Advertisement

Network security in a telemedicine system

  • G. Vassilacopoulos
  • V. Chrissikopoulos
  • D. Peppes
Chapter
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT)

AbstractEnforcing network security in Telemedicine systems is necessary in order to ensure security of the information exchanged. In this paper we propose a conference key distribution system that is able to provide the network security services required in an anticipated implementation. The protocol is based on public keys and has a low communication and computation complexity. In addition, a scenario for secure data exchange through the Telemedicine system network based on this protocol is presented.

Keywords

Telemedicine system network security cryptographic protocol conference key6 

References

  1. Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U. and Yung, M. (1993) Perfectly-secure key distribution for dynamic conferences. Advances in Cryptology-Crypto’ 92, Lecture Notes in Computer Science #740, (ed. E. Brickell ), Springer-Verlag, 471–487.CrossRefGoogle Scholar
  2. Burmester, M. and Desmedt, Y. (1995) A Secure and Efficient Conference Key Distribution System. Advances in Cryptology-Eurocrypt’ 94, (ed. A. De Santis ), Springer-Verlag, 275–286.CrossRefGoogle Scholar
  3. Chrissikopoulos, V. and Peppes, D. (1995) A Practical Conference Key Distribution System. Information Security–the Next Decade, Proceedings of IFIP/SEC’95, The 11th Inter. Information Security Conf., (eds. J. Eloff and S. Solms ), 168–175.Google Scholar
  4. Diffie, W. and Hellman, M. (1976) New directions in cryptography. IEEE Trans. Inform. Theory, IT-22, 644–654.zbMATHMathSciNetCrossRefGoogle Scholar
  5. EEC/DGXII, (1991) Data Protection and Confidentiality in health informatics, IOS press.Google Scholar
  6. Fischer, M. and Wright, R. (1992) Multiparty secret key exchange using a random deal of cards. Advances in Cryptology-Crypto’ 91, Lecture Notes in Computer Science #576, (ed. J. Feigenbaum ), Springer-Verlag, 141–155.Google Scholar
  7. Ingemarsson, I., Tang, D. and Wong, C. (1982) A conference key distribution system. IEEE Trans. Inform. Theory, 28, 714–720.zbMATHMathSciNetCrossRefGoogle Scholar
  8. ISO/IEC 7492–2 (1989) Information Technology - Open Systems Interconnection — Basic Reference Model — Part 2: Security Architecture.Google Scholar
  9. Janson, P. and Molva, R. (1991) Security in open networks and distributed systems, Computer Networks and ISND Systems, 22, 323–346.CrossRefGoogle Scholar
  10. Koyama, K. and Ohta, K. (1988) Identity-based conference key distribution systems. Advances in Cryptology-Crypto’ 87, Lecture Notes in Computer Science #293, (ed. C. Pomerance ), Springer-Verlag, 175–185.Google Scholar
  11. Matsumoto, T., Takashima, Y. and Imai, H. (1986) On Seeking Smart Public Key Distribution Systems. The Transactions. of the IECE of Japan, E69 (2), 99–106.Google Scholar
  12. Pfitzmann, A. and Pfitzmann, B. (1991) Security in Medical Networks. Data protection and Confidentiality in health informatics, los press, 231–248.Google Scholar
  13. Schneier, B. (1994) Applied Cryptography, Protocols, Algorithms and Source Code in C, John Wiley & Sons, Inc.Google Scholar
  14. Sommer, T.J. (1994) Telemedicine: a useful and neccessary tool to improving quality of healthcare in the European Union, Proceedings of the twelfth International Congress of the European Federation for Medical Informatics, (eds. P. Barahona, M. Veloso and J. Bryant), Lisbon, Portugal, 278–282.Google Scholar
  15. Spyns, P., Renkens, S. and Willems, J. (1994) Data Compression for Medical Report Archiving, Methods of Information in Medicine, 33, 164–169.Google Scholar
  16. Tsujii, S. and Itoh, T. (1989) An ID-based cryptosystem based on the discrete logarithm. IEEE J. Selected Areas Commun., SAC-8, 467–473.CrossRefGoogle Scholar
  17. U.S. Department of Commerce (1977), National Bureau of Standards, Data Encryption Standard, FIPS Publication 46.Google Scholar
  18. Yacobi, Y. (1991) A key Distribution Paradox. Advances in Cryptology-Crypto’ 90, Lecture Notes in Computer Science #537, (eds. A.J. Menezes and S.A. Vanstone ), Springer-Verlag, 268–273.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 1996

Authors and Affiliations

  • G. Vassilacopoulos
    • 1
  • V. Chrissikopoulos
    • 1
  • D. Peppes
    • 1
  1. 1.Department of InformaticsUniversity of PiraeusPiraeusGreece

Personalised recommendations