ORGANIZATION OF INFORMATION PROTECTION FOR INFORMATION SYSTEM OF DETERMINATION STATE OF SEVERITY OF THE PATIENTS WITH CARDIOVASCULAR PATHOLOGY

Віктор Ігорович Руженцев, Ганна Сергіївна Доброродня, Олена Володимирівна Висоцька, Тетяна Анатоліївна Куліш

Abstract


The work is devoted to the organization of information protection in the information system for determining the severity of the condition of patients with cardiovascular pathologies. The analysis of threats to the security of personal data of patients was carried out. A conclusion is drawn about the threats to the information system being developed. To prevent these threats, it is necessary to ensure confidentiality, as well as the integrity of information about the patient. This can be done using cryptographic methods. Medical informational systems and methods which used in them are considered. The shortcomings of the above medical informational systems and methods of information protection are highlighted. The choice of block symmetric encryption of DSTU 7624: 2014 for data protection was analyzed and justified for the information system to determination state of severity of the patients with cardiovascular pathologies. A structural diagram of the information system is formed and its main modules are described. The main stages of encryption using the "Kalina" algorithm (DSTU 7624: 2014) are described. The scheme is presented and the main stages of key unfolding are described. The considered encryption algorithm DSTU 7624: 2014 provides a high level of resistance against attacks, as well as the speed of software implementation, allows you to select the length of the key and data block. The listed advantages of encryption with the use of the algorithm "Kalina" allow you to use it when encrypting medical and biological information, both long-term storage, and in situations where the speed of encryption is not critical. The presence of the proposed cryptography reduces the probability of theft of patient data in the information system for determining the severity of the condition of patients with cardiovascular pathologies.

Keywords


information protection; algorithm; encryption; pathology; data

References


Kolesnikova, E. V. Sovremennyi patsient s zabolevaniem pecheni i patologiei serdechno-sosudistoi sistemy: kakoi vybor sdelat'? [A modern patient with liver disease and cardiovascular pathology: what choice should I make?]. Suchasna hastroenterolohiya – Modern Gastroenterology, 2014, no. 2 (76), pp. 85-94.

Nauchno-issledovatel'skiy institut terapii i profilakticheskoy meditsiny, Vsemirnaya organizatsiya zdravookhraneniya Monitorirovanie serdechno-sosudistoy zabolevaemosti, smertnosti i ikh faktorov riska v raznykh regionakh mira (proekt VOZ MONICA) [Monitoring of cardiovascular morbidity, mortality and risk factors in different regions of the world (WHO MONICA project)]. Novosibirsk, Geo Publ., 2016. 699 p.

Federal'naya sluzhba po tekhnicheskomu i eksportnomu kontrolyu. Bazovaya model' ugroz bezopasnosti personal'nykh dannykh pri ikh obrabotke v informatsionnykh sistemakh personal'nykh dannykh (vypiska) [The basic model of threats to the security of personal data when processing them in information systems of personal data (extract)]. Available at: http://csr43.ru/files/ZI/FSTEK-baz-model-ugroz.pdf (accessed 15.02.2008).

Stankovski, T., McClintock, P.V.E., Stefanovska, A. Coupling functions enable secure communications. Physical Review X, 2014, no. 4. 9 p.

Rintekh «Monitor zdorov'ya» ["Health Monitor"]. Available at: http://www.rintech.ru/serv/detail.php?ID=114 (accessed 25.09.2015).

Zaramenskikh, E. P., Isaev, E. A., Korovkina N. L. Intellektualizatsiya obrabotki informatsii v sisteme elektronnogo meditsinskogo monitoringa [Intellectualization of information processing in the system of electronic medical monitoring]. Matematicheskaya biologiya i bioinformatika – Mathematical biology and bioinformatics, 2016, no. 2, pp. 288-298.

Servis iz Sankt-Peterburga otkryl besplatnye vozmozhnosti dlya rossiiskikh klinik [Service from St. Petersburg has opened free opportunities for Russian clinics]. Available at: https://www.dp.ru/a/2015/12/08/Servis_iz_Sankt-Peterburg (accessed 21.12.2015).

Kul'minskii, D. D., Karavaev, A. S., Ponomarenko, V. I., Prokhorov, M. D. Sistema skrytoi peredachi dannykh v meditsinskikh informatsionnykh sistemakh, osnovannaya na khaoticheskoi sinkhronizatsii generatov s zapazdyvayushchei obratnoi svyaz'yu [The system of hidden data transmission in medical information systems, based on the chaotic synchronization of generators with delayed feedback]. Byulleten' meditsinskikh Internet konferentsii – Bulletin of Medical Internet Conferences, 2014, no. 7, pp. 971-974.

DeepMind sozdast sistemu zapisi meditsinskikh dannykh na blokcheine [DeepMind will create a system for recording medical data on blokcheyne]. Available at: https://hightech.fm/2017/03/10/blockchan_health_records (accessed 10.03.2017).

Condliffe, J. DeepMind’s New Blockchain-Style System Will TrackHealth-Care Records. MIT Technology Review, 2017, vol. 5(18), pp. 1-8.

Setty, S., Soumya, B., Lidong, Z., Roberts, M. L., Venkatesan, R. Enabling secure and resource-efficient blockchain networks with VOLT. MSR Technical Report, 2017, vol. 38, pp. 1-15.

Bernstein, D. J., Duif, N., Lange, T., Schwabe, P., Yang, B.-Y. High-speed high-security signatures. Journal of Cryptographic Engineering, 2012, no. 2(2), pp. 77–89.

Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., Felten, E. W. Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. SoK: InProceedings of the IEEE Symposium on Security and Privacy, 2015, рр. 104–121.

Tselostnost' informatsii [Integrity of information]. Available at: http://wikisec.ru/MediaWiki/index.php?title=%D0%A6%D0%B5%D0%BB%D0%BE%D1%81%D1%82%D0%BD%D0%BE%D1%81%D1%82%D1%8C_%D0%B8%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D0%B8 (accessed 26.09.2017).

Oliynykov, R., Horbenko, I., Kazymyrov, O., Ruzhentsev, V., Horbenko, Yu. Pryntsypy pobudovy i osnovni vlastyvosti novoho natsional'noho standartu blokovoho shyfruvannya Ukrayiny. Zakhyst informatsiyi – Ukrainian Information Security Research Journal, 2015, no. 2, pp. 142-157.


Refbacks

  • There are currently no refbacks.