):e126, Aug2017.

[77] Deb Niemeier, Harry Gombachika, and Rebecca Richards-Kortum.How to transform the practice of engineering to meet global health needs.Science, 345(6202):1287–1290, 2014.

[78] OAIC. Guide to undertaking a privacy impact assess-ment. https://www.oaic.gov.au/resources/agencies-and-organisations/guides/guide-to-undertaking-privacy-impact-assessments.pdf, May 2014. Office of the AustralianInformation Commissioner.

Page 71: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 51

[79] Marie Caroline Oetzel and Sarah Spiekermann. A systematic methodo-logy for privacy impact assessments: a design science approach. EuropeanJournal of Information Systems, 23(2):126–150, Mar 2014. Palgrave Mac-millan UK.

[80] Marie Caroline Oetzel, Sarah Spiekermann, Ingrid Grüning, Har-ald Kelter, and Sabine Mull. Privacy impact assessment guideline.https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/ElekAusweise/PIA/Privacy_Impact_Assessment_Guideline_Kurzfasssung.pdf?__blob=publicationFile&v=1, 2011. Bundes-amt für Sicherheit in der Informationstechnik (BSI).

[81] Marie Caroline Oetzel, Sarah Spiekermann, Ingrid Grüning,Harald Kelter, and Sabine Mull. Privacy impact assessmentguideline for RFID applications. https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/ElekAusweise/PIA/Privacy_Impact_Assessment_Guideline_Langfassung.pdf;jsessionid=CD45C6C723F80F2499954EEB5DCD40BD.1_cid341?__blob=publicationFile&v=1, 2011. Bundesamt für Sicherheit in derInformationstechnik (BSI).

[82] OpenSRP. Open Smart Register Platform. http://smartregister.org/. Archived at: https://www.webcitation.org/70ymzVIFB Ac-cessed: 2018-07-17.

[83] World Health Organization. The declaration of Alma Ata. http://www.who.int/publications/almaata_declaration_en.pdf, 1978. Inter-national Conference on Primary Health Care. Alma Ata.

[84] World Health Organization. Community health workers: Whatdo we know about them? the state of the evidence on programmes,activities, costs and impact on health outcomes of using communityhealth workers. http://www.who.int/hrh/documents/community_health_workers_brief.pdf, 2007. Evidence and Information forPolicy, Department of Human Resources for Health.

[85] World Health Organization. The world health report 2008: primaryhealth care (now more than ever). Technical report, World Health Organ-ization, 2008.

[86] World Health Organization. mhealth: new horizons for health throughmobile technologies: second global survey on ehealth. Technical report,The World Health Organization (WHO), 2011.

[87] World Health Organization. Public health surveillance. http://www.who.int/topics/public_health_surveillance/en/, 2018. Online;accessed 01 September 2018.

Page 72: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

52 Introductory Summary

[88] Colin Percival and Simon Josefsson. The scrypt password-based keyderivation function. Technical report, Internet Engineering Task Force,2016.

[89] Henry B. Perry, Bahie M. Rassekh, Sundeep Gupta, Jess Wilhelm, andPaul A. Freeman. Comprehensive review of the evidence regarding theeffectiveness of community–based primary health care in improving ma-ternal, neonatal and child health: 1. rationale, methods and database de-scription. Journal of global health, 7(1), 2017. Edinburgh University GlobalHealth Society.

[90] Andreas Pfitzmann and Marit Hansen. A terminology for talk-ing about privacy by data minimization: Anonymity, unlinkabil-ity, undetectability, unobservability, pseudonymity, and identity man-agement. http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_-v0.34.pdf, August 2010. v0.34.

[91] Toni R.G. Pimentel, Eduardo M.P. da Silva, and A.F. da Conceiçao.Projeto colibri: uma plataforma de coleta e processamento de dados parao programa de saude da famılia (psf). In Workshop de Informática Médica,vol. 30, pages 1471–1474, 2009.

[92] David Pointcheval and Sebastien Zimmer. Multi-factor authenticatedkey exchange. In StevenM. Bellovin, Rosario Gennaro, Angelos Kero-mytis, and Moti Yung, editors,Applied Cryptography and Network Security,volume 5037 of Lecture Notes in Computer Science, pages 277–295. SpringerBerlin Heidelberg, 2008.

[93] SRP Project. What is SRP? http://srp.stanford.edu/whatisit.html, 2013.The Stanford SRP Homepage. Web. 09 Jul. 2013.

[94] Niels Provos and David Mazieres. A future-adaptable password scheme.In USENIX Annual Technical Conference, FREENIX Track, pages 81–91,1999.

[95] Charles D. Raab. Privacy, democracy, information. In Brian D. Loader,editor, The Governance of Cyberspace: Politics, Technology and Global Re-structuring, chapter 10, pages 155–174. Routledge, London, 1997.

