Skip to main content

Advertisement

Log in

An Optimal Mobile Service for Telecare Data Synchronization using a Role-based Access Control Model and Mobile Peer-to-Peer Technology

  • Mobile Systems
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

The progress of information and communication technologies (ICT) has promoted the development of healthcare which has enabled the exchange of resources and services between organizations. Organizations want to integrate mobile devices into their hospital information systems (HIS) due to the convenience to employees who are then able to perform specific healthcare processes from any location. The collection and merage of healthcare data from discrete mobile devices are worth exploring possible ways for further use, especially in remote districts without public data network (PDN) to connect the HIS. In this study, we propose an optimal mobile service which automatically synchronizes the telecare file resources among discrete mobile devices. The proposed service enforces some technical methods. The role-based access control model defines the telecare file resources accessing mechanism; the symmetric data encryption method protects telecare file resources transmitted over a mobile peer-to-peer network. The multi-criteria decision analysis method, ELECTRE (Elimination Et Choice Translating Reality), evaluates multiple criteria of the candidates’ mobile devices to determine a ranking order. This optimizes the synchronization of telecare file resources among discrete mobile devices. A prototype system is implemented to examine the proposed mobile service. The results of the experiment show that the proposed mobile service can automatically and effectively synchronize telecare file resources among discrete mobile devices. The contribution of this experiment is to provide an optimal mobile service that enhances the security of telecare file resource synchronization and strengthens an organization’s mobility.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1

Similar content being viewed by others

References

  1. Ke, C.K., Lin, Z.H. An optimal mobile service for telecare data collection. In Proceedings of the International Conference on Business, Information, and Cultural Creative Industry, Taipei, Taiwan, Paper ID: 0203, 2014.

  2. Tsai, F. S., Han, W. C., Xu, J. W., and Chua, H. C., Design and development of a mobile peer-to-peer social networking application. Expert Syst. Appl. 36(8):11077–11087, 2009.

    Article  Google Scholar 

  3. Ke, C. K., and Lin, Z. H., Secure resource synchronization of mobile peer-to-peer techniques: Experiments on the android platform. Lect. Notes Electr. Eng. 308:289–294, 2014.

    Article  Google Scholar 

  4. Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E., Role-based access control models. IEEE Comput. 29(2):38–47, 1996.

    Article  Google Scholar 

  5. National Institute of Standards and Technology (NIST), Specification For The Advanced Encryption Standard (AES) Federal Information Processing Standard Publication (FIPS) 197, 2001.

  6. Chi, Y. L., Lee, C. W., and Chen, C. Y., A selection approach for optimized web services compositions. Electron. Commer. Stud. 2(3):297–314, 2004.

    Google Scholar 

  7. Gong, L. Project JXTA: A technology overview. Sun Microsystems, Inc., http://www.jxta.org/project/www/docs/TechOverview.pdf, 2001.

  8. Li, Q., Zhang, X. W., Xu, M. W., and Wu, J. P., Towards secure dynamic collaborations with group-based RBAC model. Comput. Secur. 28(5):260–275, 2009.

    Article  CAS  Google Scholar 

  9. Kwon, J. H., and Moon, C. J., Visual modeling and formal specification of constraints of RBAC using semantic web technology. Knowl.-Based Syst. 20(4):350–356, 2007.

    Article  Google Scholar 

  10. Omicini, A., Ricci, A., and Viroli, M., RBAC for organisation and security in an agent coordination infrastructure. Electron. Notes in Theor. Comput. Sci. 128(3):65–85, 2005.

    Article  Google Scholar 

  11. Antonieta Lima, and Vasco Salazar Soares,  Multi criteria decision making models: An overview on electre methods. Paper provided by Universidade Portucalense, Centrode Investigacao em Gestao e Economia, CIGE in its Series Working Papers 21, 2011.

  12. Ke, C. K., and Wu, M. Y., A selection approach for optimized problem-solving process by grey relational utility model and multi-criteria decision analysis. Math. Probl. Eng. 2012, 293137, 2012. 14 pages.

    Google Scholar 

  13. Ke, C. K., Research on optimized problem-solving solutions: Selection of the production process. J. Appl. Res. Technol. 11(4):523–532, 2013.

    Article  Google Scholar 

  14. Ke, C. K., and Chen, Y. L., A message negotiation approach to eservices by utility function andmulti-criteria decision analysis. Comput. Math. Appl. 64(5):1056–1064, 2012.

    Article  Google Scholar 

  15. Ke, C. K., Liu, K. P., and Chen, W. C., Building a smart e-portfolio platform for optimal e-learning objects acquisition. Math. Probl. Eng. 2013, 896027, 2013. 8 pages.

    Article  Google Scholar 

  16. Halepovic, E., and Deters, R., The costs of using JXTA. In Proceedings of the Third International Conference on Peer-to-Peer Computing; 160–167, 2003.

  17. Ariyarathna, H.M.T.A., and  Ranasinghe, D.N., JXTA based parallel service invocation model for peer to peer web service composition. In Proceedings of the 7th IEEE International Conference on Industrial and Information Systems, Chennai, India: 1–6, 2012.

  18. Duigou, M. and Dengler, T.. JXTA v2.0 Protocols Specification. Sun Microsystems, Inc. and The Internet Society, https://jxta-spec.dev.java.net/JXTAProtocols.pdf, 2007.

  19. Sun Microsystems, JXTA v2.0 Protocols Specification. http://jxta.kenai.com/Specifications/JXTAProtocols2_0.pdf.

  20. Su, C. J., and Wu, C. Y., JADE implemented mobile multi-agent based, distributed information platform for pervasive health care monitoring. Appl. Soft Comput. 11(1):315–325, 2011.

    Article  Google Scholar 

  21. Rajkumar, R., and Iyengar, N. C. S. N., JXTA: A technology facilitating mobile p2p health management system. Osong Public Health Res. Perspect. 3(3):165–169, 2012.

    Article  PubMed Central  PubMed  Google Scholar 

  22. Barolli, L., and Xhafa, F., JXTA-Overlay: A p2p platform for distributed, collaborative, and ubiquitous computing. IEEE Trans. Ind. Electron. 58(6):2163–2172, 2011.

    Article  Google Scholar 

  23. International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), Information technology-Automatic identification and data capture techniques—QR Code bar code symbology specification. BS  ISO/IEC 18004:2015.

  24. Tsvetkov, K. S., and Georgiev, T., An alternative approach and attempt to come up with a standard for biometric user authentication in a network based environment. Procedia Soc. Behav. Sci. 47:74–78, 2012.

    Article  Google Scholar 

  25. Karnan, M., Akila, M., and Krishnaraj, N., Biometric personal authentication using keystroke dynamics: A review. Appl. Soft Comput. 11(2):565–1573, 2011.

    Article  Google Scholar 

  26. Sarier, N. D., Improving the accuracy and storage cost in biometric remote authentication schemes. J. Netw. Comput. Appl. 33(3):268–274, 2010.

    Article  Google Scholar 

  27. Seak Sea Chong, and Siong Ng Kang, A file-based implementation of XML encryption. In Proceedings of the Malaysian Conference in Software Engineering, Johor Bahru, Malaysia, 418–422, 2011.

  28. XML Encryption Syntax and Processing Version 1.1, http://www.w3.org/TR/xmlenc-core1/.

  29. Silaghi Gheorghe Cosmin, Arenas Alvaro E., and Silva Luis Moura, A utility-based reputation model for service-oriented computing. Towards Next Gener. Grids: 63–72, 2007.

  30. Arnedo-Moreno, J., and Herrera-Joancomartí, J., A survey on security in JXTA applications. J. Syst. Softw. 82(9):1513–1525, 2009.

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported in part by the National Science Council of Taiwan (Republic of China) with a NSC grant 102-2410-H-025-017.

Compliance with Ethical Standards

We used some information communication and technology to design a service in a mobile device to facilitate employee working in telecare environment. The experiment data is simulated to prove the proposed service is effectiveness.

Conflict of Interest

This work has no potential conflicts of interest.

Human and Animal Rights and Informed Consent

The data does not involve human participants and/or animals, so we have no informed consent.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chih-Kun Ke.

Additional information

This article is part of the Topical Collection on Mobile Systems

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ke, CK., Lin, ZH. An Optimal Mobile Service for Telecare Data Synchronization using a Role-based Access Control Model and Mobile Peer-to-Peer Technology. J Med Syst 39, 101 (2015). https://doi.org/10.1007/s10916-015-0285-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-015-0285-4

Keywords

Navigation