secureteleassistance towards endless
play

SecureTeleassistance towards endless medical litigations: - PDF document

SecureTeleassistance towards endless medical litigations: Identification of liabilities through a protocol using Joint Watermarking-Encryption Evidences Dalel Bouslimi, Gouenou Coatrieux, Michel Cozic, Christian Roux


  1. SecureTeleassistance towards endless medical litigations: Identification of liabilities through a protocol using Joint Watermarking-Encryption Evidences Dalel Bouslimi, Gouenou Coatrieux, Michel Cozic, Christian Roux Dalel.Bouslimi@telecom-bretagne.eu 03/09/2014 Institut Mines-Télécom

  2. Outline ● Telemedicine and security ● French legislation and security needs ● Proposed telemedicine protocol A. “Request for Opinion” sub-protocol B. “Opinion Response” sub-protocol C. “Verification” sub-protocol ● Security analysis ● Conclusion 2 Institut Mines-Télécom Présentation de Télécom Bretagne 03/09/2014

  3. Telemedicine and Security ● Example : tele-expertise scenario Request for opinion Internet Referent opinion Expert ( E ) Physician ( P ) • Security? • Liability of each Threat physician? 3 Institut Mines-Télécom Présentation de Télécom Bretagne 03/09/2014

  4. French legislation and security needs ● transmitted data have to be saved with the identity of all practitioners and patient , the transaction date and time . ● Save the substance of the answer of the referent with the identifiers of the physician , the specialist , the transaction date and time . ● The date , time and substance of the answer of the referent practitioner must be strongly linked to the documents he received before sending it. ● Both practitioners must be identified in such a way they cannot repudiate their respective messages . ● Data have to be stored on a non-erasable medium for the prescription period required by national law. ● all elements involved in the transaction must be carefully stored , with no means of modification , and must be rendered unreadable from an unauthorized access . 4 Institut Mines-Télécom Présentation de Télécom Bretagne 03/09/2014

  5. French legislation and security needs ● transmitted data have to be saved with the identity of all practitioners and patient , the transaction date and time . Save exchanged data with the identifiers of physicians ● Save the substance of the answer of the referent with the identifiers of and patient, and the transaction timestamp the physician , the specialist , the transaction date and time . ● The date , time and substance of the answer of the referent practitioner must be strongly linked to the documents he received before sending it. Maintain a strong link between the request for opinion ● Both practitioners must be identified in such a way they cannot and its answer repudiate their respective messages . ● Data have to be stored on a non-erasable medium for the prescription period required by national law. ● all elements involved in the transaction must be carefully stored , with no Ensure the confidentiality , the integrity and the non- means of modification , and must be rendered unreadable from an repudiation unauthorized access . 5 Institut Mines-Télécom Présentation de Télécom Bretagne 03/09/2014

  6. Proposed telemedicine protocol ● Based on Joint Watermarking-Encryption (JWE) Encryption: confidentiality ➢ Watermarking : Dissimulate the information in the data ➢ themselves independently of its file format. • !"#$%& %&'()*('(+, %&'()*('(+, -("+&.%(+, / )$+0&"+(1(+,2 3 3 &4*&5 )" ("+&.%(+, 6%778 / +0& (5&"+(8(&%# 78 +0& 5(88&%&"+ &"+(+(&# ("97'9&5 (" +0& &:10)".&; • Introduce a secure link between exchanged data 3 &4*&5 +%)"#)1+(7" +(4&#+)46 / 5(.(+)' #(.")+$%& 78 %&')+&5 571$4&"+#; 6 Institut Mines-Télécom Présentation de Télécom Bretagne 03/09/2014

  7. Joint Watermarking-encryption approach • ms & me : messages available in the spatial and encrypted domains. ☺ Give access to watermarking security functionalities before & after decryption process. ☺ Compliant with DICOM standard. 7 Institut Mines-Télécom Présentation de Télécom Bretagne 03/09/2014

  8. Proposed telemedicine protocol: general principal Third Tierce Party (TTP) Request & generate Request & generate a watermark a watermark Request for opinion / Referent opinion Expert Praticien (E) (P) 8 Institut Mines-Télécom Présentation de Télécom Bretagne 03/09/2014

  9. Proposed telemedicine protocol: general principal Third Tierce Party (TTP) Request & generate Request & generate a watermark a watermark Submit evidences Request for opinion / Referent opinion Expert Praticien (E) (P) 9 Institut Mines-Télécom Présentation de Télécom Bretagne 03/09/2014

