Abstract

The problem of consistency of medical data in Hospital Data Management Systems is considered in the context of correctness of medical images stored in a PACS (Picture Archiving and Communication System) and legality of actions authorized users perform when accessing MIS (Medical Information System) facilities via web interfaces. The purpose of the study is to develop a SIEM-like (Security Information and Event Management) architecture for offline analysis of DICOM (Digital Imaging and Communications in Medicine) archive integrity and users’ activity. To achieve amenable accuracy when validating DICOM archive integrity, two aspects are taken into account: correctness of periodicity of the incoming data stream and correctness of the image data (time series) itself for the considered modality. Validation of users’ activity assumes application of model-driven approaches using state-of-the-art machine learning methods. This paper proposes a network architecture with guard clusters to protect sensitive components like the DICOM archive and application server of the MIS. New server roles were designed to perform traffic interception, data analysis and alert management without reconfiguration of production software components. The cluster architecture allows the analysis of incoming big data streams with high availability, providing horizontal scalability and fault tolerance. To minimize possible harm from spurious DICOM files the approach should be considered as an addition to other securing techniques like watermarking, encrypting and testing data conformance with a standard.

Highlights

  • Today, healthcare facilities are vast ecosystems made up of a large number of network devices, equipment and systems that often require connection to external systems

  • We propose architecture of a versatile and extensible information system designed to work in a SIEM cluster with traffic interception, analytics facilities

  • The architecture of analytical clusters is used to improve functionality of SIEM environments deployed in hospitals

Read more

Summary

Introduction

Healthcare facilities are vast ecosystems made up of a large number of network devices, equipment and systems that often require connection to external systems. Medical data are very sensitive to change, and poses a real threat to the health and life of patients. One does not need to have special skills to become familiar with the potential vulnerabilities that a healthcare facility may face. The security of medical data must be ensured at every stage of receiving, transferring, processing and storing information to ensure the confidentiality of patient data, as well as the availability and sustainability of health services at the same time [1]. Manufacturers of medical systems, as well as organizations that organize support, need to implement measures to ensure the necessary level of protection against cyber threats, to increase the level of safety of patients and the infrastructure of the medical institution as a whole.

Objectives
Methods
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call