Title: Internet in TeleMedicine
1Internet in (Tele)MedicineData Security issues
VI CATAI Summer Course Athens, Greece, October
1998
- Vincenzo Della Mea
- Dept. of Pathology, University of Udine
- dellamea_at_dimi.uniud.it
2SUMMARY
- The Internet
- Basic concepts
- E-mail
- Mailing lists and newsgroups
- WWW
- Security
- Cryptography
- Certification
- Internet and (Tele)medicine
3The Internet is...
- Physically a collection of networks
- Technically a collection of common, standard,
machine-independent protocols - SociallyAn attitude to intercommunicate
4Why to use the Internet?
- it is cheap
- it is widely available
- it is easy
- it is already used for other tasks
5Internet capabilities
- Basic Protocols
- Personal communicationsE-Mail
- Group collaborationsNewsgroups, mailing lists,
web-based discussion groups - Dissemination of informationWorld Wide Web
6Basic Concepts
- four-layer set of protocols
- each connected computer is designated by a 32-bit
number - a port number is also associated to each
connection - TCP/IP are connectionless protocols
- information is transferred in packets
- client/server paradigm
7Communication Layers
- An application protocol defines commands and
formats for the exchange of messages of any size
between two computers. - TCP manages connection-oriented streams of data,
by multiplexing the message into datagrams,
reassembling them at the other end, and sending
again lost data. - IP is responsible for routing individual
datagrams. IP finds a route for the datagram
after adding its own header to it. - Common interface to the physical media where data
are carried. The most diffused one is Ethernet.
8Security Considerations
- Secure Socket Layer (SSL) data encryption on the
sockets layer for secure low-level
communications, with server authentication,
encryption of data in transit, and optional
client authentication. - Network firewalls for protecting one network
from another untrusted network, by means of,
traffic blockage, traffic permission, and
tracing. - Proxies high-level applications which act as a
gateway between specific applications and the
network this allows to filter and log traffic. - Future evolutions in IPng
9Quality of Service
- IP does not provide any guarantee on the delivery
of datagrams this means that information can be
lost during transmission. - TCP implements quality of service by
automatically resending lost datagrams. - Currently there aren't guarantees on performance,
as well as on priority of messages (but they will
be introduced with IPv6). - Use of Intranets may allow some QoS guarantee.
10Personal Communications through E-mail
- Among Internet protocols, e-mail plays a relevant
role in interpersonal communications on the
Internet. - Being telemedicine a particular form of dialogue
between distant actors, electronic mail may be
adopted as a mean for carrying out such dialogue,
under precise constraints and with some
limitation. - Store-and-forward communications
11Basic e-mail protocols
- Store-and-forward transmissions
- Communication protocol SMTP, Simple Mail
Transfer Protocol - Message formatRFC822 (plain text messaging)
- Protocols for message retrieval POP3, IMAP4
12E-mail basic protocols
CLIENT
SERVER
SMTP
outgoing messages
POP3, IMAP4
ingoing messages
MUA
SMTP server POP server IMAP4 server ...
13Message Format
- RFC822 comprises a header with a series of
fields, including among other information
sender, recipient, subject, date and the message
body given by pairs fieldvalue. - Some of these fields are automatically filled by
the MUA, some by the user, and finally some by
the SMTP server. - A user address is designated as follows
user.name_at_domain.org
14Multimedia E-mail
- MIME (Multipurpose Internet Mail Extensions)
- internal organization of the message body, and
methods for encoding binary data. - seven content types text, multipart,
application, message, image, audio, video. - the multipart type allows to combine several body
parts, also nested and of different type. - Standard subtypes image/jpeg, image/gif, etc.
- Content-Transfer -Encoding header field
specifies how data are encoded (usually with
Base64).
15Security considerations
- Plain e-mail no privacy of data (readable during
all the path between sender and recipient) - A recent proposal introduces PEM (Privacy
Enhanced Mail) as a natural use of MIME
capabilities (through multipart/signed and
multipart/encrypted) - PGP (Pretty Good Privacy) a DES-based software
for PEM, current de-facto standard for personal
private communications - No standard, diffused implementations
- No easy way to have certification
16Quality of Service
- E-mail protocols provide for a very accurate
range of services, including - automatic retry in sending messages with
configurable frequence and for a configurable
amount of time - different levels of user notification, are
available for any failure that can occur. - Performance control is not specified, also
because the intrinsically asynchronous nature of
e-mail makes it less sensitive to delays.
