Enhancing Security in E-Health Communications using Multi-Agent System

Problem statement: In this study, we address the security needs in online communications, specifically in the e-health domain. We focus on how to provide different security strengths to different types of communications in e-health, where each communication transmits different types of information with different levels of sensitivity. Approach: The Multi-Agent System (MAS) approach is used to develop an agent-based system that can cater for distributed processes. We use the agents’ characteristics such as autonomous, interactive, extendible and mobile to handle the security processes for users in different environments and devices. We integrate different types of encryption algorithms with different security strengths in order to provide different security needs. Results: We present our security model called MAgSeM that consists of eight agents, which are skilled to complete its goal as well as the overall system goals autonomously. Conclusion: We conclude that MAgSeM security model is suitable not only for the e-health domain, but also other domains that practices online communications.

[1]  A. Bagchi,et al.  AND/OR graph heuristic search methods , 1985, JACM.

[2]  Michael Luck,et al.  Multi-Agent Systems and Applications , 2001, Lecture Notes in Computer Science.

[3]  Vladimir Marik,et al.  Multi-Agent Systems and Applications III , 2003, Lecture Notes in Computer Science.

[4]  Moshe Tennenholtz,et al.  On the Synthesis of Useful Social Laws for Artificial Agent Societies (Preliminary Report) , 1992, AAAI.

[5]  Michael Wooldridge,et al.  Agent-based software engineering , 1997, IEE Proc. Softw. Eng..

[6]  Danny B. Lange,et al.  Seven good reasons for mobile agents , 1999, CACM.

[7]  Wanli Ma,et al.  A Multi-agent Security Framework for e-Health Services , 2007, KES.

[8]  Munindar P. Singh,et al.  Readings in agents , 1997 .

[9]  Peter Braun,et al.  Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit , 2004 .

[10]  Fabio Bellifemine,et al.  Developing Multi-agent Systems with JADE , 2007, ATAL.

[11]  Christos Douligeris,et al.  Network Security: Current Status and Future Directions , 2007 .

[12]  Nicholas R. Jennings,et al.  On agent-based software engineering , 2000, Artif. Intell..

[13]  Nicholas R. Jennings,et al.  Coordination in software agent systems , 1996 .

[14]  Qian Liu,et al.  Securing Telehealth Applications in a Web-Based e-Health Portal , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[15]  Michael J. Grimley,et al.  Protecting the integrity of agents: an exploration into letting agents loose in an unpredictable world , 1999, CROS.

[16]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[17]  John K. Debenham,et al.  An Adaptive, Maintable, Extensible Process Agent , 1999, DEXA.

[18]  Gordon F. Snyder,et al.  Network Security , 2004 .

[19]  Michael Wooldridge,et al.  Introduction to multiagent systems , 2001 .

[20]  Edmund H. Durfee,et al.  Coherent Cooperation Among Communicating Problem Solvers , 1987, IEEE Transactions on Computers.