Speed-optimized Data Security for Telemedical Applications |
||||||||||||||||||||||||||
|
|
Abstract | |||||||||||||||||||||||||
| Telemedical services rely on the digital transfer of large amounts
of data in a short time. For these services to find acceptance, new hard-
and software concepts are required. The fast exchange of data is well performed
within a high-speed ATM-based network (MAN of Berlin). The fast access
to the data from different platforms poses more difficult problems, which
may be categorized into those relating to standardized data formats and
those relating to different levels of data security across nations. For
the standardized access to image data, a DICOM 3.0 server was implemented.
Images were converted into the DICOM 3.0 standard when necessary. The access
to the server is provided by an implementation of DICOM in Java,
allowing access to the data from different platforms. Data protection measures
to ensure the secure transfer of sensitive patient data have not yet been
solved within the DICOM concept. Using the DICOM/Java modality, we have
investigated different schemes to protect data with as little impact on
data transfer speed as possible. [Top of page] |
||||||||||||||||||||||||||
| Objectives | ||||||||||||||||||||||||||
| The goal of the MedSeC project is to develop methods for ensuring the
confidentiality and integrity of medical image data in the specific context
of high-speed networks, to implement these methods on the basis of existing
standards (DICOM, Java), and to evaluate them using selected real scenarios.
[Top of page] |
||||||||||||||||||||||||||
| Project Description | ||||||||||||||||||||||||||
| Client/server applications within a public network put high demands
on security measures, especially when using sensitive data such as in medicine-related
projects. Unauthorized access to personal data must be prevented at all
cost. In most countries, including Germany, the transfer of image data
over public networks either is not allowed or will soon be regulated by
law. Since already simple image data like a CT scan contain patient-relevant
data in their header written in ASCII format, the transport of images always
involves some amount of private data exchange. Even within the hospital
itself, access to images should only be granted to the attending physician
and other authorized people.
This is even more valid for the public network to which most university hospitals are connected nowadays. Since a certain exchange of information is still needed between different locations, the complete isolation of a hospital is not an alternative. Most internal hospital networks are separated from the public networks by firewalls, which allow the transfer of data if initiated from within the hospital. Before transport, patient-relevant information must be encrypted. Whereas de- and encryption are not the speed-limiting factor in conventional networks, they play a significant role if highspeed networks are involved. Of equal importance is the consideration that data communication should build upon existing standards rather than any proprietary singular solutions. This concept must be further extended for hospitals since the existence of different platforms within different departments is a well-known problem. This situation is aggravated by the fact that most medical users are not computer experts. During the last few years much effort has been made to connect different platforms via standardized network protocols. The DICOM 3.0 standard was developed for medical image interchange. The use of WWW and HTML has triggered the development of platform-independent software using Java. |
||||||||||||||||||||||||||
| Under the auspices of the Bundesministerium für Forschung und Zukunft (BMBF) and the Deutsches Forschungsnetz (DFN), a Metropolitan Area Network (MAN) has been installed in Berlin that employs the Asynchronous Transfer Mode (ATM) to achieve a data transfer speed of up to 155 Mbit/s. Within the framework of the MedSeC project, the network links the University Hospital Benjamin Franklin of the Free University (UKBF) and the computer science department of the Technical University (TUB). Network linkage enables access to two comprehensive locally installed software programs. | ||||||||||||||||||||||||||
| The first software program allows the three-dimensional reconstruction, interactive manipulation and fusion of different tomographic image data. This system is mainly used for research in functional MRI. The main application consists of the overlay of functional active brain areas after special stimulation paradigms onto the 3D reconstructed cortex. The images of the functionally stimulated areas have different geometry and data structure. The data, overlaid with colors that correspond to their interpretation, allow the identification of the anatomical structure of the functional areas. | ||||||||||||||||||||||||||
![]() |
The second software system uses special MR sequences in one of the university hospitals (UKBF), serving for the early diagnosis of acute ischemic infarcts. After special image-processing methods, the differential diagnosis and the exact determination of the so-called apparent diffusion coefficient (ADC) using a histogram-based cluster analysis are greatly improved especially in cases of small, heterogeneous or irregularly shaped infarcts. | |||||||||||||||||||||||||
| The data sets including preprocessed data and derived images are transferred from various image modalities in platform-dependent file format to an intermediate server. There they are cached, converted into DICOM and encrypted. They are subsequently stored in a database. Data subsets earmarked for external evaluation or further processing by application servers are transferred to the external DICOM server where they are temporarily stored and can be subsequently accessed by authorized users. | ||||||||||||||||||||||||||
| Medical services offered by the different hospitals and universities
in Berlin are available via a highspeed MAN. DICOM is used for the standardized
communication and the exchange of image data between different image modalities
and applications servers. Platform-independent access is possible via a
WWW interface through the use of CGI scripts or Java applets. Data security
is provided by a security protocol or by an extension of the DICOM protocol.