17Newsgroups
- Apparently topic-based public discussion groups
- based on NNTP protocol
- very useful for some exchange of information
(i.e. the Linux project) - in the reality, not very focussed
- New problem SPAM
18Mailing lists
- distribution lists based on e-mail
- sometimes there is a moderator
- better focussed than newsgroups
- Our experience we are running ITAPAT, the
mailing list of italian pathologists
19Security considerations
- A main issue is related to the identity of
senders messages can be forged as coming from
recognised individuals or institutions, thus
inducing trust on readers. Currently no technical
solutions are available. - Mailing lists are based on e-mail protocols, and
thus can rely on these for introducing privacy
and security. In addition, moderators and
selected subscriptions can reduce noise on
information and presence of unauthorized people. - Spam
20Quality of Service
- News servers are public services, whose policies
are left to the server' owner. Message exchanges
occur among servers with a certain time delay
that can produce some differences in the content
of the servers in a certain time. The content
quality can be ensured only by moderation. - Mailing lists are based on e-mail, thus
inheriting from it quality and perfomance. The
content quality can be ensured mainly by
moderation on content and on subscribers
selection.
21World Wide Web
- Distributed Hypermedia on the Internet
- through a transfer protocol HTTP (Hypertext
Transfer Protocol) - can include any file format
- the basic one is HTML (HyperText Markup Language)
- other standards are GIF, JPEG, MPEG
22HTML(Hypertext Markup Language)
- An HTML document is a plain text file containing
text interspersed with tags. - Usually the tags (which are commands) may be
nested. - Tags
- lttag_namegttextlt/tag_namegt
- lttag_name attribute1value1 ...
attributeNvalueNgt - text lt/tag_namegt
- lttag_namegt
- Sample document
- lthtmlgt
- ltheadgt
- lttitlegtThis is an HTML document lt/titlegt
- lt/headgt
- ltbodygt
- ...
- lt/bodygt
- lt/htmlgt
23An example
ltHTMLgtgtltHEADgt ltTITLEgtThis is the
titlelt/TITLEgt lt/HEADgt ltBODY BGCOLORWhitegt ltH1gtMai
n Headerlt/H1gt ltH2gt2nd headerlt/H2gt This is a
list ltULgtltLIgt one ltLIgt two ltLIgt threelt/ULgt This
is a table ltTABLE BORDERgt ltTRgtltTDgtltBgtboldlt/Bgt ltTD
gtltIgtitaliclt/Igt ltTDgtltIgtltBgtboth...lt/Bgtlt/IgtltTRgt ltTDgtlt
FONT SIZE5gthigher fontlt/FONTgt ltTDgttry to click
ltA HREFlink.htmlgtherelt/Agt... ltTDgtThis is an
image ltBRgt ltIMG SRCimg.gifgtlt/TABLEgt lt/BODYgtlt/HT
MLgt
24HTTP
- Basic file transfer aimed at WWW GET, POST,
HEAD - Clients able to display images and video
- PUSH method for live video
25WWW Ease of use
- WWW clientsunified interface for the most used
protocols on the Internet (HTTP, FTP, E-mail,
News, ...) - WWW currently accounts for the most part of
traffic on the Internet - Sometimes, too much traffic to guarantee the
quality of service
26Security considerations/1Security risks on the
World Wide Web
- Server side security risks, including
- Unauthorized access to private or confidential
documents - Availability of information about the server's
host machine - Bugs that allow active intruders to execute
commands on the server's host machine - "Denial of service" attacks.
- Client-side security risks, including
- virus-like active content of web pages
- Unauthorized access to personal user information.
- Network security risks, including
- Interception by intruders of private or
confidential information sent by the remote user
to the server. (e.g. credit card information) - Interception by intruders of private or
confidential information sent by the server to
the remote user.
27Security considerations/2Solutions
- through SSL (Secure Socket Layer)
- HTTPSSL HTTPS (secure servers)
- Electronic commerce will find the global solution
(SET, Cybercash, OpenMarket) - USA restrictions in exporting encryption software
is delaying the diffusion of security tools
28Quality of Service
- Currently no guarantees are available on WWW
performance. This is particularly important
because WWW applications, which involve
multimedia communications, are sensitive to
delays in the user interface, which is based on
remote data and images. - Content quality control is left to content
providers, although some development is coming in
this direction, such as PICS. - Medical content often unaffordable, evaluation
mechanisms are being studied
29Other features
- FTP, one of the first Internet protocols, allows
the exchange of files between different computers
connected to the Internet. - Telnet is the virtual terminal protocol in the
Internet set of protocols. It allows users of one
host to log into a remote host and interact as
normal terminal users of that host. - Gopher is a distributed document search and
retrieval protocol, that allows the hierarchical
organisation of documents across different
machines on the net.
30Conferencing systems
- CU-SeeMe, Netscape CoolTalk, Microsoft NetMeeting
- These systems offer different types of
conferencing and collaboration CU-SeeMe is a
public domain software developed by the Cornell
University with videophone performance (that is
up to 320x240, 16 grey levels and audio), while
Cooltalk and NetMeeting are collaboration
software.
