簡易檢索 / 詳目顯示

研究生: 郭綸益
Kuo, Lun-Yi
論文名稱: 遠距醫療會診系統之安全機制
Security Mechanism in a Web-Based Medical Teleconsultation System
指導教授: 詹寶珠
Chung, Pau-Choo
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2007
畢業學年度: 95
語文別: 英文
論文頁數: 70
中文關鍵詞: 遠距醫療遠距會診安全機制
外文關鍵詞: Security, teleconsultation, kerberos
相關次數: 點閱:78下載:10
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  •   隨著醫療資訊的電子化與網路發展,醫師們得以藉由遠距醫療會診系統突破地理限制而共同進行病情的討論。但是在網路傳遞個人的醫療隱私會有被他人擷取的風險。由於醫療資訊具相當高的敏感性,若在進行遠距會診時不能提供適當的保護措施,不但會因此降低病患對醫療機構的信任,更有可能會延誤了就醫的時機。
      在本篇論文中,利用Kerberos 認證協定與對稱式加密,針對一個遠距醫療會診系統的運作設計了一套安全機制,包含能夠在每次通訊連線建立時驗證雙方的身份,並且使得每次的通訊內容受到加密的保護。此外為了讓使用者能透過網頁瀏覽器進行遠距會診時提供身份認證,亦提出了透過http連線實現使用Kerberos進行登入時身份驗證方法。然而,因為會診進行時所有的通訊內容必須由伺服器加密後傳送給所有參與者,若每一個參與會診的人皆使用不同的金鑰進行加密運算便會影響會診進行時伺服器的效能,為此我們提出了一個會議金鑰的發送方法(Conference Key Distribution, CKD),讓同一會診中的所有參與者能使用相同的金鑰進行加解密,以降低伺服器的運算負擔。

      With the medical record digitalization and network development, doctors can take advantage of participating in Teleconsultation to discuss patient’s syndrome, overcoming the geographic distance. But meanwhile it also implicates that the personal medical privacy would be transmitted on a public network. If we cannot provide proper protection for the Medical Data Transmission, consequently it would lower the trust of both patients and doctors to this system.
      In this thesis, utilizing Kerberos Authentication and Symmetric-key Cryptography, we design a security mechanism for a Web-based Medical Teleconsultation System, which includes Authentication and Cryptographic Key Exchange to ensure that transmission session in the teleconsultation is authorized and protected by encryption. In order to enable physicians accessing teleconsultation system through web browser, we design a login certification mechanism over HTTP fulfilled with Kerberos. Besides, to avoid the affection from encryption/ decryption with different key during a teleconsultation, this might sap the server’s efficiency. Therefore, we design a Conference Key Distribution (CKD) procedure, which allows all participants in the same teleconsultation using the same Key for encryption/ decryption in order to ease the server’s load.

    CHAPTER 1 INTRODUCTION............................................1 CHAPTER 2 SECURITY PROTOCOL.......................................5 2.1 KERBEROS INTRODUCTION....................................................................................7 2.2 THE WAY KERBEROS WORKS................................................................................8 Authentication service...........................................................................................9 Ticket-granting service........................................................................................11 CHAPTER 3 WEB-BASED TELECONSULTATION SYSTEM......................17 3.1 TELECONSULTATION WEB SERVER......................................................................18 3.2 TELECONSULTATION APPLICATION......................................................................19 3.3 REGISTER SERVER...............................................................................................20 CHAPTER 4 SECURITY MECHANISM.....................................22 4.1 TELECONSULTATION SYSTEM SECURITY ANALYSIS..............................................23 4.2 INITIALIZATION MODULE....................................................................................26 4.3 SECURESOCKET..................................................................................................30 4.4 AUTHENTICATION OVER HTTP...........................................................................35 4.5 CONFERENCE KEY DISTRIBUTION.......................................................................41 4.6 REGISTER SERVER SECURITY..............................................................................46 CHAPTER 5 SECURITY ANALYSIS AND PERFORMANCE EVALUATE.............51 5.1 SECURITY ANALYSIS............................................................................................51 5.1.1 Passive attacks............................................................................................51 5.1.2 Active attacks..............................................................................................53 5.1.3 Summary.....................................................................................................58 5.2 PERFORMANCE ANALYSIS OF CONFERENCE KEY ENCRYPTION...........................60 CHAPTER 6 CONCLUSION.............................................67 REFERENCES........................................................70

    [1] J. Bai, Y.Zhang, and B, Dai, "Design and development of an interactive medical teleconsultation system over the world wide web", IEEE Transactions on Information Technology in Biomedicine, vol.2, no. 2, pp.74-79, June 1988.
    [2] Yu S Lim, David Dugan Feng, Tom Weidong Cai, "Web-based Collaborative System for Medical Image Analysis and Diagnosis", Selected papers from the Pan-Sydney workshop on Visualisation, vol.2, pp.93-95, Dec. 2000
    [3] Y.-S. Kuo, "Design for real-time web-based multi-group support tele-consultation system", Master thesis, National Chang Kung University, Taiwan, July 2002.
    [4] William Stallings, "Networks Security Essentials Applications and Standards" second edition, Pages: 5-9, 2003.
    [5] 陳仲嶙, "醫療隱私的法規範現況" , 醫事法學11卷2期, Jun. 2003.
    [6] B. Clifford Neuman, Theodore Ts'o, "Kerberos: an authentication service for computer networks", Communications Magazine, IEEE , Volume: 32, Issue: 9, Pages:33 - 38, Sept. 1994.
    [7] F.-J. Tsai, "The design of intelligent reply system for medical tele-consultation review", Master thesis, National Cheng Kung University, Taiwan, July 2003.
    [8] J. Wray, "Generic Security Service API Version 2 : C-bindings", IETF RFC 2744, Jan 2000.
    [9] J. Linn "Generic Security Service API Version 2 : Java Bindings", IETF RFC 2853, June 2000.
    [10] K. Egevang Cray Communications, P. Francis NTT "The IP Network Address Translator (NAT)", IETF RFC1631, May 1994
    [11] K. Raeburn "Encryption and Checksum Specifications for Kerberos 5", IETF RFC 3961, February 2005
    [12] S. Josefsson, Ed "The Base16, Base32, and Base64 Data Encodings", IETF RFC 3548, July 2003

    下載圖示 校內:2008-02-07公開
    校外:2009-02-07公開
    QR CODE