ALGORITHM OF PROTECTING CONFIDENTIAL DATA IN THE CLOUD MEDICAL INFORMATION SYSTEM

  • L.K. Babenko Southern Federal University
  • A.S. Shumilin Southern Federal University
  • D.M. Alekseev Southern Federal University
Keywords: Information security, medical information system, privacy, cloud computing, information security, data processing, data systematization, big data, encryption

Abstract

The aim of the work is the development and implementation of the architecture of a cloud
storage system, systematization and processing of survey results (for example, EEG) and an algorithm
for ensuring the protection of confidential data based on a completely homomorphic cryptosystem.
The object of the research is the technologies of storage, transmission, processing and
protection of confidential information in distributed medical information systems. The architecture
of a cloud platform for distributed storage, processing, systematization and protection of confidential
data (results of medical examinations) has been developed, which makes it possible to interact
with various medical information systems and diagnostic hardware in order to generate big data.
An algorithm has been developed to ensure the safety of medical data stored in a cloud platform in electronic form, recorded during patient examinations in order to calculate the average value for
each of the brain activity rhythms (based on the results of a series of examinations over a long
period of time) using a fully homomorphic encryption algorithm. Based on the test results (analysis
of the execution time of such operations as: encryption, decryption, addition, multiplication,
signal-to-noise ratio of ciphertext to plaintext), the optimal algorithm. According to the results of
the work, it is shown that the fully homomorphic encryption scheme CKKS is the most effective,
especially in the context of the criticality of the requirements for a high level of security of confidential
data, which determines the choice of this scheme for the implementation of the algorithm
proposed in this work.

References

1. Babenko M.G., Golimblevskaya E.I., SHiryaev E.M. Sravnitel'nyy analiz algoritmov
gomomorfnogo shifrovaniya na osnove obucheniya s oshibkami [Comparative analysis of
homomorphic encryption algorithms based on learning with errors], Tr. ISP RAN [Proceedings
of ISP RAS], 2020, No. 2.
2. Mit'kina P.A. Osobennosti khraneniya meditsinskoy informatsii [Features of storing medical
information], Sovremennye nauchnye issledovaniya i innovatsii [Modern scientific research
and innovations], 2017, No. 5. Available at: http://web.snauka.ru/issues/2017/05/82546
(accessed 07 October 2019).
3. Health Insurance Portability and Accountability Act. Available at: https://en.wikipedia.org/
wiki/Health_Insurance_Portability_and_Accountability_Act (accessed 08 October 2019).
4. DICOM. Available at: https://ru.wikipedia.org/wiki/DICOM (дата обращения 08.10.2019).
5. L.-Y. T. a. M.-S. H. Li-Chin Huangc. A reversible data hiding method by histogram shifting in high
quality medical images, The Journals of systems and software, 2013, Vol. 86, pp. 716-727.
6. M.G. a. R.D. Jessica Fridrich. Detecting LSB Steganography in Color and Gray-Scale Images.
Binghamton.
7. N.A.H.A.-C. Fatma E.-Z. A. Elgamal. Secure Medical Images Sharing over Cloud Computing
environment, International Journal of Advanced Computer Science and Applications, 2013,
Vol. 4, pp. 130-138. A. B. K. R. G. a. J. P. S. Digvijay Singh Chauhan, "Double Secret Key
Based Medical Image Watermarking for Secure Telemedicine in Cloud Environment, in 2017
40th International Conference on Telecommunications and Signal Processing (TSP), 2017.
8. Logistic map. Available at: https://en.wikipedia.org/wiki/Logistic_map (accessed 08 October
2019).
9. Abdulrahman Alsalmany. Cloud System for Encryption and Authentication Medical Images,
IOSR Journal of Computer Engineering. e-ISSN: 2278-0661, p-ISSN: 2278-8727, Vol. 20, Issue
1, Ver. II (Jan.-Feb. 2018), pp. 65-75. Available at: https://www.researchgate.net/ publication/
332571801_Cloud_System_For_Encryption_And_Authentication_Medical_Images (accessed
29 September 2019).
10. Plotnikov A.V., Prilutskiy D.A., Selishchev S.V. Standart DICOM v komp'yuternykh
meditsinskikh tekhnologiyakh [DICOM standard in computer medical technologies]. Available
at: https://mks.ru/library/article/1997/dicom.html (data obrashcheniya 08 October 2019).
11. Vizual'naya kriptografiya [Visual cryptography]. Available at: http://cryptowiki.net/ index.
php?title=%D0%92%D0%B8%D0%B7%D1%83%D0%B0%D0%BB%D1%8C%D0%B
D%D0%B0%D1%8F_%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B3
%D1%80%D0%B0%D1%84%D0%B8%D1%8F (accessed 08 October 2019).
12. Kotyashichev I.A., Byrylova E.A. Zashchita informatsii v «Oblachnykh tekhnologiyakh» kak
predmet natsional'noy bezopasnosti [Information protection in "Cloud technologies" as a subject
of national security], Molodoy uchenyy [Young scientist], 2015, No. 6.4 (86.4), pp. 30-34.
Available at: https://moluch.ru/archive/86/16357/ (accessed 09 June 2020).
13. Kereytova M.R., Malysh V.N. Informatsionnaya bezopasnost' v meditsinskikh
informatsionnykh sistemakh [Information security in medical information systems], NiKa
[NIK], 2012. Available at: https://cyberleninka.ru/article/n/informatsionnaya-bezopasnost-vmeditsinskih-
informatsionnyh-sistemah (accessed 11 June 2020).
14. Boychenko I.V. Postroenie IT-infrastruktury zdravookhraneniya na osnove paradigmy
oblachnykh vychisleniy [Building IT infrastructure for healthcare based on the paradigm of
cloud computing], Vrach i informatsionnye tekhnologii [Doctor and information technologies],
2011, No. 3. Available at: https://cyberleninka.ru/article/n/postroenie-it-infrastrukturyzdravoohraneniya-
na-osnove-paradigmy-oblachnyh-vychisleniy (accessed 09 June 2020).
15. Rohan Jathanna. Int. Journal of Engineering Research and Application, June 2017, Vol. 7, Issue 6
(Part - 5), pp. 31-38. ISSN: 2248-9622. Available at: www.ijera.com (accessed 10 June 2020).
16. Krivosheeva Darina. Model' ugroz bezopasnosti v sistemakh distantsionnogo monitoringa
sostoyaniya cheloveka [Model of security threats in systems of remote monitoring of human
condition], Pravovaya informatika [Legal informatics], 2016, No. 3. Available at:
https://cyberleninka.ru/article/n/model-ugroz-bezopasnosti-v-sistemah-distantsionnogomonitoringa-
sostoyaniya-cheloveka (accessed 11 June 2020).
17. Nazarenko G.I., Mikheev A.E., Gorbunov P.A., Guliev Ya.I., Fokht I.A., Fokht O.A. Osobennosti
resheniya problem informatsionnoy bezopasnosti v meditsinskikh informatsionnykh sistemakh
[Features of solving information security problems in medical information systems], Vrach i
informatsionnye tekhnologii [Doctor and information Technology], 2007, No. 4. Available at:
https://cyberleninka.ru/article/n/osobennosti-resheniya-problem-informatsionnoy-bezopasnostiv-
meditsinskih-informatsionnyh-sistemah (accessed 16 October 2020).
18. Gorbunov P.A., Fokht I.A. Problemy informatsionnoy bezopasnosti v meditsinskikh
informatsionnykh sistemakh – teoreticheskie resheniya i prakticheskie razrabotki [Information
security problems in medical information systems - theoretical solutions and practical developments],
Programmnye sistemy: teoriya i prilozheniya [Software systems: theory and applications],
ed. by S.M. Abramova. In 2 vol. Vol. 1. Moscow: Fizmatlit, 2006, pp. 107-112.
19. Nazarenko G.I, Guliev Ya.I., Ermakov D.E. Meditsinskie informatsionnye sistemy: teoriya i
praktika [Medical information systems: theory and practice], ed. by G.I. Nazarenko,
G.S. Osipova. Moscow: Fizmatlit, 2005, 320 p.
20. Mikheev V.A. Osnovy postroeniya podsistemy zashchity informatsii mnogofunktsional'noy
informatsionnoy sistemy [Fundamentals of building a subsystem of information security for a
multifunctional information system], Izvestiya YuFU. Tekhnicheskie nauki [Izvestiya SFedU.
Engineering Sciences], 2008, No. 8 (85), pp. 165-167.
21. Klepikov E.A., YAs'ko A.O. Voprosy zashchity konfidentsial'noy meditsinskoy informatsii o
patsiente v meditsinskikh informatsionnykh sistemakh [Issues of protecting confidential medical
information about a patient in medical information systems], Simvol nauki [Symbol of Science],
2016, No. 9-1. Available at: https://cyberleninka.ru/article/n/voprosy-zaschitykonfidentsialnoy-
meditsinskoy-informatsii-o-patsiente-v-meditsinskih-informatsionnyhsistemah
(accessed 16 October 2020).
Published
2021-12-24
Section
SECTION II. INFORMATION PROCESSING ALGORITHMS