[96] Tom Roeder. Something you know, have, or are. http://www.cs.cornell.edu/courses/cs513/2005fa/nnlauthpeople.html, 2013.[Online; accessed 29-November-2019].

[97] Walisete de Almeida Godinho Rosa and Renata Curi Labate. Programasaúde da família: a construção de um novo modelo de assistência. RevistaLatino-Americana de Enfermagem, 13:1027 – 1034, 12 2005.

[98] João H.G. Sá, Marina S. Rebelo, Alexandra Brentani, Sandra J.F.E. Grisi,Leonardo H. Iwaya, Marcos A. Simplício Jr., Tereza C.M.B. Carvalho,and Marco A. Gutierrez. Georeferenced and secure mobile health system

Page 73: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systemsin the Primary Care 53

for large scale data collection in primary care. International Journal ofMedical Informatics, 94:91 – 99, 2016.

[99] Bruce Schneier. Applied cryptography: protocols, algorithms, and sourcecode in C. Wiley, 1996.

[100] Christopher J. Seebregts, Merrick Zwarenstein, Catherine Mathews,Lara Fairall, Alan J. Flisher, Clive Seebregts, Wanjiru Mukoma, and Knut-Inge Klepp. Handheld computers for survey and trial data collectionin resource-poor settings: Development and evaluation of PDACT, apalm™pilot interviewing system. International Journal of Medical Inform-atics, 78(11):721 – 731, 2009.

[101] Deo Shao. A proposal of a mobile health data collection and reportingsystem for the developing world. Master’s thesis, Malmö högskola/Teknikoch samhälle, 2012.

[102] Kizito Shirima, Oscar Mukasa, Joanna Armstrong Schellenberg,Fatuma Manzi, Davis John, Adiel Mushi, Mwifadhi Mrisho, Marcel Tan-ner, Hassan Mshinda, and David Schellenberg. The use of personal digitalassistants for data entry at the point of collection in a large householdsurvey in southern tanzania. Emerging Themes in Epidemiology, 4(1):1–8,2007.

[103] Prabhjot Singh and Sarah Sullivan. One million community healthworkers: technical task force report. Technical report, Earth Institute atColumbia University, 2011.

[104] Daniel J. Solove. Understanding Privacy. Number v. 10 in Understand-ing privacy. Harvard University Press, 2008.

[105] Xiang Su, Jarkko Hyysalo, Mika Rautiainen, Jukka Riekki, JaakkoSauvola, Altti Ilari Maarala, Harri Hirvonsalo, Pingjiang Li, and HarriHonko. Privacy as a service: Protecting the individual in healthcare dataprocessing. Computer, 49(11):49–59, 2016.

[106] European Data Protection Supervisor. 32nd internationalconference of data protection and privacy commissioners – res-olution on privacy by design ( Jerusalem, Israel 27-29 october).https://edps.europa.eu/sites/edp/files/publication/10-10-27_jerusalem_resolutionon_privacybydesign_en.pdf, 2010.

[107] SysVale Softgroup. eSUS+ Cidade Saudável. http://sysvale.com/. Archived at: http://www.webcitation.org/70yqAPQSk Ac-cessed: 2018-07-17.

[108] M. Tomlinson, W. Solomon, Y. Singh, T. Doherty, M. Chopra,P. Ijumba, A.C. Tsai, and D. Jackson. The use of mobile phones as adata collection tool: A report from a household survey in south africa.BMC Medical Informatics and Decision Making, 9(1):51, 2009.

Page 74: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

54

[109] G.W. van Blarkom, J.J. Borking, and Olk J.G.E. Handbook of pri-vacy and privacy-enhancing technologies: The case of intelligent softwareagents. Technical report, Privacy Incorporated Software Agent (PISA),2003. College bescherming persoonsgegevens.

[110] Ana Luiza D’ávila Viana and Mario Roberto Dal Poz. A reforma dosistema de saúde no Brasil e o Programa de Saúde da Família. Physis:Revista de Saúde Coletiva, 8:11 – 48, 12 1998.

[111] Hester Wadge, Yasser Bhatti, Alexander Carter, Matthew Harris, GregParston, and Ara Darzi. Brazil’s family health strategy: Using communityhealth workers to provide primary care. Technical report, Common-wealth Fund pub. 1914, 2016.

[112] Mark Weiser. The computer for the 21st century. Mobile Computingand Communications Review, 3(3):3–11, 1999.

[113] Alan Furman Westin. Privacy and Freedom. Atheneum, 1967.

[114] John Wilbanks. Design issues in e-consent. The Journal of Law, Medicine& Ethics, 46(1):110–118, 2018. SAGE Journals.

