Teleradiology mobile internet system with a new information security solution

被引:0
|
作者
Satoh, Hitoshi [1 ]
Niki, Noboru [2 ]
Eguchi, Kenji [3 ]
Ohmatsu, Hironobu
Kusumoto, Masahiko [4 ]
Kaneko, Masahiro [5 ]
Moriyama, Noriyuki [5 ]
机构
[1] Tokyo Healthcare Univ, Fac Healthcare, Tokyo, Japan
[2] Univ Tokushima, Dept Opt Sci, Tokushima, Japan
[3] Teikyou Univ, Sch Med, Tokyo, Japan
[4] Natl Canc Ctr Hosp East, Kashiwa, Chiba, Japan
[5] Tokyo Midtown Med Ctr, Tokyo, Japan
关键词
computer-aided diagnosis workstation; web medical image conference; cryptography; secret sharing scheme; teleradiology; tokenization; token; data center; internet; Individual number IC card; AIDED DIAGNOSIS SYSTEM; HELICAL CT IMAGES;
D O I
10.1117/12.2043377
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We have developed an external storage system by using secret sharing scheme and tokenization for regional medical cooperation, PHR service and information preservation. The use of mobile devices such as smart phones and tablets will be accelerated for a PHR service, and the confidential medical information is exposed to the risk of damage and intercept. We verified the transfer rate of the sending and receiving of data to and from the external storage system that connected it with PACS by the Internet this time. External storage systems are the data centers that exist in Okinawa, in Osaka, in Sapporo and in Tokyo by using secret sharing scheme. PACS continuously transmitted 382 CT images to the external data centers. Total capacity of the CT images is about 200MB. The total time that had been required to transmit was about 250 seconds. Because the preservation method to use secret sharing scheme is applied, security is strong. But, it also takes the information transfer time of this system too much. Therefore, DICOM data is masked to the header information part because it is made to anonymity in our method. The DICOM data made anonymous is preserved in the data base in the hospital. Header information including individual information is divided into two or more tallies by secret sharing scheme, and preserved at two or more external data centers. The token to relate the DICOM data anonymity made to header information preserved outside is strictly preserved in the token server. The capacity of header information that contains patient's individual information is only about 2% of the entire DICOM data. This total time that had been required to transmit was about 5 seconds. Other, common solutions that can protect computer communication networks from attacks are classified as cryptographic techniques or authentication techniques. Individual number IC card is connected with electronic certification authority of web medical image conference system. Individual number IC card is given only to the person to whom the authority to operate web medical image conference system was given.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Food security information on the Internet
    Parris, TM
    ENVIRONMENT, 1997, 39 (02): : 44 - 45
  • [32] Information security in the internet society
    Imai, Hideki
    Kyokai Joho Imeji Zasshi/Journal of the Institute of Image Information and Television Engineers, 2002, 56 (07):
  • [33] Internet information security strategies
    2001, Radio i svyaz'
  • [34] The Research on Security Technology of Mobile Internet
    Zheng Hongjian
    Zhang Pengfei
    Xue Fei
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 5223 - 5227
  • [35] Security in vehicular networks for the mobile internet
    Lindlbauer, Marc
    VDI Berichte, 2007, (2016): : 185 - 200
  • [36] Mobile internet: content, security and terminal
    Guo, Jun
    Cho, Sung Ho
    Fu, Xiaoming
    Ansari, Nirwan
    Ji, Hong
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (14) : 2062 - 2064
  • [37] Security Strategy for Mobile Police Information System Using SMS
    He, Rongyu
    Qin, Zheng
    Wang, Fei
    Chang, Chaowen
    Qin, Xi
    WIRELESS PERSONAL COMMUNICATIONS, 2009, 51 (02) : 349 - 364
  • [38] Security Strategy for Mobile Police Information System Using SMS
    Rongyu He
    Zheng Qin
    Fei Wang
    Chaowen Chang
    Xi Qin
    Wireless Personal Communications, 2009, 51 : 349 - 364
  • [39] The Study of Content Security for Mobile Internet
    Xu, Qianfang
    Guo, Jun
    Xiao, Bo
    WIRELESS PERSONAL COMMUNICATIONS, 2012, 66 (03) : 523 - 539
  • [40] Security Framew ork of Mobile Internet
    Wei Liang (China Academy of Telecommunication Research of MIIT
    ZTE Communications, 2009, 7 (04) : 31 - 34