USE OF PARALLEL COMPUTING FOR SECURITY METHOD IMPLEMENTATION BASED ON THE SHAMIR SCHEME IN A MEDICAL INFORMATION SYSTEM

  • L. K. Babenko Southern Federal University
  • A.S. Shumilin Southern Federal University
Keywords: Data security, parallel computing, medical information system, MPI, big data

Abstract

Medical information systems currently are becoming the most popular tools for processing,
storing, organizing, and transmitting patient medical data. Medical examinations can be presented
in the form of files in various formats and vary greatly in terms of size (from a few bytes to hundreds
of gigabytes). For example, some binary files are small and lightweight because they contain
only doctors' conclusions in the form of a text description. However, records of night video
monitoring of a patient or DICOM files of human organs CT scans containing several hundred
slices, can reach hundreds of gigabytes in size. Accordingly, large files require significant computing
resources when transferred from server to server. In addition, when using the security method,
which is an algorithm of a secret sharing (medical output file) according to the Shamir sharing
scheme, operations to split the secret into parts and merge the parts together may take longer in
serial operation than in parallel way. Therefore, it seems possible to speed up the processing of
big data without reducing the level of security. The main purpose of the work is to confirm the
hypothesis of reducing time to perform the operation of splitting and merging parts of a secret
based on parallel computing tools withing implementing the security method according to the
Shamir secret sharing scheme in a medical information system. The object of the study is a security
method developed by the author for implementation in the information security subsystems of a
medical information system. As part of the study, author analyzed the most effective tools for parallelizing
processes (like MPI and OpenMP). MPI has been used as a tool as much more suitable
for the current purpose. Moreover, several waves of experiments have been run (analysis of time
depending on the number of parallel streams and the number of characters contained in the
DICOM file) and allowed us to prove a concept of parallelizing the secret exchange algorithm
based on the Shamir scheme, achieving almost linear acceleration using the MPI library

