This document discusses security issues in using mobile cloud computing for pervasive healthcare monitoring systems. It first introduces how mobile devices and cloud computing are being used to remotely monitor patient health metrics. However, transmitting sensitive patient data over networks poses security and privacy risks. The document then examines different approaches for securing such systems, including using encryption keys for authentication and communication protection between wireless sensor nodes, hospitals, and mobile apps. It also discusses challenges in securing data and devices across the various tiers of healthcare cloud and mobile computing architectures. Overall, the document analyzes how security can be improved for remote mobile healthcare monitoring systems that leverage cloud-based approaches.