Secure Mobile Agent for Telemedicine Based on P2P Networks

被引:7
作者
Hsu, Wen-Shin [1 ]
Pan, Jiann-I [2 ]
机构
[1] Tzu Chi Univ, Inst Med Sci, Hualien, Taiwan
[2] Tzu Chi Univ, Dept Med Informat, Hualien, Taiwan
关键词
Telemedicine; Mobile agent; Time-limited black boxes; RSA-undetachable signatures; PEER;
D O I
10.1007/s10916-013-9947-2
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Exploring intelligent mobile agent (MA) technology for assisting medical services or transmitting personal patient-health information in telemedicine applications has been widely investigated. Conversely, peer-to-peer (P2P) networking has become one of the most popular applications used in the Internet because of its benefits for easy-to-manage resources and because it balances workloads. Therefore, constructing an agent-based telemedicine platform based on P2P networking architecture is necessary. The main purpose of this paper is to construct a safe agent-based telemedicine that based on P2P networking architecture. Two themes are addressed in this paper: (a) the P2P network architecture for an agent-based telemedicine service, and (b) the security mechanisms for the proposed telemedicine networking architecture. When an MA contains patient information and migrates from one host to another through the Internet, it can be attacked by other software agents or agent platforms that can illegally access patient information. The proposed P2P network architecture is based on the JXTA protocol and provides two types of telemedicine service models: the predictable service model and unpredictable service model. This architecture employs a two-layer safety mechanism for MAs (i.e., time-limited black boxes and RSA undetachable signature technologies), to provide a secure solution for agent-based telemedicine services.
引用
收藏
页数:6
相关论文
共 24 条
[1]   Efficient, self-contained handling of identity in peer-to-peer systems [J].
Aberer, K ;
Datta, A ;
Hauswirth, M .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (07) :858-869
[2]   Trusted computing: Providing security for Peer-to-Peer networks [J].
Balfe, S ;
Lakhani, AD ;
Paterson, KG .
FIFTH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2005, :117-124
[3]   Mobile agent security [J].
Borselius, N .
ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL, 2002, 14 (05) :211-218
[4]  
Charles B L, 2000, Healthc Financ Manage, V54, P66
[5]  
Chen R. Y., 2003, P 36 HAW INT C SYST
[6]  
Davidson A., 2003, P2P FILE SHARING PRI
[7]   Agents acting and moving in healthcare scenario - A paradigm for telemedical collaboration [J].
Della Mea, V .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2001, 5 (01) :10-13
[8]   A peer to peer (P2P) architecture for dynamic workflow management [J].
Fakas, GJ ;
Karakostas, B .
INFORMATION AND SOFTWARE TECHNOLOGY, 2004, 46 (06) :423-431
[9]  
Field M. J., 1996, TELEMEDICINE GUIDE A, P26
[10]  
Hohl F., 1998, Mobile agents and security, P92