Abstract
The progress of information and communication technologies (ICT) has promoted the development of healthcare which has enabled the exchange of resources and services between organizations. Organizations want to integrate mobile devices into their hospital information systems (HIS) due to the convenience to employees who are then able to perform specific healthcare processes from any location. The collection and merage of healthcare data from discrete mobile devices are worth exploring possible ways for further use, especially in remote districts without public data network (PDN) to connect the HIS. In this study, we propose an optimal mobile service which automatically synchronizes the telecare file resources among discrete mobile devices. The proposed service enforces some technical methods. The role-based access control model defines the telecare file resources accessing mechanism; the symmetric data encryption method protects telecare file resources transmitted over a mobile peer-to-peer network. The multi-criteria decision analysis method, ELECTRE (Elimination Et Choice Translating Reality), evaluates multiple criteria of the candidates’ mobile devices to determine a ranking order. This optimizes the synchronization of telecare file resources among discrete mobile devices. A prototype system is implemented to examine the proposed mobile service. The results of the experiment show that the proposed mobile service can automatically and effectively synchronize telecare file resources among discrete mobile devices. The contribution of this experiment is to provide an optimal mobile service that enhances the security of telecare file resource synchronization and strengthens an organization’s mobility.
Similar content being viewed by others
References
Ke, C.K., Lin, Z.H. An optimal mobile service for telecare data collection. In Proceedings of the International Conference on Business, Information, and Cultural Creative Industry, Taipei, Taiwan, Paper ID: 0203, 2014.
Tsai, F. S., Han, W. C., Xu, J. W., and Chua, H. C., Design and development of a mobile peer-to-peer social networking application. Expert Syst. Appl. 36(8):11077–11087, 2009.
Ke, C. K., and Lin, Z. H., Secure resource synchronization of mobile peer-to-peer techniques: Experiments on the android platform. Lect. Notes Electr. Eng. 308:289–294, 2014.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E., Role-based access control models. IEEE Comput. 29(2):38–47, 1996.
National Institute of Standards and Technology (NIST), Specification For The Advanced Encryption Standard (AES) Federal Information Processing Standard Publication (FIPS) 197, 2001.
Chi, Y. L., Lee, C. W., and Chen, C. Y., A selection approach for optimized web services compositions. Electron. Commer. Stud. 2(3):297–314, 2004.
Gong, L. Project JXTA: A technology overview. Sun Microsystems, Inc., http://www.jxta.org/project/www/docs/TechOverview.pdf, 2001.
Li, Q., Zhang, X. W., Xu, M. W., and Wu, J. P., Towards secure dynamic collaborations with group-based RBAC model. Comput. Secur. 28(5):260–275, 2009.
Kwon, J. H., and Moon, C. J., Visual modeling and formal specification of constraints of RBAC using semantic web technology. Knowl.-Based Syst. 20(4):350–356, 2007.
Omicini, A., Ricci, A., and Viroli, M., RBAC for organisation and security in an agent coordination infrastructure. Electron. Notes in Theor. Comput. Sci. 128(3):65–85, 2005.
Antonieta Lima, and Vasco Salazar Soares, Multi criteria decision making models: An overview on electre methods. Paper provided by Universidade Portucalense, Centrode Investigacao em Gestao e Economia, CIGE in its Series Working Papers 21, 2011.
Ke, C. K., and Wu, M. Y., A selection approach for optimized problem-solving process by grey relational utility model and multi-criteria decision analysis. Math. Probl. Eng. 2012, 293137, 2012. 14 pages.
Ke, C. K., Research on optimized problem-solving solutions: Selection of the production process. J. Appl. Res. Technol. 11(4):523–532, 2013.
Ke, C. K., and Chen, Y. L., A message negotiation approach to eservices by utility function andmulti-criteria decision analysis. Comput. Math. Appl. 64(5):1056–1064, 2012.
Ke, C. K., Liu, K. P., and Chen, W. C., Building a smart e-portfolio platform for optimal e-learning objects acquisition. Math. Probl. Eng. 2013, 896027, 2013. 8 pages.
Halepovic, E., and Deters, R., The costs of using JXTA. In Proceedings of the Third International Conference on Peer-to-Peer Computing; 160–167, 2003.
Ariyarathna, H.M.T.A., and Ranasinghe, D.N., JXTA based parallel service invocation model for peer to peer web service composition. In Proceedings of the 7th IEEE International Conference on Industrial and Information Systems, Chennai, India: 1–6, 2012.
Duigou, M. and Dengler, T.. JXTA v2.0 Protocols Specification. Sun Microsystems, Inc. and The Internet Society, https://jxta-spec.dev.java.net/JXTAProtocols.pdf, 2007.
Sun Microsystems, JXTA v2.0 Protocols Specification. http://jxta.kenai.com/Specifications/JXTAProtocols2_0.pdf.
Su, C. J., and Wu, C. Y., JADE implemented mobile multi-agent based, distributed information platform for pervasive health care monitoring. Appl. Soft Comput. 11(1):315–325, 2011.
Rajkumar, R., and Iyengar, N. C. S. N., JXTA: A technology facilitating mobile p2p health management system. Osong Public Health Res. Perspect. 3(3):165–169, 2012.
Barolli, L., and Xhafa, F., JXTA-Overlay: A p2p platform for distributed, collaborative, and ubiquitous computing. IEEE Trans. Ind. Electron. 58(6):2163–2172, 2011.
International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), Information technology-Automatic identification and data capture techniques—QR Code bar code symbology specification. BS ISO/IEC 18004:2015.
Tsvetkov, K. S., and Georgiev, T., An alternative approach and attempt to come up with a standard for biometric user authentication in a network based environment. Procedia Soc. Behav. Sci. 47:74–78, 2012.
Karnan, M., Akila, M., and Krishnaraj, N., Biometric personal authentication using keystroke dynamics: A review. Appl. Soft Comput. 11(2):565–1573, 2011.
Sarier, N. D., Improving the accuracy and storage cost in biometric remote authentication schemes. J. Netw. Comput. Appl. 33(3):268–274, 2010.
Seak Sea Chong, and Siong Ng Kang, A file-based implementation of XML encryption. In Proceedings of the Malaysian Conference in Software Engineering, Johor Bahru, Malaysia, 418–422, 2011.
XML Encryption Syntax and Processing Version 1.1, http://www.w3.org/TR/xmlenc-core1/.
Silaghi Gheorghe Cosmin, Arenas Alvaro E., and Silva Luis Moura, A utility-based reputation model for service-oriented computing. Towards Next Gener. Grids: 63–72, 2007.
Arnedo-Moreno, J., and Herrera-Joancomartí, J., A survey on security in JXTA applications. J. Syst. Softw. 82(9):1513–1525, 2009.
Acknowledgments
This research was supported in part by the National Science Council of Taiwan (Republic of China) with a NSC grant 102-2410-H-025-017.
Compliance with Ethical Standards
We used some information communication and technology to design a service in a mobile device to facilitate employee working in telecare environment. The experiment data is simulated to prove the proposed service is effectiveness.
Conflict of Interest
This work has no potential conflicts of interest.
Human and Animal Rights and Informed Consent
The data does not involve human participants and/or animals, so we have no informed consent.
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection on Mobile Systems
Rights and permissions
About this article
Cite this article
Ke, CK., Lin, ZH. An Optimal Mobile Service for Telecare Data Synchronization using a Role-based Access Control Model and Mobile Peer-to-Peer Technology. J Med Syst 39, 101 (2015). https://doi.org/10.1007/s10916-015-0285-4
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-015-0285-4