A Trust Management System for the Nigerian Cyber-health Community

Full Text (PDF, 887KB), PP.9-20

Views: 0 Downloads: 0


Ifeoluwani Jenyo 1 Elizabeth A. Amusan 2,* Justice O. Emuoyibofarhe 3

1. Computer Sciences Department, Adeleke University, Ede, Nigeria

2. Cyber Security Science Department, Ladoke Akintola University of Technology, Ogbomoso

3. Faculty of Computing and Informatics, Ladoke Akintola University of Technology, Ogbomoso

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2023.01.02

Received: 5 Jul. 2022 / Revised: 21 Sep. 2022 / Accepted: 3 Nov. 2022 / Published: 8 Feb. 2023

Index Terms

Cyber-health, Nigeria, Privacy, Reputation, Security, Trust Management


Trust is a basic requirement for the acceptance and adoption of new services related to health care, and therefore, vital in ensuring that the integrity of shared patient information among multi-care providers is preserved and that no one has tampered with it. The cyber-health community in Nigeria is in its infant stage with health care systems and services being mostly fragmented, disjointed, and heterogeneous with strong local autonomy and distributed among several healthcare givers platforms. There is the need for a trust management structure for guaranteed privacy and confidentiality to mitigate vulnerabilities to privacy thefts. In this paper, we developed an efficient Trust Management System that hybridized Real-Time Integrity Check (RTIC) and Dynamic Trust Negotiation (DTN) premised on the Confidentiality, Integrity, and Availability (CIA) model of information security. This was achieved through the design and implementation of an indigenous and generic architectural framework and model for a secured Trust Management System with the use of the advanced encryption standard (AES-256) algorithm for securing health records during transmission. The developed system achieved Reliabity score, Accuracy and Availability of 0.97, 91.30% and 96.52% respectively.

Cite This Paper

Ifeoluwani Jenyo, Elizabeth A. Amusan, Justice O. Emuoyibofarhe, "A Trust Management System for the Nigerian Cyber-health Community", International Journal of Information Technology and Computer Science(IJITCS), Vol.15, No.1, pp.9-20, 2023. DOI:10.5815/ijitcs.2023.01.02


[1]Ito Y. (2014): Cyber Green: Improving Cyber Health through Measurement and Mitigation. Japan Computer Emergency Response Team (JPCERT). Available at: https://www.jpcert.or.jp/research/GreenPresentation-20141117_en.pdf.
[2]Clark, T. (2007). Adopting Healthcare Informatics and Technologies. American Journal of Health System Pharmacy, 64.
[3]Stella, O. and Herselman M. E. (2008). E-health in Rural Areas: case of Developing countries. International Journal of Biological and life sciences. 4(4).
[4]Jabeen F., Hamid Z., Akhunzada A., Abdul W. and Ghouzali S. (2018): "Trust and Reputation Management in Healthcare Systems: Taxonomy, Requirements and Open Issues," in IEEE Access, vol. 6, pp. 17246-17263, 2018, doi: 10.1109/ACCESS.2018.2810337.
[5]Coventry L. and Branley D. (2018): Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas, 113, pp. 48-52. Available at: https://doi.org/10.1016/j.maturitas.2018.04.008
[6]Jalali M.S. and Kaiser J.P. (2018): Cybersecurity in Hospitals: A Systematic, Organizational Perspective. Journal of Medical Internet Research, 20(5): e10059. Available online at: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5996174/.
[7]Iwaya, Ahmad and Babar (2020): Security and Privacy for mHealth and uHealth Systems: a Systematic Mapping Study. IEEE Access.
[8]Kurdi, H., Alsalamah, S., Alatawi, A., Alfaraj, S., Altoaimy, L., & Ahmed, S. H. (2019): HealthyBroker: A Trustworthy Blockchain-Based Multi-Cloud Broker for Patient-Centered eHealth Services. Electronics, 8(6), 602. doi:10.3390/electronics8060602
[9]Grandison, T., (2003): Trust management for Internet Applications, Ph.D. Dissertation, University of London, England, Available at http://pubs.doc.ic.ac.uk/trustmanagem-for-internet-app/trust-managem-forinternet-app.pdf
[10]Al-Issa, Y., Ottom, M. A., & Tamrawi, A. (2019): “eHealth Cloud Security Challenges: A Survey,” Journal of Healthcare Engineering, 2019, 1– 15. doi:10.1155/2019/7516035.
[11]Chenthara, S., Ahmed, K., Wang, H., & Whittaker, F. (2019): “Security and Privacy-preserving Challenges of e-Health Solutions in Cloud Computing,” IEEE Access, 1–1. doi:10.1109/access.2019.2919982
[12]Supriya M. and Rajarajeswari P. (2021): An Efficient Privacy Preserving Approach for e-Health. International Journal of Advanced Computer Science and Applications (IJACSA), 12(4): 157-162.
[13]Nkosi, M., T, Adigun M. O and Emuoyibofarhe, O. J. (2007). IADIS International Conference Applied Computing Texas, ISBN: 978-972-8924(30) 143-150.
[14]Ajayi, R.O., Sinnott, R. and Stell, A. (2007): Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems. In Proceedings of the 2nd International Conference on Availability, Reliability and Security, (ARESO˜07), Vienna, Austria. IEEE Computer Society, Apr. 2007.
[15]Emuoyibofarhe, O. J. (2012). E-Health/Telemedicine Readiness Assessment of some Selected States in Western Nigeria. International Journal of Engineering 2, (2) 1-7.