90 likes | 109 Views
Explore the challenges of security, trust, and privacy in regional medical image sharing and learn about the Identity & Trust Management Platform. Discover the IDTMP Model and Framework for effective data management and exchange.
E N D
Identity and Trust Management Platform in DICOM Huiping Sun School of Software and Microelectronics, Peking University
Content • Regional Medical Image Exchange & Sharing • Challenge: Security, Trust, Privacy • IDTMP: Identity & Trust Management Platform • IDTMP Model • IDTMP Framework • Conclusions
Patient Patient Patient Medical Image Data ManagementSystem Doctor Doctor Doctor Medical Image Data Regional Medical Image Exchange & Sharing Hospital A Hospital B PACS PACS Regional Medical Image Exchange &Sharing Center Others Government Insurer Academia
Challenge:Security, Trust, Privacy • Security • Confidentiality, Availability, Integrity, Non-repudiation • Trust • Cycle of trust • Privacy • Who, When, How using my medical image • Big Brother, Little Sister
Hospital B Patient Patient Patient PACS PACS Medical Image Data ManagementSystem Doctor Doctor Doctor Medical Image Data IDTMP:Identity and Trust Management Platform Hospital A Hospital A Regional Medical Image Exchange &Sharing Center IDTMP: Identity & Trust Management Platform Others Government Insurer Academia
Authentication Authorization Access Control User-Centric Trust Management Audit IDTMP Model Data Control User Control Operation Control Service Control Data origin authentication Device Authentication user authentication Device Trust Doctor Trust Operation Trust Data Content Trust Operation Log Operation Trails
User IDTMP Combination Public key User Trust Control Authentication Service Access Control Service Authorization Service User Policy Control Privilege Management Attribute Management Risk Management IDTMP Framework Audit Service Policy Management Trust Management Medical Image Data Reputation System Other Trust Info Sources
Conclusions • IDMTP • For security • Uniform authentication based CPK • Authorization model based role, time, content • Access control based entity trust & resource risk • For trust • Trust Metric, Reputation system • For privacy • User-centric policy and trust control • Audit log and trails
Thanks for you attention ! Huiping Sun (孙惠平) sunhp@ss.pku.edu.cn http://www.ss.pku.edu.cn