| Literature DB >> 29046271 |
Jannis Müthing1, Thomas Jäschke1,2, Christoph M Friedrich1.
Abstract
BACKGROUND: Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps.Entities:
Keywords: computer security; confidentiality; data security; health information technology; mobile apps; mobile health
Year: 2017 PMID: 29046271 PMCID: PMC5666225 DOI: 10.2196/mhealth.7791
Source DB: PubMed Journal: JMIR Mhealth Uhealth ISSN: 2291-5222 Impact factor: 4.773
Figure 1The Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS) protocol stacks. The topmost layers (transport layer security [TLS] and HTTP itself) are of most interest. The HTTP protocol contains any relevant data sent to or received from the server. Examples for HTTP data are written in blue. These data are readable by any third party when TLS is not used. When HTTP is used on top of TLS, these data are encrypted. Additionally, TLS ensures the integrity of the messages exchanged and the authenticity of the server and in some cases the clients.
Figure 2BProxy example results output. The columns inform the user about observations made by the proxy: the Transport Layer Security (TLS) version used (TLS version), whether certificate pinning was used (Cert pinning used), whether cookies were observed (Session hijacking), whether authentication tokens were visible (Leaks credentials), if OpenAuthorization (OAuth) tokens were observed (OAuth), the server location for the domain visited (Location), the results for the certificate validation tests (SSL Test 1-4), if usernames or passwords were observed (Username/Password leak). More Information on BProxy’s output can be found on the Web.
Assigned categories of the tested apps.
| Assigned category | Android, n | iOS, n | Total, n |
| Pregnancy or fertility related | 8 | 13 | 21 |
| Drug information | 2 | 1 | 3 |
| Reference or learning | 5 | 3 | 8 |
| Consulting or communication | 5 | 6 | 11 |
| Health and fitness | 3 | 3 | 6 |
| Others | 2 | 2 | 4 |
Summarized table of results for Android and iOS apps.
| Security issues | Android, n | iOS, n | Total, n | |
| 1. | Servers outside European Union countries | 7 | 8 | 15 |
| 2. | No transport layer security for connections | 7 | 12 | 19 |
| 3. | Cookies or secure tokens send over insecure connections | 4 | 7 | 11 |
| 4. | Integrity of content displayed in the app compromised | 8 | 13 | 21 |
| 5. | Username and password sent over insecure connections | 1 | 2 | 3 |
| 6. | Confidentiality between user and app provider compromised | 3 | 5 | 8 |
| 7. | Certificate validation issues present | 1 | 1 | 2 |