500 likes | 920 Views
Among Internet protocols, e-mail plays a relevant role in interpersonal ... the association is declared inside a certificate, digitally signed by the CA ...
E N D
Slide 1:Internet in (Tele)Medicine&Data Security issues
Vincenzo Della Mea Dept. of Pathology, University of Udine dellamea@dimi.uniud.it VI CATAI Summer Course Athens, Greece, October 1998
Slide 2:SUMMARY
The Internet Basic concepts E-mail Mailing lists and newsgroups WWW Security Cryptography Certification Internet and (Tele)medicine
Slide 3:The Internet is...
Physically: a collection of networks Technically: a collection of common, standard, machine-independent protocols Socially:An attitude to intercommunicate
Slide 4:Why to use the Internet?
it is cheap it is widely available it is easy it is already used for other tasks
Slide 5:Internet capabilities
Basic Protocols Personal communications:E-Mail Group collaborations:Newsgroups, mailing lists, web-based discussion groups Dissemination of information:World Wide Web
Slide 6:Basic Concepts
four-layer set of protocols each connected computer is designated by a 32-bit number a port number is also associated to each connection TCP/IP are connectionless protocols information is transferred in packets client/server paradigm
Slide 7:An application protocol defines commands and formats for the exchange of messages of any size between two computers. TCP manages connection-oriented streams of data, by multiplexing the message into datagrams, reassembling them at the other end, and sending again lost data. IP is responsible for routing individual datagrams. IP finds a route for the datagram after adding its own header to it. Common interface to the physical media where data are carried. The most diffused one is Ethernet.
Communication Layers
Slide 8:Security Considerations
Secure Socket Layer (SSL): data encryption on the sockets layer for secure low-level communications, with server authentication, encryption of data in transit, and optional client authentication. Network firewalls: for protecting one network from another untrusted network, by means of, traffic blockage, traffic permission, and tracing. Proxies: high-level applications which act as a gateway between specific applications and the network; this allows to filter and log traffic. Future evolutions in IPng
Slide 9:Quality of Service
IP does not provide any guarantee on the delivery of datagrams; this means that information can be lost during transmission. TCP implements quality of service by automatically resending lost datagrams. Currently there aren't guarantees on performance, as well as on priority of messages (but they will be introduced with IPv6). Use of Intranets may allow some QoS guarantee.
Slide 10:Personal Communications through E-mail
Among Internet protocols, e-mail plays a relevant role in interpersonal communications on the Internet. Being telemedicine a particular form of dialogue between distant actors, electronic mail may be adopted as a mean for carrying out such dialogue, under precise constraints and with some limitation. Store-and-forward communications
Slide 11:Basic e-mail protocols
Store-and-forward transmissions Communication protocol: SMTP, Simple Mail Transfer Protocol Message format:RFC822 (plain text messaging) Protocols for message retrieval: POP3, IMAP4
Slide 12:E-mail basic protocols
CLIENT SERVER SMTP POP3, IMAP4 MUA SMTP server; POP server; IMAP4 server; ... outgoing messages ingoing messages
Slide 13:Message Format
RFC822 comprises a header with a series of fields, including among other information: sender, recipient, subject, date and the message body given by pairs field:value. Some of these fields are automatically filled by the MUA, some by the user, and finally some by the SMTP server. A user address is designated as follows: user.name@domain.org
Slide 14:Multimedia E-mail
MIME (Multipurpose Internet Mail Extensions) internal organization of the message body, and methods for encoding binary data. seven content types: text, multipart, application, message, image, audio, video. the multipart type allows to combine several body parts, also nested and of different type. Standard subtypes: image/jpeg, image/gif, etc. Content-Transfer -Encoding header field: specifies how data are encoded (usually with Base64).
Slide 15:Security considerations
Plain e-mail: no privacy of data (readable during all the path between sender and recipient) A recent proposal introduces PEM (Privacy Enhanced Mail) as a natural use of MIME capabilities (through multipart/signed and multipart/encrypted) PGP (Pretty Good Privacy): a DES-based software for PEM, current de-facto standard for personal private communications No standard, diffused implementations No easy way to have certification
Slide 16:Quality of Service
E-mail protocols provide for a very accurate range of services, including automatic retry in sending messages with configurable frequence and for a configurable amount of time; different levels of user notification, are available for any failure that can occur. Performance control is not specified, also because the intrinsically asynchronous nature of e-mail makes it less sensitive to delays.
