Skip to main content

JIGDFS: A SECURE DISTRIBUTED FILE SYSTEM FOR MEDICAL IMAGE ARCHIVING

  • Conference paper
  • First Online:
Biomedical Engineering
  • 2021 Accesses

Abstract

The growth in use of medical imaging resulted in great challenges, such as handling, storing, retrieving and transmitting biomedical images. The Health Information Technology for Economic and Clinical Health (HITECH) Act went into effect in February 2010 [1]. The HITECH Act has drawn great attention to healthcare IT. One of the major concerns in healthcare IT is the development of highly secure medical imaging archiving systems. Although, the Digital Imaging and Communications in Medicine (DICOM) standard [2] enables the integration of modalities, servers, workstations and printers into a picture archiving and communication system (PACS), it does not specify how to handle the underlying storage system efficiently and securely. Further, a commercial PACS system often does not actively address the security concerns of healthcare professionals. Meanwhile, due to the lack of expert knowledge in the computer and information security fields, the physicians and medical imaging technicians are often reluctant to embrace new medical imaging technologies. In some cases, healthcare professionals are not able to fully appreciate security issues. Without proper education, it is hardly possible to increase the medical professionals’ level of confidence, over the security features of a medical imaging system. On the other hand, when developing such a system, the software engineers need to have a deep understanding of not only the importance of security in such an environment, but also possess a certain level of knowledge about the medical practice environment. Therefore, cross-disciplinary collaboration is inevitable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Congress of USA. (2009, September) U.S. Government Printing Office. [Online]. http://fdsys.gpo.gov/fdsys/pkg/BILLS-111hr1ENR/pdf/BILLS-111hr1ENR.pdf

  2. NEMA. (2009, June) National Electrical Manufacturers Association, DICOM. [Online]. ftp://medical.nema.org/medical/dicom/2008/

  3. AHIMA. (2002, June) American Health Information Management Association. [Online]. http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_012545.hcsp?dDocName=bok1_012545

  4. Tim Dierks and Christopher Allen. (1999, January) Rfc 2246: The tls protocol. [Online]. http://www.ietf.org/rfc/rfc2246.txt

  5. Russell Housley. (1999, June) Cryptographic Message Syntax. [Online]. http://www.ietf.org/rfc/rfc2630.txt

  6. Burt Kaliski. (1998, March) PKCS #7: Cryptographic Message Syntax Version 1.5. [Online]. http://www.ietf.org/rfc/rfc2315.txt

  7. NEMA. (2009) The DICOM standard. [Online]. ftp://medical.nema.org/medical/dicom/final/cp895ft.pdf

  8. Jim Schaad. (2003, July) Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS). [Online]. http://tools.ietf.org/rfc/rfc3565.txt

  9. Michael O. Rabin, “Efficient dispersal of information for security, load balancing, and fault tolerance,” J. ACM, pp. 335–348, 1989.

    Google Scholar 

  10. Jiang Bian, Umit Topaloglu, and Cheryl Lane, “EIR: Enterprise imaging repository, an alternative imaging archiving and communication system,” in EMBC ’09: Proceedings of the 31st Annual International IEEE EMBS Conference, Minneapolis, Minnesota, 2009.

    Google Scholar 

  11. Gunter Zeilinger. (2009) Open Source Clinical Image and Object Management. [Online]. http://www.dcm4che.org/

  12. The OsiriX Foundation. (2009) OsiriX Imaging Software, Advanced Open-Source PACS Workstation DICOM Viewer. [Online]. http://www.osirix-viewer.com/

  13. Andreas Knopke. (2009) K-PACS DICOM Viewing Software. [Online]. http://www.k-pacs.net/

  14. ClearCanvas Inc. (2009) clearcanvas. [Online]. http://www.clearcanvas.ca/dnn/

  15. Adi Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979.

    Article  MathSciNet  MATH  Google Scholar 

  16. J. J. Wylie et al., “Survivable information storage systems,” Computer, vol. 33, no. 8, pp. 61–68, Aug 2000.

    Article  Google Scholar 

  17. G. R. Ganger et al., “Survivable storage systems,” in DARPA Information Survivability Conference & Exposition II, 2001. DISCEX ’01. Proceedings, 2001, pp. 184–195 vol.2.

    Google Scholar 

  18. Steven Hand and Timothy Roscoe, “Mnemosyne: Peer-to-Peer Steganographic Storage,” in IPTPS ’01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, London, UK, 2002, pp. 130–140.

    Google Scholar 

  19. D. Hayashi, T. Miyamoto, S. Doi, and S. Kumagai, “Design and implementation of autonomous distributed secret sharing storage system,” in APCC 2003. The 9th Asia-Pacific Conference on Communications, 2003., 2003, pp. 57–60 Vol.1.

    Google Scholar 

  20. Arun Subbish and Douglas M. Blough, “An approach for fault tolerant and secure data storage in collaborative work environments,” in StorageSS ’05: Proceedings of the 2005 ACM workshop on Storage security and survivability, New York, NY, 2005, pp. 84–93.

    Google Scholar 

  21. Zooko Wilcox-O’Hearn and Brian Warner, “Tahoe: the least-authority filesystem,” in StorageSS ’08: Proceedings of the 4th ACM international workshop on Storage security and survivability, New York, NY, USA, 2008, pp. 21–26.

