Security Based Semantic Context Awareness System for M2M Ubiquitous Healthcare Service

  • Yunjeong Choi
  • Inshil Doh
  • Seung-Soo Park
  • Ki-Joon Chae
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 214)

Abstract

The data and information from heterogeneous embedded devices lead to security and communication problems in M2M environment. Even under the situation where the low-level information causes interoperability problems, these devices should be able to communicate with each other in safe, efficient and right manner without the help of server or human intervention. In this paper, we propose a security based context aware U-healthcare system based on user authentication and data aggregation. Our system can support medical decision-making and inferences using Knowledge Machine (KM), which is a mature knowledge representation language. We design and implement frame-based ontology and rules for semantic reasoning using LISP+KM combination. We especially describe the context query, and then show the progress made towards proper and reasonable inference and prediction. In experiments, we showed the feasibility of our proposed system by adding intentional abnormal/informal situation data.

Keywords

U-healthcare system M2M communication Context reasoning and inference Knowledge representation Security Authentication 

Notes

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (201201945).

References

  1. 1.
    Alessandra, E., Luciano, T., Marco, Z., Luca, C., Riccardo, C.: A framework for context-aware home-health monitoring. J. Auton. Adapt. Commun. Syst. 3(1), 75–91 (2010)Google Scholar
  2. 2.
    ISO/IEEE.: Standard for Health Informatics—Personal Health Device Communication—Device Specialization, ISO/IEEE 11073Google Scholar
  3. 3.
    Luo, H., Shyu, M.L.: Quality of service provision in mobile multimedia—a survey. J. Hum. Centric Comput. Inf. Sci. 1(5), 1–5 (2011)Google Scholar
  4. 4.
    Doh, I.S., Park, J.M., Chae, K.J.: Security approach for ubiquitous healthcare services through wireless communication. In: Proceedings of ACSA (2012)Google Scholar
  5. 5.
    Ko, E.J., Lee, H.J., Lee, J.W.: Ontology-based context modeling and reasoning for U-healthcare, J. IEICE Trans. Inf. Syst. E90-D(8), 1262–1270 (2007)Google Scholar
  6. 6.
    Gu, T., Pung, H.K., Zhang, D.Q.: A service-oriented middleware for building context-aware services. J. Netw. Comput. Appl. 28, 1–18 (2005)CrossRefGoogle Scholar
  7. 7.
    Lo, C.C., Chen, C.H., Cheng, D.Y., Kung, H.Y.: Ubiquitous healthcare service system with context-awareness capability: design and implementation. J. Expert Syst. Appl. 38, 4416–436 (2011)Google Scholar
  8. 8.
    Lo, C.C., Cheng, D.Y., Chen, C.H., Lu, Y.J., Chen, C.M.: Design and implementation of an intelligent medical tourism service recommendation system. J. Inf. Manag. 16, 131–152 (2009)Google Scholar
  9. 9.
    Galatescu, G., Alexandru, A.: Ontology-based modeling and inference for occupational risk prevention. In: Proceedings of Advances in Semantic Processing, pp. 205–211(2010)Google Scholar
  10. 10.
    Kevin, W.H., Bhavani, M.T.: Secure semantic computing. J. Semantic Comput. 5(2), 121–131 (2011)Google Scholar
  11. 11.
    Sogou’s medical directory.: http://www.sogou.com/c008/c008002.htm. Open Service Gateway Initiative (OSGi) http://www.osgi.org
  12. 12.
    Open Service Gateway Initiative (OSGi).: http://www.osgi.org
  13. 13.
    Java Agent DEvelopment Framework (JADE).: http://jade.tilab.com/
  14. 14.
    SWRL.: A semantic web rule language. http://www.w3.org/Submission/SWRL/
  15. 15.
    Jena.: A semantic web framework for Java. http://jena.sourceforge.net/
  16. 16.
    Protégé Home Page.: http://protege.stanford.edu
  17. 17.
    Giacomelli, P., Munaro, G., Rosso, R.: Can an ad-hoc ontology beat a medical search engine? The chronious search engine case. In: International 4th Conference of eTELEMED (2012)Google Scholar
  18. 18.
  19. 19.

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  • Yunjeong Choi
    • 1
  • Inshil Doh
    • 2
  • Seung-Soo Park
    • 2
  • Ki-Joon Chae
    • 2
  1. 1.Department of Computer Science and EngineeringKonkuk UniversitySeoulKorea
  2. 2.Department of Computer Science and EngineeringEwha Womans UniversitySeoulKorea

Personalised recommendations