APPLICATION TO MANAGEMENT OF MEDICAL IMAGES BACKUP USING MOBILE DEVICES BY SSH TUNNELING



Similar documents
TEACHING CALCULUS USING E-LEARNING IN A MOODLE PLATFORM

DEVELOPMENT AND IMPLEMENTATION OF AN AUTOMATED SYSTEM TO EXCHANGE ATTENUATORS OF THE OB85/1 GAMMA IRRADIATOR

PERFORMANCE EVALUATION OF THE REFERENCE SYSTEM FOR CALIBRATION OF IPEN ACTIVIMETERS

AuditMatic Enterprise Edition Installation Specifications

Public Funding and the Beginning of a New Era in Higher Education in Brazil

Marcelo L. Braunstein Business Development Manager IBM Latin America

DRAFT Standard Statement Encryption

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

Mconf: Global Webconferencing based on Open Source

Streamlining Case Management Workflow

How To Model A Hexapod Robot With Six Legs

TA3 Dosimetry and Instrumentation. Evaluation of the Field Size in Dental Diagnostic Radiology System ANDRADE PS 1, POTIENS MP 1

An On-Line Medical Imaging Management for Shared Research in the Web using Pattern Features

Sage Grant Management System Requirements

inforouter V8.0 Server & Client Requirements

Migration of virtual machine to cloud using Openstack Python API Clients

MANAGEMENT SYSTEM FOR A FLEET OF VEHICLES BASED ON GPS. João André Correia Telo de Oliveira

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux

GBD IAAS Manager: A Tool for Managing Infrastructure-as-a-Service for Private and Hybrid Clouds

Ambiente de Armazenamento

DIGITAL CERTIFICATION IN TELERADIOLOGY: A NECESSARY WARNING*

ITA Mail Archive Setup Guide

Microsoft Office Outlook 2013: Part 1

TABLE OF CONTENTS NETWORK SECURITY 2...1

1. Product Information

Online Backup Client User Manual Linux

How To Improve Service Management For Effective It Governance

Determination of the Effective Energy in X-rays Standard Beams, Mammography Level

CQG Trader Technical Specifications. December 1, 2014 Version

Hardware and Software Requirements Engeman. Version 2015/01

Minimum System Requirements

RecoveryVault Express Client User Manual

MedInformatix System Requirements

OS Installation Guide Red Hat Linux 9.0

REDES DE ARMAZENAMENTO E ALTA DISPONIBILIDADE

CloudBackup Installer Guide Linux. System Requirements. Get Started - Linux

Online Backup Linux Client User Manual

Hard Disk Drive vs. Kingston SSDNow V+ 200 Series 240GB: Comparative Test

How To Get A Phd In Computer Science

Online Backup Client User Manual

Security Policy Revision Date: 23 April 2009

Hypervisor by Chronos Specifications

Microsoft Office Outlook 2010: Level 1

System of Monitoring/Management of resources and security for a Grid based on Globus Toolkit

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers Study leader: Mr. D.V.

Requirements. System Requirements. System Requirements, page 1 Port Requirements, page 4 Supported Codecs, page 5

Secure Access Using VPN

Hardware and Software Requirements for Sage 50 v15 to v22

Table 1. Requirements for Domain Controller. You will need a Microsoft Active Directory domain. Microsoft SQL Server. SQL Server Reporting Services

1 HARDWARE AND SOFTWARE REQUIREMENTS FOR HAL E-BANK SYSTEM

Ivara EXP Installation Prerequisites

Installing Emageon PACS Remote Ultravisual

Minimum System Requirements

DEVELOPMENT OF A SECURE FILE TRANSFER PROTOCOL FOR AN ENTERPRISE AND CAMPUS NETWORK

RSA AUTHENTICATION AGENTS FOR MICROSOFT WINDOWS

Evaluation of the image quality in computed tomography: different phantoms

Softline VIP Payroll System Requirements v2.9a January 2010

Remote Desktop on Mobile

Document management and exchange system supporting education process

intertrax Suite resource MGR Web

PORTUGAL: Total EC Funding: 86M (1.4% of total) Total number of participations: 247 (1.7% of total) Number of project co-ordinations: 17

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

CAMAvision v18.5.x System Specification Guide 7/23/2014

Curriculum Vitae. Sílvia Barcellos Southwick

System Requirements for Computer-Based Testing AzMERIT

Introduction to Mobile Access Gateway Installation

IUCLID 5 Guidance and support. Installation Guide Distributed Version. Linux - Apache Tomcat - PostgreSQL

