Establishing End-to-End Security in a Nationwide Network for Telecooperation

Ähnliche Dokumente
TKmed eine praxisorientierte Lösung zur Telekooperation für die Versorgung von Schwerverletzten

Long-term archiving of medical data new certified cloud-based solution offers high security and legally approved data management

Titelbild1 ANSYS. Customer Portal LogIn

Quick Reference Guide Schnellstart Anleitung

How to access licensed products from providers who are already operating productively in. General Information Shibboleth login...

TMF projects on IT infrastructure for clinical research

Virtual PBX and SMS-Server

Online Learning in Management

Bayerisches Landesamt für Statistik und Datenverarbeitung Rechenzentrum Süd. z/os Requirements 95. z/os Guide in Lahnstein 13.

SUISSEID DIGITAL PASSPORT AND SIGNATURE

SuisseID Digital passport and signature

TMF: Improving the Organisation and Infrastructure of Medical Research in Cooperative Structures

HIR Method & Tools for Fit Gap analysis

WP2. Communication and Dissemination. Wirtschafts- und Wissenschaftsförderung im Freistaat Thüringen

eurex rundschreiben 094/10

Windows 10 Datenschutzkonfiguration - Anlage zu: Datenschutzfreundlicher Einsatz von Windows 10 -

Lessons learned from co-operation The project Virtual interaction with Web 2.0 in companies

NTP Synchronisierung NTP Synchronizer

Karlsruhe Institute of Technology Die Kooperation von Forschungszentrum Karlsruhe GmbH und Universität Karlsruhe (TH)

Product Lifecycle Manager

VGM. VGM information. HAMBURG SÜD VGM WEB PORTAL - USER GUIDE June 2016

VPN VPN requirements Encryption

Creating OpenSocial Gadgets. Bastian Hofmann

Analog GSM-Gateway TRF

Ingenics Project Portal

Specialist networks for the INSPIRE data themes in Germany

Environmental management in German institutions of higher education: Lessons learnt and steps toward sustainable management

Markus BöhmB Account Technology Architect Microsoft Schweiz GmbH

Novell for Education. Beratung - Systembetreuung - Supporting Implementation von Ausbildungsschienen für österreichische Schulen

Netzwerke und Sicherheit auf mobilen Geräten

Mitglied der Leibniz-Gemeinschaft

Making quality visible. National Quality Certificate for Old Age and Nursing Homes in Austria (NQC)

VGM. VGM information. HAMBURG SÜD VGM WEB PORTAL USER GUIDE June 2016

Customer-specific software for autonomous driving and driver assistance (ADAS)

CA_MESSAGES_ORS_HDTV_IRD_GUIDELINE

Safety action Inspection of welds

Integration of D-Grid Sites in NGI-DE Monitoring

How to develop and improve the functioning of the audit committee The Auditor s View

CA_MESSAGES_ORS_HDTV_IRD_GUIDELINE

The Future Internet in Germany and Europe

Brainloop Secure Boardroom

Digitalfunk BOS Austria

CA_MESSAGES_ORS_HDTV_IRD_GUIDELINE

Effiziente Client-basierte Handover-Verfahren zur Steigerung der Verfügbarkeit von Cloud-Diensten

Word-CRM-Upload-Button. User manual

ELBA2 ILIAS TOOLS AS SINGLE APPLICATIONS

Repositioning University Collections as Scientific Infrastructures.

New Forms of Risk Communication Workshop 6: Arzneimitteltherapiesicherheit (AMTS) Dr. Norbert Paeschke, BfArM

Username and password privileges. Rechteverwaltung. Controlling User Access. Arten von Rechten Vergabe und Entzug von Rechten DBS1 2004

GridMate The Grid Matlab Extension

Ressourcenmanagement in Netzwerken SS06 Vorl. 12,

Lukas Hydraulik GmbH Weinstraße 39 D Erlangen. Mr. Sauerbier. Lukas Hydraulik GmbH Weinstraße 39 D Erlangen. edraulic rescue equipment

Portal for ArcGIS Konzepte und Deployment

Waldwissen.net (Forest-knowledge.net)

NEWSLETTER. FileDirector Version 2.5 Novelties. Filing system designer. Filing system in WinClient

Incident Management in the Canton of Bern

Overall Coordination- and Communication Platform. for electronic and standardised Data-Exchange between. Ports and Hinterland in Rail-Traffic

Quick Installation Guide

2011 European HyperWorks Technology Conference

City West between Modern Age and History: How Does the Balancing Act. between Traditional Retail Structures and International

Big Data Analytics. Fifth Munich Data Protection Day, March 23, Dr. Stefan Krätschmer, Data Privacy Officer, Europe, IBM

Security of IoT. Generalversammlung 21. März 2017

How does the Institute for quality and efficiency in health care work?

From a Qualification Project to the Foundation of a Logistics Network Thuringia. Logistik Netzwerk Thüringen e.v.

