Font Size: a A A

Security Architecture Design And Application For Medical Information System

Posted on:2018-08-16Degree:MasterType:Thesis
Country:ChinaCandidate:S J XueFull Text:PDF
GTID:2348330542451922Subject:Biomedical engineering
Abstract/Summary:PDF Full Text Request
With the development of economy and the beneficial medical policies,medical information systems in our country have been developed rapidly.Medical informatization brings much convenience to people's life.Meanwhile,it is also under threat of more and more serious information security events.Medical information construction in our country is in its infancy.Compared with the international,there is still large gap in the aspects of policies,standards,personnel management,and technologies.Therefore,this paper proposes a medical information security architecture based on the general requirements of medical information industry and integration of international existing standards.Also,security of the Internet automated pharmacy system has been implemented partly in this paper.This paper proposes 12 security services referring to HITSP and IHE specification,based on a five-layer methodology of Security Architecture Design Process,which could satisfy common security requirements of any medical information system.Besides,this paper summarizes common technical constructs of each security service,which drives the selection of technical solutions and data standards.Based on the proposed security services,five services with higher priority have been implemented in the Internet automated pharmacy system:1)Authentication.A central user authentication system is designed for the system,and two solutions are used to implement it:a)Design master subsystem using security modules provided by Apache isis,which is used for unified management and authentication of the users' identification.Other subsystems authenticate users through remote call of REST interface,b)Use the ApacheDS directory server to store and manage users' identity information,and use the built-in Kerberos server to implement Kerberos user authentication of each subsystems.Performance of the two solutions is tested using JMeter tool.The results show that the performance of the second solution is much better than the first solution.2)Access control.Selects the role based access control(RBAC)strategy,and uses the authorization mechanism provided by Apache shiro to realize user authorization.3)Secure communication.HTTPs is deployed between client and server,achieving encryption of the communication data;IPSec VPN is deployed between system nodes to establish secure communication channel,which ensures the safety of communication information.4)Auditing.Uses command and audit modules provided by Apache isis to implement the persistence of audit trail.Also,several query services are provided to make auditors audit events easier from business level.Besides,central audit record repository is designed,implementing the standardization of audit message format and storage of other subsystems' audit records.5)Anonymize.The ARX open source anonymous tool is chosen to anonymize patient dataset.The final data transformation solution is the optimal,which balances the data privacy and data utility.
Keywords/Search Tags:Medical information security, security architecture, authentication, access control, secure communication
PDF Full Text Request
Related items