COMMUNICATION SERVER 1000 COMMUNICATION SERVER 1000 TELEPHONY MANAGER

File Protection using rsync. Setup guide

SECURELINK.COM REMOTE SUPPORT NETWORK

A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application

JAMF Software Server Installation and Configuration Guide for Windows. Version 9.3

Historical overview University main fields Degree programs Campus Organic units Bachelor degrees Master s degrees. Contents

Computer Virtualization in Practice

BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER

Online Student Attendance Management System using Android

Requirements for Rosetta Installation. Version 4.2

Deploying and Managing Microsoft Exchange Server 2013

Final Year Project Interim Report

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems

Building an efficient and inexpensive PACS system. OsiriX - dcm4chee - JPEG2000

RC6. Marcel Felipe Weschenfelder

Using Free Software at a Portuguese Secondary School of Arts

VERSION 9.02 INSTALLATION GUIDE.

Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with

RUGGEDCOM NMS for Linux v1.6

Online Backup Client User Manual

Cisco IP Communicator (Softphone) Compatibility

Copyright by Parallels Holdings, Ltd. All rights reserved.

Transcription:

APPLICATION TO MANAGEMENT OF MEDICAL IMAGES BACKUP USING MOBILE DEVICES BY SSH TUNNELING Felipe Rodrigues Martinêz Basile 1, Flávio Cezar Amate 1,2 1 Núcleo de Pesquisas Tecnológicas, Mogi das Cruzes University, Mogi das Cruzes, Brazil 2 Instituto Federal de Educação, Ciência e Tecnologia de São Paulo, Bragança Paulista, Brazil Abstract: Considering the growing use of mobile devices on health area, we can observe that studies are necessary about viability of use of these new techologies to transmission of medical images over secure and reliable network environment. Because of this we purpose the development of software using shell script language to transmission of medical images, using mobile devices, attending security rules defined by national and international regulations. Through implementation of rsync linux command, SSH-2 tunneling, private and public keys on android and linux environment. In the comparison of transmission using different RSA cryptographic keys (1024 and 4096 bits), there isn't significant statistical difference using Student's t tests (p>0.05) in the performance considering total time and rate transmision in all 30 experiments. Finally, we can demonstrate the viability of transmission of medical images using mobile device to backup of medical information between two medical images servers considering performance, confiability and security. Keywords: Hospital Information Systems, Medical Informatics, Network Communication Protocols, Telemedicine. Resumo: Diante da crescente utilização de dispositivos móveis na área da saúde, observa-se a necessidade de estudos relacionados a viabilidade do emprego dessas novas tecnologias, para a transmissão de imagens médicas em um ambiente seguro e confiável. Por isso propomos o desenvolvimento de um software em linguagem shell script para transmissão de imagens médicas, utilizando-se dispositivos móveis, atendendo normas nacionais e internacionais em telemedicina, por meio da implementação do comando rsync, de um túnel criptografado com o protocolo SSH-2 e de chaves públicas e privadas em ambiente linux e android. Em todos os 30 experimentos não houve diferença estatística significativa (p>0.05) utilizando Teste t Student na comparação de desempenho utilizando chaves criptográficas com algoritmo RSA (1024 e 4096 bits), considerando tempo total gasto e taxa de transferência. Desse modo demonstrou-se a viabilidade da utilização de dispositivos móveis para a cópia de informações médicas entre dois servidores considerando desempenho, confiabilidade e segurança. Palavras-chave: Sistemas de Informação em Hospitais, Informática Médica, Redes de Comunicação de Computadores, Telemedicina. Introduction The process of digitalization of medical images become possible the archivment and transmission of these images by different computer systems¹. Hospitals and medical centers use hardware and software through PACS (Picture Archivment Communication Systems) to integrity patients information including exams and electronic health records². Considering the evolution of technology, we can observe the growing use of mobile devices on health area. At the same time that occur the development of mobile society, where there will the use of mobile devices with wireless network at the telemedicine³. In this context, the telemedicine can be employed on different areas as: electric engineering, computer science, biomedical engineering and medicine 4. Studies are necessary to promote the development of hospital information systems to understand new ways about transmission of medical information, helping health professionals to easy access of clinical records and fast transmission of medical images on real time 5,6. 1

