Browse > Article
http://dx.doi.org/10.5808/GI.2016.14.1.20

The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database  

Choi, Jeongseok (Department of Computer Science and Information Engineering, Inha University)
Kim, Jaekwon (Department of Computer Science and Information Engineering, Inha University)
Lee, Dong Kyun (Department of Medical Informatics College of Medicine, and Institute of Healthcare Management, The Catholic University of Korea)
Jang, Kwang Soo (Department of Information System, Hanyang University)
Kim, Dai-Jin (Department of Psychiatry, Seoul St. Mary's Hospital, College of Medicine, The Catholic University of Korea)
Choi, In Young (Department of Medical Informatics College of Medicine, and Institute of Healthcare Management, The Catholic University of Korea)
Abstract
Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.
Keywords
access control; IABio; internet addiction; internet user authentication; OAuth 2.0;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 National Information Society Agency; Ministry of Science. ICT and future planning: 2013 internet addiction research on the actual condition. Daegu: National Information Society Agency, 2014.
2 Beimel, D, Peleg, M. The context and the SitBAC models for privacy preservation: an experimental comparison of model comprehension and synthesis. IEEE Trans Knowl Data Eng 2010;22:1475-1488.   DOI
3 Jeong CW, Kim WH, Yoon KH, Joo SC. Medical information dynamic access system in smart mobile environments. J Korean Soc Internet Inf 2015;16:47-55.
4 IHE Technical Frameworks. Oak Brook: IHE International, Inc., 2015. Accessed 2015 Mar 17. Available from: http://www.ihe.net/technical_frameworks.
5 ITI Technical Committee. IHE IT infrastructure technical framework supplement: internet user authorization (IUA). Oak Brook: IHE International, Inc., 2015. Accessed 2015 Mar 17. Available from: http://www.ihe.net/uploadedFiles/Documents/ITI/IHE_ITI_Suppl_IUA.pdf.
6 Hardt D. The OAuth 2.0 authorization framework. IETF RFC 6749. IETF Tools; 2012.
7 Kang SU. An access control management based on medical standard in healthcare information services. M.S. Thesis. Suwon: Ajou University, 2015.
8 Rosell DR, Zaluda LC, McClure MM, Perez-Rodriguez MM, Strike KS, Barch DM, et al. Effects of the D1 dopamine receptor agonist dihydrexidine (DAR-0100A) on working memory in schizotypal personality disorder. Neuropsychopharmacology 2015;40:446-453.   DOI
9 Montag C, Kirsch P, Sauer C, Markett S, Reuter M. The role of the CHRNA4 gene in internet addiction: a case-control study. J Addict Med 2012;6:191-195.   DOI
10 Rodriguez A. RESTful web services: the basics. Armonk: IBM, 2008. Accessed 2015 Mar 17. Available from: http://www.gregbulla.com/TechStuff/Docs/ws-restful-pdf.pdf.
11 Wagh K, Thool R. A Comparative study of SOAP vs REST web services provisioning techniques for mobile host. J Inf Eng Appl 2012;2:12-16.
12 Naver open API. Seongnam: Naver Corp., 2015. Accessed 2015 Mar 17. Available from: http://developer.naver.com/wiki/pages/OpenAPI.