To account for data security within DICOM, a modification of the standard
is necessary. For the application layer encryption, two independent
modifications are possible: a new DICOM transfer syntax and/or the use
of a new DICOM element containing the whole patient-relevant information
in encrypted form. A modification of the DICOM protocol version is necessary
for the transport layer encryption. Encryption with hardware support confines
the communication to predefined partners with the same hardware. It may
therefore lead to difficulties in environments with changing short-term
projects or when communicating with specialists who do not possess the
same hardware. Within this particular project, priority is therefore given
to software-only solutions. [Top of page] |
||||||||||||||||||||||||||
| Results / Publications | ||||||||||||||||||||||||||
The MedSeC project is still under development. The main results are
presented below. For more details see under publications.
|
||||||||||||||||||||||||||
Evaluation and enhancement of DICOM-related softwareWithin the MedSeC project, the implementation of tools utilizing the DICOM standard is based on three software packages:
The DICOM server implemented in Java has the advantage of platform
independence and has been used to implement more recent tools requiring
DICOM communication and display functionality. The RSNA library, which
allows the integration of databases for the image server, was used to develop
the conversion software. This library has a clear performance advantage
over the other two solutions with regard to data encoding and decoding.
However, it is not an object-oriented implementation, which is a disadvantage
for a more sophisticated development. We also took commercial implementations
into consideration but concluded that for the given research purposes their
advantages do not justify the additional costs. |
||||||||||||||||||||||||||
| For query/retrieval and for viewing of the DICOM data a Java-Client was implemented. By utilizing Java, this software can be executed on every platform for which a Java implementation exists (PC, Mac, almost all UNIX platforms as well as various other systems). Generally, the client software can be executed within every appropriately equipped Web browser. In the project, we use the Netscape Communicator. That way the same client software can be used, independent of the client computer plaftorm and its location in the network. | ||||||||||||||||||||||||||
| Our project partners - the Surgical Research Unit OP2000, situated in the Robert-Rössle-Klinik at the Max-Delbrück-Centre, Charité University Hospital, Humboldt University (location Berlin-Buch), directed by Professor Dr. P. M. Schlag and coordinated by Dr. G. Graschew - adapted the Mallinckrodt DICOM software for IRIX 6.2 and 6.3 operating system and installed it on SGI Onyx and SGI O2 computers (contact: Dr. G. Bellaire). The installation was succesfully tested internally and via the DICOM server at the UKBF. Aimed as an extension proposal for the DICOM standard, various compression methods for digital stereoscopic video sequences were implemented and tested. Furthermore, a cooperation with Informix was set up in order to deploy their IUS database as a backbone of the Mallinckrodt DICOM server. | ||||||||||||||||||||||||||
Evaluation of available security technologies and toolsWe have chosen the following cryptographic libraries: For C/C++: SSLeay 0.8.1 (ftp://ftp.psy.uq.oz.au/pub/Crypto/) For Java: Cryptix 2.2 (http://www.systemics.com/software/cryptix-java/index.html) The SSLeay Toolkit incorporates interfaces toward various cryptographic
standards (IDEA, RSA, DES, RC2, RC4, MD5, MD2, Blowfish) as well as to
SSL version 2 and 3. |
||||||||||||||||||||||||||
|
|
Security architecture for telemedical applicationsTo establish a secure communication the following concepts, with reference to the OSI layer model, were tested:
We have to distinguish between two basically different application cases:
The DICOM standard does not yet define mechanisms for a secure data
transfer. In cooperation with the DICOM working group, we are currently
implementing a procedure that allows only the patient-relevant data fields
to be encrypted. This is advantageous in that the user can determine within
the application what part of the data should be encrypted. |
|||||||||||||||||||||||||
Implementation of security mechanisms and services in C and JavaOn-line encryption
|
||||||||||||||||||||||||||
|
|
Off-line encryptionWe have implemented a method for partial encryption of DICOM objects using Java and the Cryptix library. Using this method, original data elements are cleared or filled with meaningless information while the original data are stored in encrypted form in an additional group. This approach allows data encryption and storage without undermining the DICOM standard. Therefore, DICOM-based applications can work with these data if they do not depend on the encrypted information, for example our analysis tool for special MR sequences. Secured applications decrypt the data and put them back in their original place. The cryptographic application currently implements the cycles retrieve/encrypt/store, retrieve/decrypt/store and retrieve/decrypt/view for patient datasets. It allows the retrieval of non-encrypted DICOM datasets from a secure internal server, encryption and storage of those encrypted datasets on a network-wide accessible server, and vice versa. MeasurementsThe transfer speed of the online encryption method is displayed in Table
1. All measurements were performed between a DEC 3000/600 and a
DEC Alphastation 255/4. The maximum transfer speed was limited by
the hard-disk speed. Memory-based ATM data transfer reached up to 13 Mbyte/s.
A comparison of online and offline encryption transfer speeds
is depicted in Table 2.
|
|||||||||||||||||||||||||
|
|
DemoClick here for a demo applet, which demonstrates the off-line encryption of DICOM datasets as implemented in the project. The demo applet offers only a few features of the full version, but it uses essentially the same code and therefore the same mechanisms. It combines DICOM access with encryption. |
|||||||||||||||||||||||||
|
|
Secure DICOM services:
|
|||||||||||||||||||||||||
| Acknowledgments | ||||||||||||||||||||||||||
|