ALGORITHM OF ENSURING THE SECURITY OF CONFIDENTIAL DATA OF THE MEDICAL INFORMATION SYSTEM FOR STORAGE AND PROCESSING OF EXAMINATION RESULTS
Abstract
The objectives of the study are to develop and assess the effectiveness of the structure of a cloud platform for storing, processing and organizing medical data, determining a method of protection, in particular, ensuring confidentiality when transferring and storing examination results. To achieve this goal, the tasks of analyzing existing models of information processes and structures in the subject area are being solved, the features of the means for accumulating and processing medical data stored in electronic information systems for patient registration, the architecture of a cloud platform for distributed data storage and an algorithm for ensuring the safety of medical data stored in the cloud are being developed. the platform in electronic form in the form of initial physiological signals (EEG, ECG, EMG, EOG, etc.) recorded during patient examinations; an integrated cloud platform for distributed storage, analysis and systematization of medical data and a security system using the developed protection method are being created; the effectiveness of the proposed algorithm for protecting confidential medical information is analyzed in the context of integration into the developed cloud platform. The proposed method for protecting a medical information system involves the use of an original DICOM file and subsequently a converted PNG image, which is subjected to a pixel encryption algorithm. An algorithm based on chaos theory is used to encrypt the image. The capabilities of chaos systems can significantly increase productivity. Hierarchical division of data streams into levels and standardization of data transfer protocols, as well as their storage formats, allow to form a universal, flexible and reliable medical information system. The proposed architecture has the ability to integrate into existing medical systems. In the course of the work, it was found that the considered protection method is an effective way to ensure the confidentiality of medical system data.
References
information], Sovremennye nauchnye issledovaniya i innovatsii [Modern scientific research
and innovations], 2017, No. 5. Available at: http://web.snauka.ru/issues/2017/05/82546
(accessed 07 October 2019).
2. Health Insurance Portability and Accountability Act. Available at: https://en.wikipedia.org/
wiki/Health_Insurance_Portability_and_Accountability_Act (accessed 08 October 2019).
3. DICOM. Available at: https://ru.wikipedia.org/wiki/DICOM (accessed 08 October 2019).
4. L.-Y. T. a. M.-S. H. Li-Chin Huangc. A reversible data hiding method by histogram shifting in
high quality medical images, The Journals of systems and software, 2013, Vol. 86, pp. 716-727.
5. M.G. a. R.D. Jessica Fridrich. Detecting LSB Steganography in Color and Gray-Scale Images,
Binghamton.
6. N.A. H.A.-C. Fatma E.-Z. A. Elgamal. Secure Medical Images Sharing over Cloud Computing
environment, International Journal of Advanced Computer Science and Applications, 2013,
Vol. 4, pp. 130-138. A. B. K. R. G. a. J. P. S. Digvijay Singh Chauhan, "Double Secret Key
Based Medical Image Watermarking for Secure Telemedicine in Cloud Environment," in 2017
40th International Conference on Telecommunications and Signal Processing (TSP), 2017.
7. Logistic map. Available at: https://en.wikipedia.org/wiki/Logistic_map (accessed 08 October
2019).
8. Abdulrahman Alsalmany. Cloud System for Encryption and Authentication Medical Images,
IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p-ISSN: 2278-8727,
Vol. 20, Issue 1, Ver. II (Jan.-Feb. 2018), pp. 65-75. Available at:
https://www.researchgate.net/publication/332571801_Cloud_System_For_Encryption_And_A
uthentication_Medical_Images (accessed 29 September 2019).
9. Plotnikov A.V., Prilutskiy D.A., Selishchev S.V. Standart DICOM v komp'yuternykh
meditsinskikh tekhnologiyakh [DICOM standard in computer medical technologies]. Available
at: https://mks.ru/library/article/1997/dicom.html (accessed 08 October 2019).
10. Vizual'naya kriptografiya [Visual cryptography]. Available at: http://cryptowiki.net/ index.
php?title=%D0%92%D0%B8%D0%B7%D1%83%D0%B0%D0%BB%D1%8C%D0%B
D%D0%B0%D1%8F_%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B3
%D1%80%D0%B0%D1%84%D0%B8%D1%8F (accessed 08 October 2019).