References

1. Karnaukhov N.S., Il'yukhin R.G. Vozmozhnosti tekhnologiy "Big Data" v meditsine [Possibilities
of "Big Data" technologies in medicine], Vrach i informatsionnye tekhnologii [Doctor and
information technologies], 2019, No. 1.
2. Kalugina E.A. Cistema elektronnogo dokumentooborota, ee preimushchestva i perekhod na
elektronnyy dokumentooborot [Electronic document management system, its advantages and
the transition to electronic document management], Vestnik NIB [Bulletin of the National Institute
of Business], 2019, No. 37.
3. Alekseev D.M., Babenko L.K., Shumilin A.S. Algoritm obespecheniya zashchity
konfidentsial'nykh dannykh oblachnoy meditsinskoy informatsionnoy sistemy [Algorithm for
ensuring the protection of confidential data of a cloud medical information system], Izvestiya
YuFU. Tekhnicheskie nauki [Izvestiya SFedU. Engineering Sciences], 2021, No. 5 (222),
pp. 120-134.
4. Shumilin A., Babenko L., Alekseev D. Development of the algorithm to ensure the protection of
confidential data in cloud medical information system, 2021 14th International Conference on
Security of Information and Networks (SIN).
5. Sundukov R.Sh., Koroleva V.V. Programmnoe sredstvo razdeleniya sekreta s ispol'zovaniem
skhemy Shamira [A software tool for sharing a secret using the Shamir scheme], Bezopasnost'
informatsionnogo prostranstva: Sb. trudov ХVIII Vserossiyskoy nauchno-prakticheskoy
konferentsii studentov, aspirantov i molodykh uchenykh, Magnitogorsk, 28–29 noyabrya 2019
goda [Security of the information space: Collection of proceedings of the XVIII All-Russian
scientific and practical conference of students, graduate students and young scientists, Magnitogorsk,
November 28–29, 2019]. Magnitogorsk: Magnitogorskiy gosudarstvennyy
tekhnicheskiy universitet im. G.I. Nosova, 2019, pp. 263-267. EDN MGJHFO.
6. Skhema razdeleniya sekreta Shamira. Khabr zhurnal [Shamir's secret sharing scheme. Habr magazine.
– Access mode]. Available at: https://habr.com/ru/post/431392/ (accesse 22 August 2023).
7. Cryptographic algorithms – Shamir Secret Sharing. Available at:
https://cryptography.fandom.com/wiki/Shamir%27s_Secret_Sharing (accesse: 22 August 2023).
8. Parvatov N.G. Sovershennye skhemy razdeleniya sekreta [Perfect secret sharing schemes],
Prikladnaya diskretnaya matematika [Applied discrete mathematics], 2008, No. 2 (2), pp. 41-47.
9. Chervyakov N.I., Deryabin M.A. Novyy metod porogovogo razdeleniya sekreta, osnovannyy
na sisteme ostatochnykh klassov [A new threshold secret sharing method based on a system of
residual classes], Informatsionnye tekhnologii [Information technologies], 2016,Vol.. 22,
No. 3, pp. 211-219.
10. Shenets N.N. Ob ideal'nykh modulyarnykh skhemakh razdeleniya sekreta v kol'tsakh
mnogochlenov ot neskol'kikh peremennykh [On ideal modular secret sharing schemes in polynomial
rings of several variables], 2019.
11. Martishin S.A., Khrapchenko M.V., Shokurov A.V. Issledovanie zadachi obespecheniya
bezopasnosti pri khranenii i obrabotke konfidentsial'nykh dannykh [Study of the problem of
ensuring security during the storage and processing of confidential data], Tr. ISP RAN
[Proceedings of ISP RAS], 2021, No. 2.
12. Minakov V.F., SHepeleva O.Yu., Lobanov O.S. Mnogofaktornaya model' obespecheniya
bezopasnosti konfidentsial'nykh dannykh [Multifactor model for ensuring the security of confidential
data], Pravovaya informatika [Legal informatics], 2020, No. 1.
13. Basavegowda R., Seenapp S. Electronic Medical Report Security Using Visual Secret Sharing
Scheme, 2013 UKSim 15th International Conference on Computer Modelling and Simulation.
14. Titov K.E. Issledovanie povedeniya freymvorka openmp v programmakh s parallel'nymi
vychisleniyami [Study of the behavior of the openmp framework in programs with parallel
computing], E-Scio, 2021, No. 4 (55).
15. Martynenko S.I., Bakhtin V.A., Rumyantsev E.V., Tarasov G.A., Seredkin N.N., Boyarskikh K.A.
Parallel'noe reshenie kraevykh zadach s pomoshch'yu tekhnologii openmp [Parallel solution of
boundary value problems using openmp technology], Vestnik MGTU im. N.E. Baumana. Ser.
Estestvennye nauki [Bulletin of MSTU im. N.E. Bauman. Series Natural Sciences], 2022,
No. 2 (101).
16. Aksenov S.V., Mal'chukov A.N., Mytsko E.A. Primenenie tekhnologii parallel'nykh vychisleniy
OpenMP dlya poiska obrazuyushchikh polinomov [Application of OpenMP parallel computing
technology to search for generating polynomials], Vestnik evraziyskoy nauki [Bulletin of
Eurasian Science], 2013, No. 6 (19).
17. MPI. Available at:https://ru.wikipedia.org/wiki/MPI (accessed 22 August.2023).
18. Tuzko Ya.N., Sokolova O.O., Akishin B.A. Organizatsiya parallel'nykh vychisleniy v
mnogoyadernykh protsessorakh [Organization of parallel computing in multi-core processors],
Molodoy issledovatel' Dona [Young researcher of the Don], 2018, No. 5 (14).
19. Gervich L.R., Shteynberg B.Ya. Ob avtomatizatsii primeneniya razmeshcheniya dannykh s
perekrytiyami v raspredelennoy pamyati [On automation of the application of data placement
with overlaps in distributed memory], Vestnik YuUrGU. Seriya: Matematicheskoe
modelirovanie i programmirovanie [Bulletin of the South Ural State University. Series:
Mathematical modeling and programming], 2023, No. 1.
20. Listunov S.B. Issledovanie metoda resheniya zadach interpolyatsii funktsii metodom polinoma
Lagranzha [Research of a method for solving problems of interpolation of a function using the
Lagrange polynomial method], Nauchnye mezhdistsiplinarnye issledovaniya [Scientific interdisciplinary
research], 2021, No. 2.
Published
2023-10-23
Section
SECTION I. INFORMATION PROCESSING ALGORITHMS