  10. Proposed telemedicine protocol • Three sub-protocols: A. “Request for Opinion” sub-protocol B. “Opinion Response” sub-protocol C. “Verification” sub-protocol 10 Institut Mines-Télécom Présentation de Télécom Bretagne 03/09/2014

  11. “Request for Opinion” sub-protocol Third Tierce Party (TTP) Physician (P) Expert (E) X : document to Y : document to send to the send to the referent (request physician (referent for opinion) opinion) 11 Institut Mines-Télécom Présentation de Télécom Bretagne 03/09/2014

  12. “Request for Opinion” sub-protocol Third Tierce Party (TTP) Physician (P) Expert (R) 1. Watermark Identifiers in encrypted form generation Generate watermark & its digital signature WX WX in encrypted form & its digital signature 12 Institut Mines-Télécom Présentation de Télécom Bretagne 03/09/2014

  13. “Request for Opinion” sub-protocol Third Tierce Party (TTP) Physician (P) Expert (R) 1. Watermark Identifiers in encrypted form generation Generate watermark & its digital signature WX 2. Request Store the Transmission WX in encrypted form signature of WX & its digital Reliability WX signature proof ( me ) JWE 13 Institut Mines-Télécom Présentation de Télécom Bretagne 03/09/2014

  14. “Request for Opinion” sub-protocol Third Tierce Party (TTP) Physician (P) Expert (R) 1. Watermark Identifiers in encrypted form generation Generate watermark & its digital signature WX 2. Request Store the Transmission WX in encrypted form signature of WX & its digital Reliability WX signature proof ( me ) JWE Xwe Verify image reliability 3. Receipt acknowldg. transmission Generate a receipt Store acknowledg. 14 Institut Mines-Télécom Présentation de Télécom Bretagne 03/09/2014

  15. “Opinion Response” sub-protocol Third Tierce Party (TTP) Referent (R) Expert(E) 1. Watermark Identifiers in encrypted generation Generate watermark form & its signature WY 2. Request Store the Reliability Transmission WY in encrypted form signature of WY proof Xw & its signature WY me Generate me JWE Ywe Verify image reliability 3. Receipt acknowldg. & its link with Xw transmission Generate a receipt Store acknowledg. 15 Présentation de Télécom Bretagne 12/12/2013 15 Institut Mines-Télécom 03/09/2014

  16. “Verification” sub-protocol Proofs ● Exchanged documents ( Xw & Yw ). ● TTP digital signatures of WX & WY . ● Receipt acknowledgment: signatures of received documents ( Xw & Yw ). 1. Verification of embedded watermarks. ! "#$%& '#$ ()%*+$,' -*'#$,'.%.'/ -,( .'0 1.,& 2.'# '#$ '3-,0-%'.),4 16 Institut Mines-Télécom Présentation de Télécom Bretagne 03/09/2014

  17. “Verification” sub-protocol Proofs ● Exchanged documents ( Xw & Yw ). ● TTP digital signatures of WX & WY . ● Receipt acknowledgment: signatures of received documents ( Xw & Yw ). 2. Verification Xw and Yw correspond to those really exchanged. Watermarked document Compute Xw (resp. Yw ) signature =? Yes/no Stored signature of Xw (resp. Yw ) 17 Institut Mines-Télécom Présentation de Télécom Bretagne 03/09/2014

  18. Security analysis ● Robust to non-repudiation issue and collusion attack . ● Collusion attack o Both physicians cooperate to circumvent the protocol. o Repeat protocol steps to build false evidences. o Insert new watermarks or watermarks previously generated into new documents. ! ! The timestamps and/or the images’ identifiers don’t correspond to those presented by the colluders. 18 Institut Mines-Télécom Présentation de Télécom Bretagne 03/09/2014

  19. Conclusion ● A new secure tele-assistance protocol based on Joint Watermarking-Encryption algorithm ● Jointly offered security services: • Confidentiality. • !"#" $%&'"('&'#)* • +$,-'.% %-'.%/0% #1"# "/ %201"/3% ,004$$%.* • Identify which data were involved by means of a secure link between them. ● Resistant to non-repudiation issue and collusion attack 19 Institut Mines-Télécom Présentation de Télécom Bretagne 03/09/2014

  20. Thank Thank you you for for your your attention attention 20 Institut Mines-Télécom Présentation de Télécom Bretagne 02/09/2014

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend