Skip to main content

Advertisement

Log in

Deployment of Secure Mobile Agents for Medical Information Systems

  • Original Paper
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Changes in global population and demography, and advances in medicine have led to elderly population growth, creating aging societies from which elderly medical care has evolved. In addition, with the elderly susceptible to chronic diseases, this together with the changing lifestyles of young adults have not only pushed up patient numbers of chronic diseases, but also effected into younger patients. These problems have become the major focus for the health care industry. In response to patient demand and the huge shortage of medical resources, we propose remote healthcare medical information systems that combine patient physiological data acquisition equipment with real-time health care analyses. Since remote health care systems are structured around the Internet, in addition to considering the numerous public systems spread across insecure heterogeneous networks, compatibility among heterogeneous networks will also be another concern. To address the aforementioned issues, mobile agents are adopted. With a mobile agent’s characteristics of easy adaptability to heterogeneity and autonomy, the problem of heterogeneous network environments can be tackled. To construct a hierarchical safe access control mechanism for monitoring and control of patient data in order to provide the most appropriate medical treatment, we also propose to use the Chinese Remainder Theorem and discrete logarithm to classify different levels of monitoring staff and hence, to grant permission and access according to their authorized levels. We expect the methods proposed can improve medical care quality and reduce medical resource wastage, while ensuring patient privacy. Finally, security analysis of the system is conducted by simulating a variety of typical attacks, from which it can be concluded that the constructed remote healthcare information system be secure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Calcote, S., Developing a secure healthcare information network on the internet. Healthcare Financial Management 51(1):68–70, 1997.

    Google Scholar 

  2. Buckley, J., The importance of telecare for people with dementia. Nursing & Residential Care 8(5):212–214, 2006.

    Google Scholar 

  3. Debray, M., Couturier, P., Greuillet, F., Hohn, C., Banerjee, S., Gavazzi, G., and Franco, A., A preliminary study of the feasibility of wound telecare for the elderly. Journal of Telemedicine and Telecare 7(6):353–358, 2001.

    Article  Google Scholar 

  4. Gund, A., Ekman, I., Lindecrantz, K., Sjoqvist, B. A., Staaf, E. L., Thorneskold, N., “Design Evaluation of a Home-Based Telecare System for Chronic Heart Failure Patients”, the 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 5851–5854, 2008.

  5. Hou, C., Jia, S. M., and Takase, K., Real-time multimedia applications in a web-based robotic telecare system. Journal of Intelligent & Robotic Systems 38(2):135–153, 2003.

    Article  Google Scholar 

  6. Chen, T. S., Chung, Y. F., and Tian, C. S., A novel key management scheme for dynamic access control in a user hierarchy. Proceedings of the IEEE Annual International Computer Software and Applications Conference 1:396–401, 2004.

    Google Scholar 

  7. Bierman, E., Pretoria, T., Cloete, E., “Classification of Malicious Host Threats in Mobile Agent Computing,” Proceedings of the 2002 Annual Research Conference of The South African Institute of Computer Scientists and Information Technologists on Enablement Through Technology, pp. 141–148, 2002.

  8. Corradi, A., Montanari, R., Stefanelli, C., “Security Issues in Mobile Agent Technology,” Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing System, pp. 3–8, Cape Town, South Africa, 1999.

  9. Karnik, N. M., Tripathi, A. R., “A Security Architecture for Mobile Agents in Ajanta,” Proceedings of the International Conference on Distributed Computing Systems, pp. 402–409, Taipei, Taiwan, 2000.

  10. Volker, R., and Mehrdad, J. S., Access control and key management for mobile agents. Computer and Graphics 22(4):457–461, 1998.

    Article  Google Scholar 

  11. “The State of HIPAA Privacy and Security Compliance”, AHIMA, April 2006.

  12. Safran, C., Rind, D., Citroen, M., Bakker, A. R., Slack, W. V., and Bleich, H. L., Protection of confidentiality in the computer-based patient record. MD Computing 12(3):187–192, 1995.

    Google Scholar 

  13. Barrows, R. C., Jr., and Clayton, P. D., Privacy, confidentiality, and electronic medical records. Journal of the American Medical Informatics Association 3(2):139–148, 1996.

    Article  Google Scholar 

  14. Borselius, N., Mobile agent security, electronics and communication. Engineering Journal 14(5):211–218, October 2002.

    Google Scholar 

  15. Maes, P., Guttman, R. H., and Moukas, A. G., Agents that buy and sell. Communications of the ACM 42(3):81–91, 1999.

    Article  Google Scholar 

  16. Nechaev, V. I., Complexity of a determinate algorithm for the discrete logarithm. Mathematical Notes 55:165–172, 1994.

    Article  MathSciNet  Google Scholar 

  17. Stallings, W., Cryptography and Network Security-Principles and Practices, 3rd Edition, Prentice Hall, 2003.

  18. Sulaiman, R., Huang, X., Sharma, D., “E-health Services with Secure Mobile Agent,” Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference, pp. 270–277, 2009.

  19. Jiang, S., Xue, Y., Giani, A., Bajcsy, R., “Providing QoS Support for Wireless Remote Healthcare System,” International Conference on Multimedia and Expo, pp. 1692–1695, 2009.

  20. Kang, E., Youn, H. Y., Kim, U., “Mining Based Decision Support Multi-Agent System for Personalized E-Healthcare Service”, ProcEedings of the 2 nd KES International Symposium on Agent and Multi-Agent Systems, pp. 733–742, 2008.

  21. Jen, W., Chao, C., Hung, M., Li, Y., and Chi, Y., Mobile information and communication in the hospital outpatient service. International Journal of Medical Informatics 76:565–574, 2007.

    Article  Google Scholar 

  22. Markovic, M., Savic, Z., Kovacevic, B., “Secure Mobile Health Systems: Principles and Solutions, M-Health: Emerging Mobile Health Systems,” Kluwer Academic Publishers, pp. 81–106, 2007.

Download references

Acknowledgment

This work was supported partially by National Science Council of Republic of China under Grants NSC99-2622-E-029-011-CC3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tzer-Long Chen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chen, TL., Chung, YF. & Lin, F.Y.S. Deployment of Secure Mobile Agents for Medical Information Systems. J Med Syst 36, 2493–2503 (2012). https://doi.org/10.1007/s10916-011-9716-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10916-011-9716-z

Keywords

Navigation