Slide 17:Newsgroups
Apparently topic-based public discussion groups based on NNTP protocol very useful for some exchange of information (i.e. the Linux project) in the reality, not very focussed New problem: SPAM
Slide 18:Mailing lists
distribution lists based on e-mail sometimes there is a moderator better focussed than newsgroups Our experience: we are running ITAPAT, the mailing list of italian pathologists
Slide 19:Security considerations
A main issue is related to the identity of senders: messages can be forged as coming from recognised individuals or institutions, thus inducing trust on readers. Currently no technical solutions are available. Mailing lists are based on e-mail protocols, and thus can rely on these for introducing privacy and security. In addition, moderators and selected subscriptions can reduce noise on information and presence of unauthorized people. Spam
Slide 20:Quality of Service
News servers are public services, whose policies are left to the server' owner. Message exchanges occur among servers with a certain time delay that can produce some differences in the content of the servers in a certain time. The content quality can be ensured only by moderation. Mailing lists are based on e-mail, thus inheriting from it quality and perfomance. The content quality can be ensured mainly by moderation on content and on subscribers selection.
Slide 21:World Wide Web
Distributed Hypermedia on the Internet through a transfer protocol: HTTP (Hypertext Transfer Protocol) can include any file format the basic one is HTML (HyperText Markup Language) other standards are GIF, JPEG, MPEG
Slide 22:HTML(Hypertext Markup Language)
An HTML document is a plain text file containing text interspersed with tags. Usually the tags (which are commands) may be nested. Tags: <tag_name>text</tag_name> <tag_name attribute1=value1 ... attributeN=valueN> text </tag_name> <tag_name> Sample document: <html> <head> <title>This is an HTML document </title> </head> <body> ... </body> </html>
Slide 23:An example
<HTML>><HEAD> <TITLE>This is the title</TITLE> </HEAD> <BODY BGCOLOR=White> <H1>Main Header</H1> <H2>2nd header</H2> This is a list: <UL><LI> one <LI> two <LI> three</UL> This is a table: <TABLE BORDER> <TR><TD><B>bold</B> <TD><I>italic</I> <TD><I><B>both...</B></I><TR> <TD><FONT SIZE=5>higher font</FONT> <TD>try to click <A HREF=“link.html”>here</A>... <TD>This is an image <BR> <IMG SRC=“img.gif”></TABLE> </BODY></HTML>
Slide 24:HTTP
Basic file transfer aimed at WWW: GET, POST, HEAD Clients able to display images and video PUSH method for live video
Slide 25:WWW: Ease of use
WWW clients:unified interface for the most used protocols on the Internet (HTTP, FTP, E-mail, News, ...) WWW currently accounts for the most part of traffic on the Internet Sometimes, too much traffic to guarantee the quality of service
Slide 26:Security considerations/1Security risks on the World Wide Web
Server side security risks, including: Unauthorized access to private or confidential documents; Availability of information about the server's host machine; Bugs that allow active intruders to execute commands on the server's host machine; "Denial of service" attacks. Client-side security risks, including: virus-like active content of web pages; Unauthorized access to personal user information. Network security risks, including: Interception by intruders of private or confidential information sent by the remote user to the server. (e.g. credit card information); Interception by intruders of private or confidential information sent by the server to the remote user.
Slide 27:Security considerations/2Solutions
through SSL (Secure Socket Layer) HTTP+SSL = HTTPS (secure servers) Electronic commerce will find the global solution (SET, Cybercash, OpenMarket) USA restrictions in exporting encryption software is delaying the diffusion of security tools
Slide 28:Quality of Service
Currently no guarantees are available on WWW performance. This is particularly important because WWW applications, which involve multimedia communications, are sensitive to delays in the user interface, which is based on remote data and images. Content quality control is left to content providers, although some development is coming in this direction, such as PICS. Medical content: often unaffordable, evaluation mechanisms are being studied
Slide 29:Other features
FTP, one of the first Internet protocols, allows the exchange of files between different computers connected to the Internet. Telnet is the virtual terminal protocol in the Internet set of protocols. It allows users of one host to log into a remote host and interact as normal terminal users of that host. Gopher is a distributed document search and retrieval protocol, that allows the hierarchical organisation of documents across different machines on the net.