11. Kotyashichev I.A., Byrylova E.A. Zashchita informatsii v «Oblachnykh tekhnologiyakh» kak
predmet natsional'noy bezopasnosti [Information protection in "Cloud technologies" as a subject
of national security], Molodoy uchenyy [Young scientist], 2015, No. 6.4 (86.4), pp. 30-34.
Available at: https://moluch.ru/archive/86/16357/ (accessed 09 June 2020).
12. Kereytova M.R., Malysh V.N. Informatsionnaya bezopasnost' v meditsinskikh
informatsionnykh sistemakh [Information security in medical information systems], NiKa
[NIK], 2012. Available at: https://cyberleninka.ru/article/n/informatsionnaya-bezopasnost-vmeditsinskih-
informatsionnyh-sistemah (accessed 11 June 2020).
13. Boychenko I.V. Postroenie IT-infrastruktury zdravookhraneniya na osnove paradigmy
oblachnykh vychisleniy [Building IT infrastructure for healthcare based on the paradigm of
cloud computing], Vrach i informatsionnye tekhnologii [Doctor and information technologies],
2011, No. 3. Available at: https://cyberleninka.ru/article/n/postroenie-it-infrastrukturyzdravoohraneniya-
na-osnove-paradigmy-oblachnyh-vychisleniy (accessed 09 June 2020).
14. Rohan Jathanna. Int. Journal of Engineering Research and Application www.ijera.com ISSN:
2248-9622, June 2017, Vol. 7, Issue 6, (Part - 5), pp. 31-38 (accessed 10 June 2020).
15. Krivosheeva Darina. Model' ugroz bezopasnosti v sistemakh distantsionnogo monitoringa
sostoyaniya cheloveka [Model of security threats in systems of remote monitoring of human
condition], Pravovaya informatika [Legal informatics], 2016, No. 3. Available at:
https://cyberleninka.ru/article/n/model-ugroz-bezopasnosti-v-sistemah-distantsionnogomonitoringa-
sostoyaniya-cheloveka (accessed 11 June 2020).
16. Nazarenko G.I., Mikheev A.E., Gorbunov P.A., Guliev Ya.I., Fokht I.A., Fokht O.A. Osobennosti
resheniya problem informatsionnoy bezopasnosti v meditsinskikh informatsionnykh sistemakh
[Features of solving information security problems in medical information systems], Vrach i
informatsionnye tekhnologii [Doctor and information technology], 2007, No. 4. Available at:
https://cyberleninka.ru/article/n/osobennosti-resheniya-problem-informatsionnoy-bezopasnosti-vmeditsinskih-
informatsionnyh-sistemah (accessed 16 October 2020).
17. Gorbunov P.A., Fokht I.A. Problemy informatsionnoy bezopasnosti v meditsinskikh
informatsionnykh sistemakh – teoreticheskie resheniya i prakticheskie razrabotki. Programmnye
sistemy: teoriya i prilozheniya [Information security problems in medical information systems - theoretical
solutions and practical developments. Software systems: theory and applications], ed. by
S.M. Abramova. In 2nd vol. Vol. 1. Moscow: Fizmatlit, 2006, pp. 107-112.
18. Nazarenko G.I, Guliev Ya.I., Ermakov. D.E. Meditsinskie informatsionnye sistemy: teoriya i
praktika [Medical information systems: theory and practice], ed. by G.I. Nazarenko,
G.S. Osipova. Moscow: Fizmatlit, 2005, 320 p.
19. Mikheev V.A. Osnovy postroeniya podsistemy zashchity informatsii mnogofunktsional'noy
informatsionnoy sistemy [Fundamentals of building a subsystem of information security for a
multifunctional information system], Izvestiya YuFU. Tekhnicheskie nauki [Izvestiya SFedU.
Engineering Sciences], 2008, No. 8 (85), pp. 165-167.
20. Klepikov E.A., Yas'ko A.O. Voprosy zashchity konfidentsial'noy meditsinskoy informatsii o
patsiente v meditsinskikh informatsionnykh sistemakh [Issues of protecting confidential medical
information about a patient in medical information systems], Simvol nauki [Symbol of Science],
2016, No. 9-1. Available at: https://cyberleninka.ru/article/n/voprosy-zaschitykonfidentsialnoy-
meditsinskoy-informatsii-o-patsiente-v-meditsinskih-informatsionnyhsistemah
(accessed 16 October 2020).