HiPath Cordless IP Einrichtung SIRA-Zugang. Administrator Documentation A31003-C1000-M100-2-A9

Corporate Digital Learning, How to Get It Right. Learning Café

H.1 FORMI: An RMI Extension for Adaptive Applications H.1 FORMI: An RMI Extension for Adaptive Applications

IATUL SIG-LOQUM Group

Tools in a Clinical Information System Supporting Clinical Trials at a Swiss University Hospital (Clin Trials, published online 12 August 2014)

Table of Cont 6. 2 General Information... 4 Purpose...4 Documentation...4 Scope of Supply...5 Technical Data Safety Regulations...

iid software tools QuickStartGuide iid USB base driver installation

Guidance Notes for the eservice 'Marketing Authorisation & Lifecycle Management of Medicines' Contents

Workshop on Copernicus and the CAP. A technology vision for IACS

JONATHAN JONA WISLER WHD.global

Instruktionen Mozilla Thunderbird Seite 1

Fraud in Organics: Risk analysis

Mit Legacy-Systemen in die Zukunft. adviion. in die Zukunft. Dr. Roland Schätzle

Concepts and Strategies for personalized telemedical Biofeedback-Therapies

prorm Budget Planning promx GmbH Nordring Nuremberg

BVM-Tutorial 2010: BlueBerry A modular, cross-platform, C++ application framework

User Manual BB-anywhere

Der LeadershipCompass Das richtige Identity Provisioning für ihr Unternehmen

Einsatz einer Dokumentenverwaltungslösung zur Optimierung der unternehmensübergreifenden Kommunikation

LOC Pharma. Anlage. Lieferantenfragebogen Supplier Questionnaire. 9. Is the warehouse temperature controlled or air-conditioned?

Data Mining and Data Analysis using the Example of cross-border Traffic Management during Extreme Weather Events

s 120; s 311; s 312; s 330; s 510; s 511; s 530; s 700

DAS ERSTE MAL UND IMMER WIEDER. ERWEITERTE SONDERAUSGABE BY LISA MOOS

Newest Generation of the BS2 Corrosion/Warning and Measurement System

Finance Research Graz Data Services (FiRe Graz DS) Formal Obligation (German version see below)

Stand der Recherche nach publizierten Identity Management Standards - ISO/IEC, DIN, BSI, CEN/ISSS und OASIS

Energieeffizienz und Erneuerbare Energien Programme der EZ -- ein Zwischenstand

Tube Analyzer LogViewer 2.3

Zertifikate: Nutzen für wen?

Addressing the Location in Spontaneous Networks

Which data and when?

Criteria to Assess the Quality of Virtual Patients (VP)

Cameraserver mini. commissioning. Ihre Vision ist unsere Aufgabe

Transkript:

Establishing End-to-End Security in a Nationwide Network for Telecooperation M. Staemmler a, M. Walz b, G. Weisser c, U. Engelmann d, R. Weininger e, A. Ernstberger f, J. Sturm g a Fachhochschule Stralsund, Deutschland b Ärztliche Stelle für Qualitätssicherung in der Radiologie Hessen, TÜV SÜD Life Service GmbH, Frankfurt, Deutschland c Radiologie und Geschäftsfeld Informationstechnologie und Qualitätssicherung, Universitätsmedizin Mannheim, Deutschland d Chili GmbH, Dossenheim/Heidelberg, Deutschland e pegasus gmbh, Regenstauf, Deutschland f Abteilung für Unfallchirurgie, Universitätsklinikum Regensburg, Deutschland g Akademie der Unfallchirurgie GmbH, München, Deutschland Contact: martin.staemmler@fh-.de MIE2012, Wien, ehealth Pisa, 2012, 29.8.2012 11.5.2012

Establishing End-to-End Security in a Nationwide Network for Telecooperation contents organizing trauma patient treatment system architecture data protection requirements results discussion

organizing trauma patient treatment - trauma treatment (ca. 35000 cases in DE / year, 25% transfers) - white paper German Society of Trauma Surgery (DGU*) - established and reliable collaboration between hospitals regional trauma network characteristics - 10 20 hospitals / trauma network - structured in local, regional and supra- regional trauma care centers (with increasing treatment capabilities) - certified (equipment, workflow) - quality assured with a Traumaregister excellent organisational structure for trauma treatment 55 trauma networks representing ca. 800 hospitals in DE but: communication of image and treatment data? *DGU - Deutsche Gesellschaft für Unfallchirurgie

collaboration within trauma networks analysis of communication infrastructures - heterogene (architecture, coverage, operation, ) per trauma network - nearly not existing between trauma networks objective: unrestricted, national approach TKmed user requirements - emergency consultation - second opinion - transfer - image provisioning - teleradiology RöV* contents: - indication - ad hoc report - image data DICOM and non-dicom objects scalable: functionality, connection with/without HW, easy to use UI stepweise approach: TK-Basis, TK-Router, TK-Gateway *RöV Röntgenverordnung regulation for the application of X-rays

system architecture RIS Web- Viewer store & forward Architektur PACS RIS TK-Basis centralized TK infrastructure Portal DICOM / data Portal usage - mesages - non-dicom data object DICOM services PACS RIS TK-Router implementation / usage - manual up/download - automatic forward - with local Mini PACS PACS TK-Gateway