Conferencing systems CU-SeeMe, Netscape CoolTalk, Microsoft NetMeeting These systems offer different types of conferencing and collaboration: CU-SeeMe is a public domain software developed by the Cornell University with videophone performance (that is up to 320x240, 16 grey levels and audio), while Cooltalk and NetMeeting are collaboration software.Slide 31:MBONE
Multicast backBONE experimental virtual network superimposed upon the Internet. efficient real-time distribution of data to multiple destinations using IP multicast. Limitations of the current Internet restrict the quality of received audio and video
Slide 32:IPv6 -or IPng- is a new version of IP, that introduces a number of enhancements: designed to run on high performance networks as well as on low bandwidth networks; addressing and routing issues a larger address space (128 bit addresses) autoconfiguration capabilities simplified IP packets native security Multicast and anycast features "Quality of service" functions
New Developments: IPng
Slide 33:Security
Problems: authentication integrity privacy non-repudiation Cryptography secret-key public-key Certification hierarchies
Slide 34:Public key cryptography
M: private key, Y: public key, X: message,Encode(Key,Data), Decode(Key, Data) Decode (Y, Encode(M, X)) = Decode (M, Encode(Y, X)) = M F(M)=Y and F-1(Y)=M: computationally hard To be sure you are receiving the message from ME: I: Encode(M, X) -> Z You: Decode(Y, Z) To be sure your message is read only by ME: You: Encode(Y, X) -> Z I: Decode(M, Z)
Slide 35:Certification infrastructure
Communication between: users user and system systems when users or systems from different communities want to communicate, someone is needed to guarantee reciprocal trust: is that public key really held by the user I want to speak with? external (trusted) entities can carry out this task, exactly as the notary do
Slide 36:Certification Authority (CA)
an entity which guarantee for the association between public keys and user/system identity the association is declared inside a certificate, digitally signed by the CA the sender which wants to communicate sends his certificate to the recipient the recipient can decide if the CA which signed the certificate is trusted or not, and thus the sender.
Slide 37:Who certifies the CA? A hierarchy of CAs
CAs are useful mainly when communicating between unknown communities; thus some way of ensuring trust in CAs is needed the solution is a hierarchy of CAs, where each level certifies the lower, down to the user/system the top level CA is called Policy CA: it establishes the rules all Cas should respect, to be part of the hierarchy
Slide 38:CA Policy
identity validation privacy statements certificate emission certificate revocation ...
Slide 39:Certificates
Standard format: X.509 (v1-v3) Information inside the certificate: version number serial number signature info issuer validity period subject public key info certificate signature
Slide 40:Examples
SENDER Web clientencrypt with encrypted form data Email userencrypt with encrypted messageencrypt with private keypublic key RECEIVER HTTP serverpublic keydecrypt with private key Email userpublic keydecrypt with private keysigned messagedecode with
Slide 41:European directions
ICE-TEL (Interworking public-key Certification Infrastructure for Europe)1995 - 1997 ICE-CAR (Interworking public-key Certification Infrastructure for Europe for Commerce, Applications and Research)1997 -
Slide 42:Medicine...
is based on many kinds of communication: textual visual spoken expert knowledge is spreaded around the world gains power from easy and wide communication: for diagnostic practice for scientific purposes for teaching aims
Slide 43:Medical Doctors communicate...
For diagnostic aims: in the same field, with traditional means (mail, phone) all around the world to reach the right expert in different fields, with written reports (e.g. other examinations) (often inside the hospital) For scientific aims: through conferences in scientific journals For teaching aims: usings books (often with many pictures) using slides usingdirect examinations
Slide 44:Basic needs
The physician works with communication: easy and quick use of instruments medical information is multimedia: not only text or voice medical data are often patient’ private data: no public access to them
Slide 45:Medical uses of e-mail
among physicians consultation diagnosis continuous education between physician and patient test results and interpretations medication instructions anagraphical data exchange
Slide 46:Medical uses of newsgroups and mailing lists
scientific aims continuous education collaborative diagnosis
Slide 47:Medical uses of WWWApplications
multimedia for undergraduate and postgraduate education; multimedia for continuing education through: networked implementation of CME credit mat erials; WWW access to medical databases (for ease of use) interface for remote access to databases such as Medline, Genbank etc. Multimedia for patient information and education
Slide 48:Medical uses of WWWProblems
Information published on the WWW can reach a wide number of readers; no way for characterizing the quality of WWW information is currently available; the user can equally access correct as well as incorrect information: Incorrect: misinformation and fraud. Correct: ethical problems due the different perception that physicians and patients have about a medical topic (e.g. researches on cancer treatments).
Slide 49:Internet problems
The Internet interconnects scientific as well as commercial and entertainment networks. Consequences: almost all scientific institutions are connected, thus also many hospitals, and this is a great incentive for its use in telemedicine. As more people use the Internet, as slower and insecure become communications, and this possibly dissuades from its use for telemedicine. Currently it is difficult to carry out realtime tasks on the Internet
Slide 50:Internet in Medicine:Is it Telemedicine?
in the broad sense of telemedicine, yes a widely used mean gives many additional problems Is the Internet adequate for medical uses? a recent estimation accounted medical exchanges for about 25% of the Internet traffic... growing.