[115] Cassandra Willyard. Electronic records pose dilemma in developingcountries. Nature Medicine, 16(249), 2010.

[116] Charles-Edward Amory Winslow. The untilled fields of public health.Science, pages 23–33, 1920.

[117] Ryan Wishart, Karen Henricksen, and Jadwiga Indulska. Context ob-fuscation for privacy via ontological descriptions. In Location-and Context-Awareness, pages 276–288. Springer, 2005.

[118] WP29. Opinion 05/2014 on anonymisation techniques.http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp216\_en.pdf, April 2014. The Article 29 Working Party.

[119] WP29. Guidelines on consent under regulation. http://ec.europa.eu/newsroom/article29/document.cfm?action=display\&doc\_id=51030, November 2017. The Article 29 WorkingParty.

[120] David Wright. The state of the art in privacy impact assessment. Com-puter Law & Security Review, 28(1):54–61, 2012. Elsevier.

[121] William C. Wu and Robert A. Pearlman. Consent in medical de-cision making. Journal of General Internal Medicine, 3(1):9–14, Jan 1988.Springer.

Page 75: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

55

[122] Ping Yu, Maximilian de Courten, Elaine Pan, Gauden Galea, and JanPryor. The development and evaluation of a pda-based method for publichealth surveillance data collection in developing countries. InternationalJournal of Medical Informatics, 78(8):532 – 542, 2009. Elsevier.

Page 76: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systems in the Primary Care

Leonardo Horn Iwaya

Leonardo Horn Iw

aya | Engineering Privacy for M

obile Health D

ata Collection System

s in the Primary C

are | 2019:1

Engineering Privacy for Mobile Health Data Collection Systems in the Primary Care

Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning of Community-Based Primary Health Care (CBPHC). In particular, Mobile Health Data Collection Systems (MDCSs) are used by CHWs to collect health-related data about the families that they treat, replacing paper-based approaches. Although MDCSs improve the efficiency of CBPHC, existing solutions lack adequate privacy and security safeguards.

To bridge this knowledge gap between the research areas of mHealth and privacy, we start by asking: How to design secure and privacy-preserving systems for Mobile Health Data Collection Systems? To answer this question, an engineering approach is chosen to analyse and design privacy and security mechanisms for MDCSs.

Among the main contributions, a comprehensive literature review of the Brazilian mHealth ecosystem is presented. On the privacy engineering side, the contributions are a Privacy Impact Assessment (PIA) for the GeoHealth MDCS and three mechanisms: SecourHealth, a security framework for data encryption and user authentication; an Ontology-based Data Sharing System (O-DSS) that provides obfuscation and anonymisation functions; and, an electronic consent (e-Consent) tool for obtaining and handling informed consent.

DOCTORAL THESIS | Karlstad University Studies | 2019:1

Faculty of Health, Science and Technology

Computer Science

DOCTORAL THESIS | Karlstad University Studies | 2019:1

ISSN 1403-8099

ISBN 978-91-7063-995-1 (pdf)

ISBN 978-91-7063-900-5 (Print)

Page 77: Engineering Privacy for Mobile Health Data Collection ...1266242/...Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning

Engineering Privacy for Mobile Health Data Collection Systems in the Primary CareMobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning of Community- Based Primary Health Care (CBPHC). In particular, Mobile Health Data Collection Systems (MDCSs) are used by CHWs to collect health-related data about the families that they treat, replacing paper-based approaches. Although MDCSs improve the efficiency of CBPHC, existing solutions lack adequate privacy and security safeguards.

To bridge this knowledge gap between the research areas of mHealth and privacy, we start by asking: How to design secure and privacy-pre- serving systems for Mobile Health Data Collection Systems? To answer this question, an engineering approach is chosen to analyse and design privacy and security mechanisms for MDCSs.

Among the main contributions, a comprehensive literature review of the Brazilian mHealth ecosystem is presented. On the privacy engineering side, the contributions are a Privacy Impact Assessment (PIA) for the GeoHealth MDCS and three mechanisms: SecourHealth, a security framework for data encryption and user authentication; an Ontology- based Data Sharing System (O-DSS) that provides obfuscation and anonymisation functions; and, an electronic consent (e-Consent) tool for obtaining and handling informed consent.

Engineering Privacy for Mobile Health Data Collection System

s in the Primary Care

Leonardo horn Iwaya

Engineering Privacy for Mobile Health Data Collection Systems in the Primary Care

Leonardo HORN Iwaya

Print & layout University Printing Office, Karlstad 2018

Doctoral Thesis Karlstad University Studies, 2019:1ISBN 978-91-7063-900-5 (Print)ISBN 978-91-7063-995-1 (pdf)ISSN 1403-8099