Improvement of data authenticity assurance process
in regional health information system
ZHOU Tian-shu1, LI Jing-song1, YANG Yi-bing1,CHEN Yun-qi2,
XUE Wan-guo2, ZHAO Jun-ping2
1. Healthcare Informatics Engineering Research Center, Zhejiang University, Hangzhou 310027, China;
2. Chinese PLA General Hospital, Beijing 100853, China
A rolling digest method was proposed for data authenticity assurance process in regional health information system (RHIS) to replace the current threelayer Hash list structure. In the new method, each digest is relative to the former digest, it facilitates accessing, protection, and sharing of huge quantity of medical data in RHIS. Based on relative digest structure, a more flexible method, partially rolling digest method, was designed. By analyzing check times in verification processes, rolling digest method is proved more efficient than Hash list method in locating error files. A 10 000file comparison experiment shows that the verify time drops form 6.71 s as average time in Hash list method to 0.21 s in rolling digest method. In addition, rolling digest method simplifies the second round digest process of threelayer hash list structure, making the entire system more efficient. For its relativity in digests, the rolling digest method provides an effective solution to improve the data authenticity assurance process in RHIS.
ZHOU Tian-Shu, LI Jin-Song, YANG Yi-Bing, CHEN Yun-Ai, XUE Mo-Guo, DIAO Jun-Beng. Improvement of data authenticity assurance process
in regional health information system. J4, 2010, 44(8): 1484-1489.
[1] LIN Dawei, CHEN YiMing. Dynamic web page protection based on content integrity [J]. International Journal of Services and Standards, 2007, 3(1): 120135.
[2] ZHU Guohun, MIAO Yuqing. Cooperative monitor Web page based on MD5 [C]∥ Proceedings of the Second International Workshop, Grid and Cooperative Computing 2003.Shanghai: Springer Verlag, 2004: 179182.
[3] ZHOU Xiaoqiang, HUANG H, LOU S. Authenticity and integrity of digital mammography images [J]. IEEE Transactions on Medical Imaging, 2001, 20(8): 784791.
[4] Partners HealthCare System, Inc. What is partners?[EB/OL]. [20090321].http:∥www.partners.org/about/about_whatis.html.
[5] TAKADA A, GUO Jinqiu, TANAKA K, et al. Dolphin project:cooperative regional clinical system centered on clinical information center [J]. Journal of Medical Systems, 2005, 29(4): 391400.
[6] 易红军,佘名高.MD5算法与数字签名[J].计算机与数字工程, 2006, 34(5): 4446.
YI Hongjun, SHE Minggao. MD5 arithmetic and digital signature [J]. Computer and Digital Engineering, 2006, 34(5): 4446.
[7] 张振权,罗新民,齐春.数字签名算法MD5和SHA1的比较及其AVR优化实现[J].网络安全技术与应用, 2005(7): 6467.
ZHANG Zhenquan, LUO Xinming, QI Chun. The comparison of MD5 and SHA1 digital signature algorithms and their optimum realization using AVR [J]. Network Security Technology and Application, 2005(7): 6467.
[8] FIPS PUB 1801, Secure Hash standard (SHS) [S]. U.S: NIST, 1995.
[9] WANG Xiaoyun, YU Hongbo. How to break MD5 and other hash functions [C]∥ Proceedings of the 25th Annual International Cryptology Conference, Santa Barbara: SpringerVerlag, 2005: 1935.
[10] WANG Xiaoyun, YIN Yiqun, YU Hongbo. Finding collisions in the full SHA1 [C]∥ Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Aarhus: SpringerVerlag, 2005, 3621: 1736.
[11] RIJMEN V. Current status of SHA1 [EB/OL]. [20070221]. http:∥www.signatur.rtr.at/repository/rtrsha120070221en.pdf.
[12] National Institute for Science and Technology (NIST). NIST brief comments on recent cryptanalytic attacks on secure hashing functions and the continued security provided by SHA1 [EB/OL]. [20040825]. http:∥csrc.nist.gov/groups/ST/toolkit/documents/shs/hash_standards_comments.pdf.
[13] GUO Jinqiu, TAKADA A, TANAKA K, et al. The development of MML (medical markup language) version 30 as a medical document exchange format for HL7 messages [J]. Journal of Medical Systems, 2004, 28(6): 523533.