31MBONE
- Multicast backBONE
- experimental virtual network superimposed upon
the Internet. - efficient real-time distribution of data to
multiple destinations using IP multicast. - Limitations of the current Internet restrict the
quality of received audio and video
32New Developments IPng
- IPv6 -or IPng- is a new version of IP, that
introduces a number of enhancements - designed to run on high performance networks as
well as on low bandwidth networks - addressing and routing issues
- a larger address space (128 bit addresses)
- autoconfiguration capabilities
- simplified IP packets
- native security
- Multicast and anycast features
- "Quality of service" functions
33Security
- Problems
- authentication
- integrity
- privacy
- non-repudiation
- Cryptography
- secret-key
- public-key
- Certification hierarchies
34Public key cryptography
- M private key, Y public key, X
message,Encode(Key,Data), Decode(Key, Data) - Decode (Y, Encode(M, X)) Decode (M, Encode(Y,
X)) M - F(M)Y and F-1(Y)M computationally hard
- To be sure you are receiving the message from ME
- I Encode(M, X) -gt Z
- You Decode(Y, Z)
- To be sure your message is read only by ME
- You Encode(Y, X) -gt Z
- I Decode(M, Z)
35Certification infrastructure
- Communication between
- users
- user and system
- systems
- when users or systems from different communities
want to communicate, someone is needed to
guarantee reciprocal trust - is that public key really held by the user I want
to speak with? - external (trusted) entities can carry out this
task, exactly as the notary do
36Certification Authority (CA)
- an entity which guarantee for the association
between public keys and user/system identity - the association is declared inside a certificate,
digitally signed by the CA - the sender which wants to communicate sends his
certificate to the recipient - the recipient can decide if the CA which signed
the certificate is trusted or not, and thus the
sender.
37Who certifies the CA? A hierarchy of CAs
- CAs are useful mainly when communicating between
unknown communities thus some way of ensuring
trust in CAs is needed - the solution is a hierarchy of CAs, where each
level certifies the lower, down to the
user/system - the top level CA is called Policy CA it
establishes the rules all Cas should respect, to
be part of the hierarchy
38CA Policy
- identity validation
- privacy statements
- certificate emission
- certificate revocation
- ...
39Certificates
- Standard format X.509 (v1-v3)
- Information inside the certificate
- version number
- serial number
- signature info
- issuer
- validity period
- subject
- public key info
- certificate signature
40Examples
- SENDER
- Web clientencrypt with encrypted form data
- Email userencrypt with encrypted
messageencrypt with private keypublic key
- RECEIVER
- HTTP serverpublic keydecrypt with private key
- Email userpublic keydecrypt with private
keysigned messagedecode with
41European directions
- ICE-TEL (Interworking public-key Certification
Infrastructure for Europe)1995 - 1997 - ICE-CAR (Interworking public-key Certification
Infrastructure for Europe for Commerce,
Applications and Research)1997 -
42Medicine...
- is based on many kinds of communication
- textual
- visual
- spoken
- expert knowledge is spreaded around the world
- gains power from easy and wide communication
- for diagnostic practice
- for scientific purposes
- for teaching aims
43Medical Doctors communicate...
- For diagnostic aims
- in the same field, with traditional means (mail,
phone) all around the world to reach the right
expert - in different fields, with written reports (e.g.
other examinations) (often inside the hospital) - For scientific aims
- through conferences
- in scientific journals
- For teaching aims
- usings books (often with many pictures)
- using slides
- usingdirect examinations
44Basic needs
- The physician works with communication easy and
quick use of instruments - medical information is multimedia not only text
or voice - medical data are often patient private data no
public access to them
45Medical uses of e-mail
- among physicians
- consultation
- diagnosis
- continuous education
- between physician and patient
- test results and interpretations
- medication instructions
- anagraphical data exchange
46Medical uses of newsgroups and mailing lists
- scientific aims
- continuous education
- collaborative diagnosis
47Medical uses of WWWApplications
- multimedia for undergraduate and postgraduate
education - multimedia for continuing education through
- networked implementation of CME credit mat
erials - WWW access to medical databases (for ease of use)
- interface for remote access to databases such as
Medline, Genbank etc. - Multimedia for patient information and education
48Medical uses of WWWProblems
- Information published on the WWW can reach a wide
number of readers - no way for characterizing the quality of WWW
information is currently available - the user can equally access correct as well as
incorrect information - Incorrect misinformation and fraud.
- Correct ethical problems due the different
perception that physicians and patients have
about a medical topic (e.g. researches on cancer
treatments).
49Internet problems
- The Internet interconnects scientific as well as
commercial and entertainment networks.
Consequences - almost all scientific institutions are connected,
thus also many hospitals, and this is a great
incentive for its use in telemedicine. - As more people use the Internet, as slower and
insecure become communications, and this possibly
dissuades from its use for telemedicine. - Currently it is difficult to carry out realtime
tasks on the Internet
50Internet in MedicineIs it Telemedicine?
- in the broad sense of telemedicine, yes
- a widely used mean gives many additional problems
- Is the Internet adequate for medical uses?
- a recent estimation accounted medical exchanges
for about 25 of the Internet traffic... growing.