Please wait a minute...
J4  2010, Vol. 44 Issue (8): 1484-1489    DOI: 10.3785/j.issn.1008-973X.2010.08.009
自动化技术、计算机技术     
区域医疗系统数据真实性保障流程优化
周天舒1,李劲松1,杨一兵1,陈运奇2,薛万国2,赵军平2
1.浙江大学 数字化医疗工程研究中心, 浙江 杭州 310027; 2.解放军总医院, 北京100853
Improvement of data authenticity assurance process
in regional health information system
ZHOU Tian-shu1, LI Jing-song1, YANG Yi-bing1,CHEN Yun-qi2,
XUE Wan-guo2, ZHAO Jun-ping2
1. Healthcare Informatics Engineering Research Center, Zhejiang University, Hangzhou 310027, China;
2. Chinese PLA General Hospital, Beijing 100853, China
 全文: PDF  HTML
摘要:

针对区域医疗系统文件数量巨大、内容重要敏感、共享需求大等特点,提出文件摘要之间相互关联的滚动摘要法,以取代常用的3层哈希列表摘要结构,并在此基础上设计出更灵活的分组滚动摘要法.通过分析哈希列表摘要法和滚动摘要法的文件校验次数,证明新摘要方法文件真实性校验的运行效率远高于哈希列表摘要法.在104个医疗数据文件的对比实验中,新方法的校验时间从原方法平均校验时间671 s缩短到021 s.新方法还简化了3层哈希列表摘要结构的第2轮摘要过程,使系统的整体效率得到较大提高.基于摘要之间的相关性,滚动摘要法为优化区域医疗数据真实性保障流程提供了一种有效的解决方案.

Abstract:

A rolling digest method was proposed for data authenticity assurance process in regional health information system (RHIS) to replace the current threelayer Hash list structure. In the new method, each digest is relative to the former digest, it facilitates accessing, protection, and sharing of huge quantity of medical data in RHIS. Based on relative digest structure, a more flexible method, partially rolling digest method, was designed. By analyzing check times in verification processes, rolling digest method is proved more efficient than Hash list method in locating error files. A 10 000file comparison experiment shows that the verify time drops form 6.71 s as average time in Hash list method to 0.21 s in rolling digest method. In addition, rolling digest method simplifies the second round digest process of threelayer hash list structure, making the entire system more efficient. For its relativity in digests, the rolling digest method provides an effective solution to improve the data authenticity assurance process in RHIS.

出版日期: 2010-09-21
:     
基金资助:

国家科技支撑计划资助项目(2006BAH02A28).

作者简介: 周天舒(1983-),男,浙江富阳人,硕士生,从事医学信息学研究. E-mail: 20815076@gstu.zju.edu.cn
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  

引用本文:

周天舒, 李劲松, 杨一兵, 陈运奇, 薛万国, 赵军平. 区域医疗系统数据真实性保障流程优化[J]. J4, 2010, 44(8): 1484-1489.

ZHOU Tian-Shu, LI Jin-Song, YANG Yi-Bing, CHEN Yun-Ai, XUE Mo-Guo, DIAO Jun-Beng. Improvement of data authenticity assurance process
in regional health information system. J4, 2010, 44(8): 1484-1489.

链接本文:

http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2010.08.009        http://www.zjujournals.com/eng/CN/Y2010/V44/I8/1484