In the transmission of medical information is very important maintainment of secret and confidentially, once time there are much information that can't be revealed as (HIV result tests, the use of drugs and alcohol and psych records 7 ). On January 15, 2009, the brazil federal council of medicine established resolutions 8 that regulate the main aspects to the transmission of electronic medical information at the country. This resolution was based on Tel Aviv Declaration (1999) 9 considering important points as: the establishment of an apropriated infra-structure where can be possible implements confidentially, private and professional secret aspects in the transmission of medical information. Studies were developed to analyze the viability of transmission of medical images using the process of SSH (Secure Shell) tunneling to cryptography of all information between remote computers using the SSH protocol version 2 10. Comparing the performance between computers on different networks using HTTP (HyperText Transfer Protocol) and SSH protocols in the transmission of medical images over the internet. Moreover studies demonstrate the implementation of security aspects using SSH protocol version 2 with private and public keys to applied of secure authentication 10,11. Another important study was made about the development of an open source software based on Java and Shell script language implemented to linux environment to transmission of medical images using SSH tunneling 12. For this reason, studies are very necessary to understand new techniques about the transmission of medical information and development of hospital information systems to telemedicine services. Using different network communication protocols and attending national and international resolutions on telemedicine. Applying the use of mobile technologies to maintainment and update of computer services, and transmission of medical information between servers machine using SSH protocol, considering important aspects of computer communications as: performance, confiability and security 13. Methods Software Development Process First, we used the software development process to create our program to transmission of medical images. In the software development process is recommend some fundamental steps 14. Requirements (functional and non-functional), analyze and project, implementation and tests. Functional requirements are defined as: copy images and access server, as well as, non-functional requirements as: linux operating system, SSH protocol version 2, shell script language, wireless and local network, mobile device, indeed the external android application called ConnectBot. After this step, we made the analyze of requirements defining main software functionalities. As result of this, we built a software project based on functional requirements and development of use case context diagram that demonstrates functionalities of software without internal aspects by high level of comprehension. (See Figure 1) Figure 1: Use case context diagram 2

On the implementation step we wrote a shell script language inside linux operating system using text editor called Vim to write the source code. The command rsync was implemented with SSH-2 tunneling to run copy of images between two servers machines (See Figure 2). Figure 2: Rsync command implemented over SSH protocol version 2 After implementation steps, we did some functionalities tests called as black box tests. These tests verified software funcionalities without worried about internal aspects related to source code application 15. In view of that we created a script to running functional tests considering the use of rsync command (See Figure 3). Figure 3: Script to run functional test Experiments Second, we did some experiments considering the implementation of hardware architecture with the following materials: one tablet pc and two computers inside of WLAN (Wireless Local Area Network)(See Figure 4). The mobile device used on experiments was Tablet PC (Motorola Xoom) with the following characteristics : 1 GBytes of RAM memory, Hard Disk with 32 GBytes of capacity, dual-core processor technology, android operating system (Ice Cream Sandwich 4.0). The computer 1 (Medical Image Server A) has 2 GBytes of RAM memory, single-core processor technology (AMD Athlon 64 Processor 3000+) with linux operating system (Ubuntu Lucid 10.04 32 bits). Together with the computer 2 (Medical Image Server B) which has 512 MBytes of RAM memory, Hard Disk with 20 GBytes, pentium 4 processor with 1.90 GHz, with linux operating system (Ubuntu Precise Pangolin 12.04 LTS). Figure 4: Hardware Implementation Diagram Public and private keys was created based on concepts of SSH-2 protocol to authentication process between mobile device and medical images server A, likewise between medical images server A and medical images server B. 3

These keys were created using RSA cryptographic algorithm with 1024 bits and 4096 bits. These two keys with diferent values of bits was created to verify if the increase of bits number on key can will modify performance aspects on transmission of medical images between machines. Another important point of use of these keys is related to the authentication process without manual password typing, considering a secure authentication in communication between devices. The Android application connectbot 16 was used to establishment of a remote connection between mobile device and medical server A. This application allowed a secure remote connection by the implementation of SSH-2 tunneling, together with configuration of sshd_config file changing deafult number of communication port to improve security. The Figure 5 has a screen of mobile device that contain linux terminal of medical image server A. Figure 5: Screen of mobile device that contain linux terminal of medical images server A. Immediately, we used the software developed based on shell scripts language to transmission of medical images from server A to server B, using rsync command implemented over SSH protocol version 2. Results We did 60 experiments considering transmission of medical images by SSH-2 tunneling between two medical images servers with 362.22 MB of data sent and received. We used the RSA cryptographic key with 1024 bits in 30 experiments and RSA cryptographic key with 4096 bits in others 30 experiments. In an effort to compare performance, observing the total time (s) and transmission rates (Mbytes/s) with different sizes of cryptographic keys. In accordance with statistical analyzes there isn't significative difference using Student's test t (p>0.05) when we compared average transmission rates using crypotographic key with 1024 bits with cryptographic key with 4096 bits and in the same way in the comparison of total time spent on transmissions. In the Table 1 is the comparative table related to performance using different cryptographic keys based on RSA algorithm. Table 1: Performance of transmissions with different cryptographic keys Cryptographic Algorithm Average Total time (s) Average transmission rates (MB/s) RSA 1024 bits 45.96 7.81 RSA 4096 bits 45.41 7.91 4

