Please wait a minute...
J4  2010, Vol. 44 Issue (8): 1484-1489    DOI: 10.3785/j.issn.1008-973X.2010.08.009
    
Improvement of data authenticity assurance process
in regional health information system
ZHOU Tian-shu1, LI Jing-song1, YANG Yi-bing1,CHEN Yun-qi2,
XUE Wan-guo2, ZHAO Jun-ping2
1. Healthcare Informatics Engineering Research Center, Zhejiang University, Hangzhou 310027, China;
2. Chinese PLA General Hospital, Beijing 100853, China
Download:   PDF(0KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  

A rolling digest method was proposed for data authenticity assurance process in regional health information system (RHIS) to replace the current threelayer Hash list structure. In the new method, each digest is relative to the former digest, it facilitates accessing, protection, and sharing of huge quantity of medical data in RHIS. Based on relative digest structure, a more flexible method, partially rolling digest method, was designed. By analyzing check times in verification processes, rolling digest method is proved more efficient than Hash list method in locating error files. A 10 000file comparison experiment shows that the verify time drops form 6.71 s as average time in Hash list method to 0.21 s in rolling digest method. In addition, rolling digest method simplifies the second round digest process of threelayer hash list structure, making the entire system more efficient. For its relativity in digests, the rolling digest method provides an effective solution to improve the data authenticity assurance process in RHIS.



Published: 21 September 2010
CLC:     
  TP 309.2  
Cite this article:

ZHOU Tian-Shu, LI Jin-Song, YANG Yi-Bing, CHEN Yun-Ai, XUE Mo-Guo, DIAO Jun-Beng. Improvement of data authenticity assurance process
in regional health information system. J4, 2010, 44(8): 1484-1489.

URL:

http://www.zjujournals.com/eng/10.3785/j.issn.1008-973X.2010.08.009     OR     http://www.zjujournals.com/eng/Y2010/V44/I8/1484


区域医疗系统数据真实性保障流程优化

针对区域医疗系统文件数量巨大、内容重要敏感、共享需求大等特点,提出文件摘要之间相互关联的滚动摘要法,以取代常用的3层哈希列表摘要结构,并在此基础上设计出更灵活的分组滚动摘要法.通过分析哈希列表摘要法和滚动摘要法的文件校验次数,证明新摘要方法文件真实性校验的运行效率远高于哈希列表摘要法.在104个医疗数据文件的对比实验中,新方法的校验时间从原方法平均校验时间671 s缩短到021 s.新方法还简化了3层哈希列表摘要结构的第2轮摘要过程,使系统的整体效率得到较大提高.基于摘要之间的相关性,滚动摘要法为优化区域医疗数据真实性保障流程提供了一种有效的解决方案.

[1] LIN Dawei, CHEN YiMing. Dynamic web page protection based on content integrity [J]. International Journal of Services and Standards, 2007, 3(1): 120135.
[2] ZHU Guohun, MIAO Yuqing. Cooperative monitor Web page based on MD5 [C]∥ Proceedings of the Second International Workshop, Grid and Cooperative Computing 2003.Shanghai: Springer Verlag, 2004: 179182.
[3] ZHOU Xiaoqiang, HUANG H, LOU S. Authenticity and integrity of digital mammography images [J]. IEEE Transactions on Medical Imaging, 2001, 20(8): 784791.
[4] Partners HealthCare System, Inc. What is partners?[EB/OL]. [20090321].http:∥www.partners.org/about/about_whatis.html.
[5] TAKADA A, GUO Jinqiu, TANAKA K, et al. Dolphin project:cooperative regional clinical system centered on clinical information center [J]. Journal of Medical Systems, 2005, 29(4): 391400.
[6] 易红军,佘名高.MD5算法与数字签名[J].计算机与数字工程, 2006, 34(5): 4446.
YI Hongjun, SHE Minggao. MD5 arithmetic and digital signature [J]. Computer and Digital Engineering, 2006, 34(5): 4446.
[7] 张振权,罗新民,齐春.数字签名算法MD5和SHA1的比较及其AVR优化实现[J].网络安全技术与应用, 2005(7): 6467.
ZHANG Zhenquan, LUO Xinming, QI Chun. The comparison of MD5 and SHA1 digital signature algorithms and their optimum realization using AVR [J]. Network Security Technology and Application, 2005(7): 6467.
[8] FIPS PUB 1801, Secure Hash standard (SHS) [S]. U.S: NIST, 1995.
[9] WANG Xiaoyun, YU Hongbo. How to break MD5 and other hash functions [C]∥ Proceedings of the 25th Annual International Cryptology Conference, Santa Barbara: SpringerVerlag, 2005: 1935.
[10] WANG Xiaoyun, YIN Yiqun, YU Hongbo. Finding collisions in the full SHA1 [C]∥ Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Aarhus: SpringerVerlag, 2005, 3621: 1736.
[11] RIJMEN V. Current status of SHA1 [EB/OL]. [20070221]. http:∥www.signatur.rtr.at/repository/rtrsha120070221en.pdf.
[12] National Institute for Science and Technology (NIST). NIST brief comments on recent cryptanalytic attacks on secure hashing functions and the continued security provided by SHA1 [EB/OL]. [20040825]. http:∥csrc.nist.gov/groups/ST/toolkit/documents/shs/hash_standards_comments.pdf.
[13] GUO Jinqiu, TAKADA A, TANAKA K, et al. The development of MML (medical markup language) version 30 as a medical document exchange format for HL7 messages [J]. Journal of Medical Systems, 2004, 28(6): 523533.