[1] LIN Dawei, CHEN YiMing. Dynamic web page protection based on content integrity [J]. International Journal of Services and Standards, 2007, 3(1): 120135.
[2] ZHU Guohun, MIAO Yuqing. Cooperative monitor Web page based on MD5 [C]∥ Proceedings of the Second International Workshop, Grid and Cooperative Computing 2003.Shanghai: Springer Verlag, 2004: 179182.
[3] ZHOU Xiaoqiang, HUANG H, LOU S. Authenticity and integrity of digital mammography images [J]. IEEE Transactions on Medical Imaging, 2001, 20(8): 784791.
[4] Partners HealthCare System, Inc. What is partners?[EB/OL]. [20090321].http:∥www.partners.org/about/about_whatis.html.
[5] TAKADA A, GUO Jinqiu, TANAKA K, et al. Dolphin project:cooperative regional clinical system centered on clinical information center [J]. Journal of Medical Systems, 2005, 29(4): 391400.
[6] 易红军,佘名高.MD5算法与数字签名[J].计算机与数字工程, 2006, 34(5): 4446.
YI Hongjun, SHE Minggao. MD5 arithmetic and digital signature [J]. Computer and Digital Engineering, 2006, 34(5): 4446.
[7] 张振权,罗新民,齐春.数字签名算法MD5和SHA1的比较及其AVR优化实现[J].网络安全技术与应用, 2005(7): 6467.
ZHANG Zhenquan, LUO Xinming, QI Chun. The comparison of MD5 and SHA1 digital signature algorithms and their optimum realization using AVR [J]. Network Security Technology and Application, 2005(7): 6467.
[8] FIPS PUB 1801, Secure Hash standard (SHS) [S]. U.S: NIST, 1995.
[9] WANG Xiaoyun, YU Hongbo. How to break MD5 and other hash functions [C]∥ Proceedings of the 25th Annual International Cryptology Conference, Santa Barbara: SpringerVerlag, 2005: 1935.
[10] WANG Xiaoyun, YIN Yiqun, YU Hongbo. Finding collisions in the full SHA1 [C]∥ Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Aarhus: SpringerVerlag, 2005, 3621: 1736.
[11] RIJMEN V. Current status of SHA1 [EB/OL]. [20070221]. http:∥www.signatur.rtr.at/repository/rtrsha120070221en.pdf.
[12] National Institute for Science and Technology (NIST). NIST brief comments on recent cryptanalytic attacks on secure hashing functions and the continued security provided by SHA1 [EB/OL]. [20040825]. http:∥csrc.nist.gov/groups/ST/toolkit/documents/shs/hash_standards_comments.pdf.
[13] GUO Jinqiu, TAKADA A, TANAKA K, et al. The development of MML (medical markup language) version 30 as a medical document exchange format for HL7 messages [J]. Journal of Medical Systems, 2004, 28(6): 523533.

[1] 宁志华,何乐年,胡志成. 一种高压高可靠性开关电源控制芯片[J]. J4, 2014, 48(3): 377-383.
[2] 李林,陈家旺,顾临怡,王峰. 轴向柱塞泵/马达变量阀配流机构[J]. J4, 2014, 48(1): 29-34.
[3] 陈钊,余锋,陈婷婷. 基于日志结构的闪存均衡回收策略[J]. J4, 2014, 48(1): 92-99.
[4] 蒋湛,姚晓明,林兰芬. 基于特征自适应的本体映射方法[J]. J4, 2014, 48(1): 76-84.
[5] 陈迪仕 ,张宇,李平. 微小型无人直升机地面效应建模[J]. J4, 2014, 48(1): 154-160.
[6] 霍新新,褚金奎,韩冰峰,姚斐.  基于多个压电换能器的接口电路[J]. J4, 2013, 47(11): 2038-2045.
[7] 杨鑫,许端清,杨冰. 基于不规则性的并行计算方法[J]. J4, 2013, 47(11): 2057-2064.
[8] 王玉强,张宽地,陈晓东. 胶黏钢-混凝土组合梁的界面行为数值分析[J]. J4, 2013, 47(9): 1593-1598.
[9] 崔何亮, 张丹, 施斌.  布里渊分布式传感的空间分辨率及标定方法[J]. J4, 2013, 47(7): 1232-1237.
[10] 彭勇,徐小剑. 集料分布对沥青混合料劈裂强度影响数值分析[J]. J4, 2013, 47(7): 1186-1191.
[11] 伍晓榕,裘乐淼,张树有,孙良峰,郭传龙. 模糊语境下的复杂系统关联FMEA方法[J]. J4, 2013, 47(5): 782-789.
[12] 金波,陈诚,李伟. 具有半球形足端的六足机器人步态修正算法[J]. J4, 2013, 47(5): 768-774.
[13] 钟世英, 吴晓君, 蔡武军, 凌道盛, 蒋祝金, 王顺玉. 月面软着陆足垫水平拖曳模型试验装置研制[J]. J4, 2013, 47(3): 465-471.
[14] 袁幸,朱永生,张优云,洪军,祁文昌. 基于正反问题的滚动轴承损伤程度评估[J]. J4, 2012, 46(11): 1960-1967.
[15] 杨飞,朱株,龚小谨,刘济林. 基于三维激光雷达的动态障碍实时检测与跟踪[J]. J4, 2012, 46(9): 1565-1571.