|
|
Improvement of data authenticity assurance process
in regional health information system |
ZHOU Tian-shu1, LI Jing-song1, YANG Yi-bing1,CHEN Yun-qi2,
XUE Wan-guo2, ZHAO Jun-ping2 |
1. Healthcare Informatics Engineering Research Center, Zhejiang University, Hangzhou 310027, China;
2. Chinese PLA General Hospital, Beijing 100853, China |
|
|
Abstract A rolling digest method was proposed for data authenticity assurance process in regional health information system (RHIS) to replace the current threelayer Hash list structure. In the new method, each digest is relative to the former digest, it facilitates accessing, protection, and sharing of huge quantity of medical data in RHIS. Based on relative digest structure, a more flexible method, partially rolling digest method, was designed. By analyzing check times in verification processes, rolling digest method is proved more efficient than Hash list method in locating error files. A 10 000file comparison experiment shows that the verify time drops form 6.71 s as average time in Hash list method to 0.21 s in rolling digest method. In addition, rolling digest method simplifies the second round digest process of threelayer hash list structure, making the entire system more efficient. For its relativity in digests, the rolling digest method provides an effective solution to improve the data authenticity assurance process in RHIS.
|
Published: 21 September 2010
|
|
区域医疗系统数据真实性保障流程优化
针对区域医疗系统文件数量巨大、内容重要敏感、共享需求大等特点,提出文件摘要之间相互关联的滚动摘要法,以取代常用的3层哈希列表摘要结构,并在此基础上设计出更灵活的分组滚动摘要法.通过分析哈希列表摘要法和滚动摘要法的文件校验次数,证明新摘要方法文件真实性校验的运行效率远高于哈希列表摘要法.在104个医疗数据文件的对比实验中,新方法的校验时间从原方法平均校验时间671 s缩短到021 s.新方法还简化了3层哈希列表摘要结构的第2轮摘要过程,使系统的整体效率得到较大提高.基于摘要之间的相关性,滚动摘要法为优化区域医疗数据真实性保障流程提供了一种有效的解决方案.
|
|
[1] LIN Dawei, CHEN YiMing. Dynamic web page protection based on content integrity [J]. International Journal of Services and Standards, 2007, 3(1): 120135.
[2] ZHU Guohun, MIAO Yuqing. Cooperative monitor Web page based on MD5 [C]∥ Proceedings of the Second International Workshop, Grid and Cooperative Computing 2003.Shanghai: Springer Verlag, 2004: 179182.
[3] ZHOU Xiaoqiang, HUANG H, LOU S. Authenticity and integrity of digital mammography images [J]. IEEE Transactions on Medical Imaging, 2001, 20(8): 784791.
[4] Partners HealthCare System, Inc. What is partners?[EB/OL]. [20090321].http:∥www.partners.org/about/about_whatis.html.
[5] TAKADA A, GUO Jinqiu, TANAKA K, et al. Dolphin project:cooperative regional clinical system centered on clinical information center [J]. Journal of Medical Systems, 2005, 29(4): 391400.
[6] 易红军,佘名高.MD5算法与数字签名[J].计算机与数字工程, 2006, 34(5): 4446.
YI Hongjun, SHE Minggao. MD5 arithmetic and digital signature [J]. Computer and Digital Engineering, 2006, 34(5): 4446.
[7] 张振权,罗新民,齐春.数字签名算法MD5和SHA1的比较及其AVR优化实现[J].网络安全技术与应用, 2005(7): 6467.
ZHANG Zhenquan, LUO Xinming, QI Chun. The comparison of MD5 and SHA1 digital signature algorithms and their optimum realization using AVR [J]. Network Security Technology and Application, 2005(7): 6467.
[8] FIPS PUB 1801, Secure Hash standard (SHS) [S]. U.S: NIST, 1995.
[9] WANG Xiaoyun, YU Hongbo. How to break MD5 and other hash functions [C]∥ Proceedings of the 25th Annual International Cryptology Conference, Santa Barbara: SpringerVerlag, 2005: 1935.
[10] WANG Xiaoyun, YIN Yiqun, YU Hongbo. Finding collisions in the full SHA1 [C]∥ Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Aarhus: SpringerVerlag, 2005, 3621: 1736.
[11] RIJMEN V. Current status of SHA1 [EB/OL]. [20070221]. http:∥www.signatur.rtr.at/repository/rtrsha120070221en.pdf.
[12] National Institute for Science and Technology (NIST). NIST brief comments on recent cryptanalytic attacks on secure hashing functions and the continued security provided by SHA1 [EB/OL]. [20040825]. http:∥csrc.nist.gov/groups/ST/toolkit/documents/shs/hash_standards_comments.pdf.
[13] GUO Jinqiu, TAKADA A, TANAKA K, et al. The development of MML (medical markup language) version 30 as a medical document exchange format for HL7 messages [J]. Journal of Medical Systems, 2004, 28(6): 523533. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|