Teleradiology mobile internet system with a new information security solution

被引:0
|
作者
Satoh, Hitoshi [1 ]
Niki, Noboru [2 ]
Eguchi, Kenji [3 ]
Ohmatsu, Hironobu
Kusumoto, Masahiko [4 ]
Kaneko, Masahiro [5 ]
Moriyama, Noriyuki [5 ]
机构
[1] Tokyo Healthcare Univ, Fac Healthcare, Tokyo, Japan
[2] Univ Tokushima, Dept Opt Sci, Tokushima, Japan
[3] Teikyou Univ, Sch Med, Tokyo, Japan
[4] Natl Canc Ctr Hosp East, Kashiwa, Chiba, Japan
[5] Tokyo Midtown Med Ctr, Tokyo, Japan
关键词
computer-aided diagnosis workstation; web medical image conference; cryptography; secret sharing scheme; teleradiology; tokenization; token; data center; internet; Individual number IC card; AIDED DIAGNOSIS SYSTEM; HELICAL CT IMAGES;
D O I
10.1117/12.2043377
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We have developed an external storage system by using secret sharing scheme and tokenization for regional medical cooperation, PHR service and information preservation. The use of mobile devices such as smart phones and tablets will be accelerated for a PHR service, and the confidential medical information is exposed to the risk of damage and intercept. We verified the transfer rate of the sending and receiving of data to and from the external storage system that connected it with PACS by the Internet this time. External storage systems are the data centers that exist in Okinawa, in Osaka, in Sapporo and in Tokyo by using secret sharing scheme. PACS continuously transmitted 382 CT images to the external data centers. Total capacity of the CT images is about 200MB. The total time that had been required to transmit was about 250 seconds. Because the preservation method to use secret sharing scheme is applied, security is strong. But, it also takes the information transfer time of this system too much. Therefore, DICOM data is masked to the header information part because it is made to anonymity in our method. The DICOM data made anonymous is preserved in the data base in the hospital. Header information including individual information is divided into two or more tallies by secret sharing scheme, and preserved at two or more external data centers. The token to relate the DICOM data anonymity made to header information preserved outside is strictly preserved in the token server. The capacity of header information that contains patient's individual information is only about 2% of the entire DICOM data. This total time that had been required to transmit was about 5 seconds. Other, common solutions that can protect computer communication networks from attacks are classified as cryptographic techniques or authentication techniques. Individual number IC card is connected with electronic certification authority of web medical image conference system. Individual number IC card is given only to the person to whom the authority to operate web medical image conference system was given.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things
    Sun, Ning
    Li, Tao
    Song, Gongfei
    Xia, Haoran
    MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [22] AN IRIS BASED REVERSIBLE WATERMARKING SYSTEM FOR THE SECURITY OF TELERADIOLOGY
    Balamurugan, G.
    Joseph, K. Suresh
    Arulalan, V
    2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE), 2016,
  • [23] Information Security Transmission Technology in Internet of Things Control System
    Zou, Ying
    Lv, Jiezhuo
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (06) : 177 - 190
  • [24] Analysis on Security Management Strategy of Computer and Internet Information System
    Chen, Yuan
    PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 109 - 113
  • [25] Research on the information security system in electrical gis system in mobile application
    Zhou, Chao
    Feng, Renjun
    Jiang, Haitao
    Huang, Wei
    Zhu, Daohua
    2017 INTERNATIONAL SYMPOSIUM ON RESOURCE EXPLORATION AND ENVIRONMENTAL SCIENCE (REES 2017), 2017, 64
  • [26] Cloud Platform Based Automated Security Testing System for Mobile Internet
    Dan Tao
    Zhaowen Lin
    Cheng Lu
    Tsinghua Science and Technology, 2015, 20 (06) : 537 - 544
  • [27] Cloud Platform Based Automated Security Testing System for Mobile Internet
    Tao, Dan
    Lin, Zhaowen
    Lu, Cheng
    TSINGHUA SCIENCE AND TECHNOLOGY, 2015, 20 (06) : 537 - 544
  • [28] Research on the application of mobile payment security system based on the Internet of Things
    Xu, Bing
    Huang, Darong
    Mi, Bo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (09):
  • [29] Research on security solution in network management information system
    Geng di
    Guo Libin
    PROCEEDINGS OF THE 2007 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING - MANAGEMENT AND ORGANIZATION STUDIES SECTION, 2007, : 1202 - +
  • [30] Information security for Internet commerce
    McKnight, L
    Solomon, R
    Reagle, J
    Carver, D
    Johnson, C
    Gerovac, B
    Gingold, D
    INTERNET ECONOMICS, 1997, : 435 - 452