Establishing End-to-End Security in a Nationwide Network for Telecooperation contents organizing trauma patient treatment system architecture data protection requirements results discussion

data protection requirements user authentication according to national office (BSI*) 2-factor authentication e.g. - knowledge login, password - ownership smartcard, token, mtan - personal attributes finger print, iris scan Tkmed login, pwd Token - clinical user Web- Viewer central TK- Infrastructure access rights LDAP (AUC ) external token service start Viewer login password HTTPS connection authentication forward result test result check token 2-factor authentication forward result forward for check using a secured channel result check compliant procedure - but may be troublesome for clinical users simplification without token, when initiated from a known and safe institution (e.g. proven with a unique and static IP-address) *Bundesamt für Sicherheit in der Informationstechnik, Academy of trauma surgery Akademie der Unfallchirurgie (AUC)

data protection requirements end-to-end security in principal quite easy when using personalized accounts but in emergency cases Who is the person on duty at the recipient site? employing the organisational structure institution 1 department 1 department 2 clinical user 1 doctor clinical user 2 assistant clinical user 3 doctor : clinical user m doctor : department n institution 2 : institution k transmit to department 2 (only department 2 is entitled to receive) access, read, modify medical data by clinical users within department 2 audit trail states and identifies entitled sender and recipient organisational structure via LDAP services

data protection requirements end-to-end security typical approach with a centralized infrastructure institution A centralized infrastructure institution B encrypt decrypt encrypt decrypt RIS gateway DICOM store & forward gateway PACS step 1: sender encrypts data transmission to central infrastructure step 2: decrypt in central infrastructure encrypts for recipient step 3: transmission to recipient recipient decrypts data but: medical data is accessible centrally (at least for administrators) contradicts with data protection regulations

data protection requirements end-to-end security requirements 1 sender encrypts transmission recipient decrypts 2 sender encrypts for department as virtual recipient - transmission any medical doctor of the department is an entitled recipient 3 meta data (e.g. header, thumbnails) are encrypted separately to allow for fast navigation without download of the whole data object asymmetric encryption + secure + risk of compromizing limited to the key owner + life-cycle private / public key nearly unlimited (except techn. renewal) - slow, computational intensive - only the intended recipient is able to decrpyt data objects - PKI required e.g. based on a smartcard complies only to requirement 1 and 3

data protection requirements end-to-end security symmetric key encryption + secure and computational effective + no PKI required + each entitled recipient of a department has access to data objects - life-cycle in principle unlimited (potential key renewal for security) - risk: compromizing the key endangers all data objects compliant to all requirements method of choice but with establishing additional secutity meassures - symmetric key provided at run-time - separation of concern between - operator of the centralized TK-infrastructure - symmetric key management by external trusted services (ESZ)

data protection requirements end-to-end security clincal user webviewer central TKinfrastructure access rights LDAP (AUC) ESZ external trusted service external token service after successful authentication start transmission request symmetric key with ticket forward encrypt object forward using a secured channel check ticket provide symmetric key ciphered in a message check for medical user encrypt meta data store encrypted data in central infrastructure symmetric key supports confiscation protection (infrastructure with encrypted data only, ESZ to protect the symmetric key) ESZ provides further services (role medical user, audit trail, application integrity check)

system architecture RIS Web- Viewer organisation LDAP services PACS RIS TK-Basis centralized TK infrastructure Portal DICOM / data PACS RIS PACS TK-Router TK-Gateway external trusted services (ESZ) token services key management medcial professional integrity, audit trail

results TKmed - implements user requirements - use cases - handling of DICOM and non-dicom objects - clinically oriented address schemas - sender recipient - sender department recipient of a department - stepwise functionality (TK-Basis, TK-Router, TK-Gateway) - compliant to data protection regulation - 2-factor authentication - end-to-end security - external trusted service (audit trail, integrity check) - status - initial operation since autumn 2011 - routine operation since 2012 with trauma networks and hospitals - initial seed money from the AUC, routine operation by end-users - impact evaluation ongoing with the TraumaRegister

discussion - German national Health Telematics Infrastructure - initial specification excluded transfer of large data objects - infrastructure work-in-progress not yet available - German case based record ( Fallakte ) - access control linked to record (at setup time) - regional scope, limited experience with cross regional use - IHE-XDS and XDS-I - requires patient identification as central service - XDS-I needs institutional gateways, leads to local repositories - stepwise functionality: web-based approach (TK-Basis)? - call for tender: applications exhibited limited usability a record based approach is foreseen

Establishing End-to-End Security in a Nationwide Network for Telecooperation thank you for your attention? questions?