Improvement of data authenticity assurance process in regional health information system

被引:2
|
作者
Zhou T.-S. [1 ]
Li J.-S. [1 ]
Yang Y.-B. [1 ]
Chen Y.-Q. [2 ]
Xue W.-G. [2 ]
Zhao J.-P. [2 ]
机构
[1] Healthcare Informatics Engineering Research Center, Zhejiang University
[2] Chinese PLA General Hospital
关键词
Data authenticity; Data security; Message digest; Regional health;
D O I
10.3785/j.issn.1008-973X.2010.08.009
中图分类号
学科分类号
摘要
A rolling digest method was proposed for data authenticity assurance process in regional health information system (RHIS) to replace the current three-layer Hash list structure. In the new method, each digest is relative to the former digest, it facilitates accessing, protection, and sharing of huge quantity of medical data in RHIS. Based on relative digest structure, a more flexible method, partially rolling digest method, was designed. By analyzing check times in verification processes, rolling digest method is proved more efficient than Hash list method in locating error files. A 10000-file comparison experiment shows that the verify time drops form 6.71 s as average time in Hash list method to 0.21 s in rolling digest method. In addition, rolling digest method simplifies the second round digest process of three-layer hash list structure, making the entire system more efficient. For its relativity in digests, the rolling digest method provides an effective solution to improve the data authenticity assurance process in RHIS.
引用
收藏
页码:1484 / 1489+1507
相关论文
共 13 条
  • [1] Lin D.-W., Chen Y.-M., Dynamic web page protection based on content integrity, International Journal of Services and Standards, 3, 1, pp. 120-135, (2007)
  • [2] Zhu G.-H., Miao Y.-Q., Co-operative monitor Web page based on MD5, Proceedings of the Second International Workshop, Grid and Cooperative Computing 2003, pp. 179-182, (2004)
  • [3] Zhou X.-Q., Huang H., Lou S., Authenticity and integrity of digital mammography images, IEEE Transactions on Medical Imaging, 20, 8, pp. 784-791, (2001)
  • [4] What is partners
  • [5] Takada A., Guo J.-Q., Tanaka K., Et al., Dolphin project: Cooperative regional clinical system centered on clinical information center, Journal of Medical Systems, 29, 4, pp. 391-400, (2005)
  • [6] Yi H.-J., She M.-G., MD5 arithmetic and digital signature, Computer and Digital Engineering, 34, 5, pp. 44-46, (2006)
  • [7] Zhang Z.-Q., Luo X.-M., Qi C., The comparison of MD5 and SHA-1 digital signature algorithms and their optimum realization using AVR, Network Security Technology and Application, 7, pp. 64-67, (2005)
  • [8] Secure Hash standard (SHS), (1995)
  • [9] Wang X.-Y., Yu H.-B., How to break MD5 and other hash functions, Proceedings of the 25th Annual International Cryptology Conference, pp. 19-35, (2005)
  • [10] Wang X.-Y., Yin Y.-Q., Yu H.-B., Finding collisions in the full SHA-1, Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 3621, pp. 17-36, (2005)