[1] NING Zhi-hua, HE Le-nian, HU Zhi-cheng. A high voltage high stability switching-mode controller chip[J]. J4, 2014, 48(3): 377-383.
[2] LI Lin, CHEN Jia-wang,GU Lin-yi, WANG Feng. Variable displacement distributor with valve control for axial piston pump/motor[J]. J4, 2014, 48(1): 29-34.
[3] CHEN Zhao, YU Feng, CHEN Ting-ting. Log-structured even recycle strategy for flash storage[J]. J4, 2014, 48(1): 92-99.
[4] JIANG Zhan, YAO Xiao-ming, LIN Lan-fen. Feature-based adaptive method of ontology mapping[J]. J4, 2014, 48(1): 76-84.
[5] CHEN Di-shi,ZHANG Yu , LI Ping. Ground effect modeling for small-scale unmanned helicopter[J]. J4, 2014, 48(1): 154-160.
[6] HUO Xin-xin, CHU Jin-kui,HAN Bing-feng, YAO Fei. Research on interface circuits of multiple piezoelectric generators[J]. J4, 2013, 47(11): 2038-2045.
[7] YANG Xin, XU Duan-qing, YANG Bing. A parallel computing method for irregular work[J]. J4, 2013, 47(11): 2057-2064.
[8] WANG Yu-qiang,ZHANG Kuan-di,CHEN Xiao-dong. Numerical analysis on interface behavior of
adhesive bonded steel-concrete composite beams
[J]. J4, 2013, 47(9): 1593-1598.
[9] CUI He-liang, ZHANG Dan, SHI Bin. Spatial resolution and its calibration method for Brillouin scattering based distributed sensors[J]. J4, 2013, 47(7): 1232-1237.
[10] PENG Yong, XU Xiao-jian. Numerical analysis of effect of aggregate distribution on splitting strength of asphalt mixtures[J]. J4, 2013, 47(7): 1186-1191.
[11] WU Xiao-rong, QIU Le-miao, ZHANG Shu-you, SUN Liang-feng, GUO Chuan-long. Correlated FMEA method of complex system with linguistic vagueness[J]. J4, 2013, 47(5): 782-789.
[12] JIN Bo, CHEN Cheng, LI Wei. Gait correction algorithm of hexapod walking robot
with semi-round rigid feet
[J]. J4, 2013, 47(5): 768-774.
[13] ZHONG Shi-ying, WU Xiao-jun, CAI Wu-jun, LING Dao-sheng. Development of horizontal sliding model test facility
 for footpad’s lunar soft landing
[J]. J4, 2013, 47(3): 465-471.
[14] YUAN Xing, ZHANG You-yun, ZHU Yong-sheng, HONG Jun,QI Wen-chang. Fault degree evaluation for rolling bearing combining
backward inference with forward inference
[J]. J4, 2012, 46(11): 1960-1967.
[15] YANG Fei, ZHU Zhu, GONG Xiao-jin, LIU Ji-lin. Real-time dynamic obstacle detection and tracking using 3D Lidar[J]. J4, 2012, 46(9): 1565-1571.