There are three types of threats : misuse of patient identities, unauthorized access and modification of PHI in the health monitoring system. Huang et al. in [11] considered three types of adversary: the patient himself/herself, insiders and outsiders.