    Google Scholar 

  22. Clesafe.verorg. (2007, June) Cleversafe.org. [Online]. http://www.cleversafe.org/documentation/

  23. Irving S Reed and Gustave Solomon, “Polynomial Codes Over Certain Finite Fields,” Journal of the Society for Industrial and Applied Mathematics, pp. 300–304, 1960.

    Google Scholar 

  24. Robert G. Gallager, “Low Density Parity-Check Codes,” Cambridge, MA, USA, 1963.

    Google Scholar 

  25. C. Berrou, A. Glavieus, and P. Thitimajshima, “Near Shannon limit error-correcting coding and decoding: Turbo-codes,” Communications 1993 ICC 93 Geneva Technical Program Conference Record IEEE International Conference on (1993), pp. 1064–1070, 1993.

    Google Scholar 

  26. Michael Luby, “LT Codes,” in FOCS ’02: Proceedings of the 43rd Symposium on Foundations of Computer Science, Washington, DC, USA, 2002, p. 271.

    Google Scholar 

  27. Amin Shokrollahi, “Raptor codes,” IEEE/ACM Trans. Netw., pp. 2551–2567, 2006.

    Google Scholar 

  28. C. E. Shannon, “A mathematical theory of communication,” SIGMOBILE Mob. Comput. Commun. Rev., pp. 3–55, 2001.

    Google Scholar 

  29. Johannes Blömer et al., “An XOR-Based Erasure-Resilient Coding Scheme,” International Computer Science Institute, 1995.

    Google Scholar 

  30. James S. Plank and Lihao Xu, “Optimizing Cauchy Reed-Solomon Codes for Fault-Tolerant Network Storage Applications,” in NCA ’06: Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, Washington, DC, USA, 2006, pp. 173–189.

    Google Scholar 

  31. Mahadev Satyanarayanan et al., “Coda: A Highly Available File System for a Distributed Workstation Environment,” IEEE Trans. Comput., pp. 475–459, 1990.

    Google Scholar 

  32. M. Satyanarayanan, “The evolution of coda,” ACM Trans. Comput. Syst., pp. 85–124, 2002.

    Google Scholar 

  33. John Kubiatowicz et al., “OceanStore: an architecture for global-scale persistent storage,” SIGARCH Comput. Archit. News, pp. 190–201, 2000.

    Google Scholar 

  34. William J. Bolosky, John R. Douceur, and Jon Howell, “The Farsite project: a retrospective,” SIGOPS Oper. Syst. Rev., vol. 41, no. 2, pp. 17–26, 2007.

    Article  Google Scholar 

  35. NIST. (1979) National Institute of Standards and Technology. [Online]. http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf

  36. Electronic Frontier Foundation, Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design. Sebastopol, CA, USA: O’Reilly & Associates, Inc., 1998.

    Google Scholar 

  37. Jiang Bian, Umit Topaloglu, Remzi Seker, Coskun Bayrak, and Chia-Chu Chiang, “A role-based secure group communication framework,” in Proceedings of the third International Conference on System of Systems Engineering, Monterey, California, United States, 2008.

    Google Scholar 

  38. Jing Deng, Richard Han, and Shivakant Mishra, “INSENS: Intrusion-tolerant routing for wireless sensor networks,” Computer Communications: Dependable Wireless Sensor Networks, vol. 29, no. 2, pp. 216–230, January 2006.

    Google Scholar 

  39. Jing Deng, Richard Han, and Shivakant Mishra, “A performance evaluation of intrusion-tolerant routing in wireless sensor networks,” in IPSN’03: Proceedings of the 2nd international conference on Information processing in sensor networks, Palo Alto, CA, 2003, pp. 349–364.

    Google Scholar 

  40. Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung, “The google file system,” SIGOPS Oper. Syst. Rev., vol. 37, no. 5, pp. 29–43, 2003.

    Article  Google Scholar 

  41. Chandramohan A. Thekkath, Timothy Mann, and Edward K. Lee, “Frangipani: a scalable distributed file system,” SIGOPS Oper. Syst. Rev., vol. 32, no. 5, pp. 224–237, 1997.

    Article  Google Scholar 

  42. Frank B. Schmuck and Roger L. Haskin, “GPFS: A Shared-Disk File System for Large Computing Clusters,” in FAST ’02: Proceedings of the Conference on File and Storage Technologies, Berkeley, CA, USA, 2002, pp. 231–244.

    Google Scholar 

  43. J. Daemen and V. Rijmen, “AES Proposal: Rijndael,” 1999.

    Google Scholar 

  44. Health Level Seven International. (2007) Health level 7 (HL7) V2 messages standard. [Online]. http://www.hl7.org/implement/standards/v2messages.cfm

  45. George W. Beeler, “HL7 version 3–an object-oriented methodology for collaborative standards development,” International Journal of Medical Informatics, vol. 48, pp. 151–161, 1998.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Remzi Seker .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this paper

Cite this paper

Bian, J., Seker, R. (2011). JIGDFS: A SECURE DISTRIBUTED FILE SYSTEM FOR MEDICAL IMAGE ARCHIVING. In: Suh, S., Gurupur, V., Tanik, M. (eds) Biomedical Engineering. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-0116-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-0116-2_6

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-0115-5

  • Online ISBN: 978-1-4614-0116-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics