An Optimal Mobile Service for Telecare Data Synchronization using a Role-based Access Control Model and Mobile Peer-to-Peer Technology
Abstract
The progress of information and communication technologies (ICT) has promoted the development of healthcare which has enabled the exchange of resources and services between organizations. Organizations want to integrate mobile devices into their hospital information systems (HIS) due to the convenience to employees who are then able to perform specific healthcare processes from any location. The collection and merage of healthcare data from discrete mobile devices are worth exploring possible ways for further use, especially in remote districts without public data network (PDN) to connect the HIS. In this study, we propose an optimal mobile service which automatically synchronizes the telecare file resources among discrete mobile devices. The proposed service enforces some technical methods. The role-based access control model defines the telecare file resources accessing mechanism; the symmetric data encryption method protects telecare file resources transmitted over a mobile peer-to-peer network. The multi-criteria decision analysis method, ELECTRE (Elimination Et Choice Translating Reality), evaluates multiple criteria of the candidates’ mobile devices to determine a ranking order. This optimizes the synchronization of telecare file resources among discrete mobile devices. A prototype system is implemented to examine the proposed mobile service. The results of the experiment show that the proposed mobile service can automatically and effectively synchronize telecare file resources among discrete mobile devices. The contribution of this experiment is to provide an optimal mobile service that enhances the security of telecare file resource synchronization and strengthens an organization’s mobility.
Keywords
Mobile service Telecare file resources synchronization Role-based access control Mobile peer to peer Multi-criteria decision analysisNotes
Acknowledgments
This research was supported in part by the National Science Council of Taiwan (Republic of China) with a NSC grant 102-2410-H-025-017.
Compliance with Ethical Standards
We used some information communication and technology to design a service in a mobile device to facilitate employee working in telecare environment. The experiment data is simulated to prove the proposed service is effectiveness.
Conflict of Interest
This work has no potential conflicts of interest.
Human and Animal Rights and Informed Consent
The data does not involve human participants and/or animals, so we have no informed consent.
References
- 1.Ke, C.K., Lin, Z.H. An optimal mobile service for telecare data collection. In Proceedings of the International Conference on Business, Information, and Cultural Creative Industry, Taipei, Taiwan, Paper ID: 0203, 2014.Google Scholar
- 2.Tsai, F. S., Han, W. C., Xu, J. W., and Chua, H. C., Design and development of a mobile peer-to-peer social networking application. Expert Syst. Appl. 36(8):11077–11087, 2009.CrossRefGoogle Scholar
- 3.Ke, C. K., and Lin, Z. H., Secure resource synchronization of mobile peer-to-peer techniques: Experiments on the android platform. Lect. Notes Electr. Eng. 308:289–294, 2014.CrossRefGoogle Scholar
- 4.Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E., Role-based access control models. IEEE Comput. 29(2):38–47, 1996.CrossRefGoogle Scholar
- 5.National Institute of Standards and Technology (NIST), Specification For The Advanced Encryption Standard (AES) Federal Information Processing Standard Publication (FIPS) 197, 2001.Google Scholar
- 6.Chi, Y. L., Lee, C. W., and Chen, C. Y., A selection approach for optimized web services compositions. Electron. Commer. Stud. 2(3):297–314, 2004.Google Scholar
- 7.Gong, L. Project JXTA: A technology overview. Sun Microsystems, Inc., http://www.jxta.org/project/www/docs/TechOverview.pdf, 2001.
- 8.Li, Q., Zhang, X. W., Xu, M. W., and Wu, J. P., Towards secure dynamic collaborations with group-based RBAC model. Comput. Secur. 28(5):260–275, 2009.CrossRefGoogle Scholar
- 9.Kwon, J. H., and Moon, C. J., Visual modeling and formal specification of constraints of RBAC using semantic web technology. Knowl.-Based Syst. 20(4):350–356, 2007.CrossRefGoogle Scholar
- 10.Omicini, A., Ricci, A., and Viroli, M., RBAC for organisation and security in an agent coordination infrastructure. Electron. Notes in Theor. Comput. Sci. 128(3):65–85, 2005.CrossRefGoogle Scholar
- 11.Antonieta Lima, and Vasco Salazar Soares, Multi criteria decision making models: An overview on electre methods. Paper provided by Universidade Portucalense, Centrode Investigacao em Gestao e Economia, CIGE in its Series Working Papers 21, 2011.Google Scholar
- 12.Ke, C. K., and Wu, M. Y., A selection approach for optimized problem-solving process by grey relational utility model and multi-criteria decision analysis. Math. Probl. Eng. 2012, 293137, 2012. 14 pages.Google Scholar
- 13.Ke, C. K., Research on optimized problem-solving solutions: Selection of the production process. J. Appl. Res. Technol. 11(4):523–532, 2013.CrossRefGoogle Scholar
- 14.Ke, C. K., and Chen, Y. L., A message negotiation approach to eservices by utility function andmulti-criteria decision analysis. Comput. Math. Appl. 64(5):1056–1064, 2012.CrossRefGoogle Scholar
- 15.Ke, C. K., Liu, K. P., and Chen, W. C., Building a smart e-portfolio platform for optimal e-learning objects acquisition. Math. Probl. Eng. 2013, 896027, 2013. 8 pages.CrossRefGoogle Scholar
- 16.Halepovic, E., and Deters, R., The costs of using JXTA. In Proceedings of the Third International Conference on Peer-to-Peer Computing; 160–167, 2003.Google Scholar
- 17.Ariyarathna, H.M.T.A., and Ranasinghe, D.N., JXTA based parallel service invocation model for peer to peer web service composition. In Proceedings of the 7th IEEE International Conference on Industrial and Information Systems, Chennai, India: 1–6, 2012.Google Scholar
- 18.Duigou, M. and Dengler, T.. JXTA v2.0 Protocols Specification. Sun Microsystems, Inc. and The Internet Society, https://jxta-spec.dev.java.net/JXTAProtocols.pdf, 2007.
- 19.Sun Microsystems, JXTA v2.0 Protocols Specification. http://jxta.kenai.com/Specifications/JXTAProtocols2_0.pdf.
- 20.Su, C. J., and Wu, C. Y., JADE implemented mobile multi-agent based, distributed information platform for pervasive health care monitoring. Appl. Soft Comput. 11(1):315–325, 2011.CrossRefGoogle Scholar
- 21.Rajkumar, R., and Iyengar, N. C. S. N., JXTA: A technology facilitating mobile p2p health management system. Osong Public Health Res. Perspect. 3(3):165–169, 2012.PubMedCentralCrossRefPubMedGoogle Scholar
- 22.Barolli, L., and Xhafa, F., JXTA-Overlay: A p2p platform for distributed, collaborative, and ubiquitous computing. IEEE Trans. Ind. Electron. 58(6):2163–2172, 2011.CrossRefGoogle Scholar
- 23.International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), Information technology-Automatic identification and data capture techniques—QR Code bar code symbology specification. BS ISO/IEC 18004:2015.Google Scholar
- 24.Tsvetkov, K. S., and Georgiev, T., An alternative approach and attempt to come up with a standard for biometric user authentication in a network based environment. Procedia Soc. Behav. Sci. 47:74–78, 2012.CrossRefGoogle Scholar
- 25.Karnan, M., Akila, M., and Krishnaraj, N., Biometric personal authentication using keystroke dynamics: A review. Appl. Soft Comput. 11(2):565–1573, 2011.CrossRefGoogle Scholar
- 26.Sarier, N. D., Improving the accuracy and storage cost in biometric remote authentication schemes. J. Netw. Comput. Appl. 33(3):268–274, 2010.CrossRefGoogle Scholar
- 27.Seak Sea Chong, and Siong Ng Kang, A file-based implementation of XML encryption. In Proceedings of the Malaysian Conference in Software Engineering, Johor Bahru, Malaysia, 418–422, 2011.Google Scholar
- 28.XML Encryption Syntax and Processing Version 1.1, http://www.w3.org/TR/xmlenc-core1/.
- 29.Silaghi Gheorghe Cosmin, Arenas Alvaro E., and Silva Luis Moura, A utility-based reputation model for service-oriented computing. Towards Next Gener. Grids: 63–72, 2007.Google Scholar
- 30.Arnedo-Moreno, J., and Herrera-Joancomartí, J., A survey on security in JXTA applications. J. Syst. Softw. 82(9):1513–1525, 2009.CrossRefGoogle Scholar