Teleradiology mobile internet system with a new information security solution

被引:0
|
作者
Satoh, Hitoshi [1 ]
Niki, Noboru [2 ]
Eguchi, Kenji [3 ]
Ohmatsu, Hironobu
Kusumoto, Masahiko [4 ]
Kaneko, Masahiro [5 ]
Moriyama, Noriyuki [5 ]
机构
[1] Tokyo Healthcare Univ, Fac Healthcare, Tokyo, Japan
[2] Univ Tokushima, Dept Opt Sci, Tokushima, Japan
[3] Teikyou Univ, Sch Med, Tokyo, Japan
[4] Natl Canc Ctr Hosp East, Kashiwa, Chiba, Japan
[5] Tokyo Midtown Med Ctr, Tokyo, Japan
关键词
computer-aided diagnosis workstation; web medical image conference; cryptography; secret sharing scheme; teleradiology; tokenization; token; data center; internet; Individual number IC card; AIDED DIAGNOSIS SYSTEM; HELICAL CT IMAGES;
D O I
10.1117/12.2043377
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We have developed an external storage system by using secret sharing scheme and tokenization for regional medical cooperation, PHR service and information preservation. The use of mobile devices such as smart phones and tablets will be accelerated for a PHR service, and the confidential medical information is exposed to the risk of damage and intercept. We verified the transfer rate of the sending and receiving of data to and from the external storage system that connected it with PACS by the Internet this time. External storage systems are the data centers that exist in Okinawa, in Osaka, in Sapporo and in Tokyo by using secret sharing scheme. PACS continuously transmitted 382 CT images to the external data centers. Total capacity of the CT images is about 200MB. The total time that had been required to transmit was about 250 seconds. Because the preservation method to use secret sharing scheme is applied, security is strong. But, it also takes the information transfer time of this system too much. Therefore, DICOM data is masked to the header information part because it is made to anonymity in our method. The DICOM data made anonymous is preserved in the data base in the hospital. Header information including individual information is divided into two or more tallies by secret sharing scheme, and preserved at two or more external data centers. The token to relate the DICOM data anonymity made to header information preserved outside is strictly preserved in the token server. The capacity of header information that contains patient's individual information is only about 2% of the entire DICOM data. This total time that had been required to transmit was about 5 seconds. Other, common solutions that can protect computer communication networks from attacks are classified as cryptographic techniques or authentication techniques. Individual number IC card is connected with electronic certification authority of web medical image conference system. Individual number IC card is given only to the person to whom the authority to operate web medical image conference system was given.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] The Study of Content Security for Mobile Internet
    Qianfang Xu
    Jun Guo
    Bo Xiao
    Wireless Personal Communications, 2012, 66 : 523 - 539
  • [42] Security in vehicular networks for the mobile Internet
    Lindlbauer, Marc
    AUTOMOTIVE SECURITY, 2007, 2016 : 185 - 200
  • [43] Infomarker - A new Internet information service system
    Liu, B
    Lu, ZX
    Gan, Q
    Feng, A
    Wang, P
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2000, 15 (03) : 300 - 304
  • [44] Infomarker — A new Internet information service system
    Bin Liu
    Zengxiang Lu
    Quan Gan
    Ao Feng
    Pu Wang
    Journal of Computer Science and Technology, 2000, 15 : 300 - 304
  • [45] Building the Internet of Things Using a Mobile RFID Security Protocol Based on Information Technology
    Yan, Tao
    Wen, Qiaoyan
    ADVANCES IN COMPUTER SCIENCE, INTELLIGENT SYSTEM AND ENVIRONMENT, VOL 1, 2011, 104 : 143 - 149
  • [46] Information security and information hygiene on internet media
    Varynskyi, Vladyslav
    Varynska, Alla
    Kostytsky, Mychailo
    Kushakova-Kostytska, Nataliia
    NEXO REVISTA CIENTIFICA, 2021, 34 (01): : 120 - 128
  • [47] Solution to mobile agent security
    Wang, Huifang
    Guo, Zhong
    Huang, Yongzhong
    Guo, Jingeng
    Jisuanji Gongcheng/Computer Engineering, 2002, 28 (01):
  • [48] Research and Solution of Existing Security Problems in Current Internet Website System
    Wei, Gaoqi
    Xie, Xiaoyao
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 132 - +
  • [49] New Approach in Information System Security Evaluation
    Breier, Jakub
    Hudec, Ladislav
    2012 IEEE FIRST AESS EUROPEAN CONFERENCE ON SATELLITE TELECOMMUNICATIONS (ESTEL), 2012,
  • [50] Information system security management in the new millennium
    Dhillon, G
    Backhouse, J
    COMMUNICATIONS OF THE ACM, 2000, 43 (07) : 125 - 128