Discussion The high level of security was established by SSH-2 tunneling with RSA cryptographic key of 4096 bits compared with another RSA crytographic key with 1024 bits. And results show that the increase of security by strong key didn't change the performance of transmission between machines on wireless local area network. Equally important we implemented the use of mobile devices to access medical image servers on telemedicine 3,4. We did all experiments following international and national regulations about appropriated infra-structure to transmission of electronic health information 8,9. And at the same time we applied secure concepts on development of software as: profissional secret and confidentially 7 by implementation of SSH-2 tunneling 10,11,12 used on experiments. Conclusion A new software based on software development process with SSH-2 tunneling using high level of security with strong RSA cryptographic keys of 4096 bits, and the use of rsync linux command can demonstrate the viability of transmission of medical images using mobile device, on android environment, to backup of medical information between two medical images servers considering performance, confiability and security. Acknowledgements The authors thank to FAEP (Fundação de Amparo a Pesquisa) and CAPES (Coordenação de Aperfeiçoamento de Pessoal e Nível Superior) by all financial support. References [1] Aach, T.; Schiebel, U.; Spekowius, G. Digital image acquisition and processing in medical x-ray imaging. Journal of Electronic Imaging.1999;8(1):7-22. [2] Armbrust, L. J. PACS and Image Storage. Veterinary Clinics of North America-Small Animal Practice. 2009;39(4):711-+. [3] Varshney, U. Pervasive healthcare and wireless health monitoring. Mobile Networks & Applications. 2007;12(2-3):113-127. [4] Lin, C-F. Mobile Telemedicine: A Survey Study. Journal of Medical Systems. 2010 p.1-10. [5] Liu, BJ, Zhou Z, Gutierrez, MA, Documet J, Chan L, HUANG, H. K. International Internet2 connectivity and performance in medical imaging applications: Bridging the Americas to Asia. Journal of High Speed Networks 2007;16(1): p.5-20. [6] Ohashi K, Sakamoto N, Watanabe M, Mizushima H, Tanaka H. Development of a telediagnosis endoscopy system over secure Internet. Methods of Information in Medicine 2008; 47(2):157-166. [7] Kobayashi LOM, Furuie SS. Segurança em informações médicas: visão introdutória e panorama atual. Revista Brasileira de Engenharia Biomédica 2007;23(1):53-57. [8] Conselho Federal de Medicina - CFM. Define e Normatiza a Telerradiologia. Resolução n. 1890, de 15 de janeiro de 2009. Diário Oficial da União nº 12-19/01/2009 (Segunda-feira) - Seção 1 - Pág. 94. [9] Assembléia Geral da Associação Médica Mundial. Declaração de Tel Aviv. Sobre Responsabilidades e normas éticas na utilização da Telemedicina. 1999. Tel Aviv, Israel. 5

[10] Basile FRM, Amate FC. Viability of Secure Transmission of medical images by SSH tunneling in the computer network. In: 4th IADIS International Conference e-society, Avila, Spain. 10-13 March 2011. [11] Basile FRM, Amate FC, Secure Transmission of medical images by SSH Tunneling. Proceedings in the Communications in Computer and Information Science (CCIS), 9-14 July 2011, Florida, USA. [12] Basile, F R M, Amate, FC. Open Source Application to secure transmission of medical images. In: V Congresso Latino Americano de Ingenería Biomédica, Havana, Cuba. 10-13 Mayo 2011. [13] Forouzan BA. Comunicação de dados e redes de computadores. 4a ed. São Paulo: McGraw-Hill; 2008. p.7. [14] Bezerra E. Visão Geral. Modelagem de Sistemas de Software. Princípios de Análise de Sistemas com UML. Rio de Janeiro: Campus; 2003. [15] Myers GJ, Wiley & Sons J. The Art of Software Testing, 2, Nova Jersey: 2004. [16] Root K, Sharkey J. ConnectBot. 2010. Available at: https://play.google.com/store Access on 02 march.2012. Contacts Author: Felipe Rodrigues Martinêz Basile. E-mail : felipermbasile@hotmail.com Author: Flávio Cezar Amate E-mail: flavioamate@gmail.com 6