Font Size: a A A

Study Of The Key Encryption Technology To Community Electronic Medical Record

Posted on:2013-12-02Degree:MasterType:Thesis
Country:ChinaCandidate:Z G ShaoFull Text:PDF
GTID:2234330374998581Subject:Biomedical engineering
Abstract/Summary:PDF Full Text Request
Objective:With the rapid development of modern science and technology and the transformation of hospital management mode, the function of the hospital information system is gradually changing to the combination of a clinical medical information and patient cost management, and the electronic medical records system is gradually mature, perfect as the core of the hospital information system. Community hospital is one of the reform of health care. The establishment of community electronic medical records to some degree may accelerate this reform process. The information of Community hospitals, part of medical health institutions, is not only used for the patient’s diagnosis but also is part of the state health information, so the security of Community electronic medical records become particularly important. The topic based on the popular encryption scheme, combined with the basic characteristics of the data from the community electronic medical records, a set of encryption scheme was designed in order to improve the security of information from the community electronic medical records.Methods:This topic mainly includes two parts:1. The local data encryptionThe local data encryption mainly includes two parts:hardware encryption and software encryption. Hardware encryption was based on the elliptic curve digital signature algorithm and was simulated through the FPGA processor, to realize digital signatures and the authentication mechanism were realized and could meet the control demand for community electronic medical records. Software encryption use Java language. According to the complexity of data, different algorithms (DES and RSA) was used for different types of data. The data safety was ensure in the premise, and as the speed of the system was improved as far as possible.2. Network transmission encryptionNetwork transmission encryption also includes two parts:data validation and VPN safety protection. Data validation use MD5parity which is widely used in the world. The data integrity and accuracy requirements were met by testing the MD5values before and after the data segment transmission. VPN refers to the virtual private network, whose main function is to establish the VPN tunnel to protect the whole network, and it’s a very popular network safe mechanism in the world.Results:1. DES data encryption shows that, the amount of data encrypted increase gradually with the increase of original data, and results are not the same for each encryption.DES encryption fast with only59milliseconds for8KB data encryption.2. RSA data encryption shows that,the size of the amount of data encrypted related to the selected parameter n,and its encryption time is mainly limited by the key generation.When the parameter n3072, the key generation will reach18825ms.3. The results of a simulation in the ModelSim software shows that,digital signature based on ECDSA and with the FPGA as hardware platform success.It can complete the digital signature about795and the signature verification about385by per second with100MHZ operating frequency after estimated.4. MD5data encryption shows that,the time generating the MD5value is slowly increasing with the increase of original data. When the amount of original data is4000KB, the time spent only240milliseconds.Conclusion:1. DES has a speed advantage compared to RSA for large amounts of data.2. It proved the feasibility of digital signature based on ECDSA and with the FPGA as hardware platform with digital signature success in the ModelSim software.3. MD5algorithm is fast, which can adapt the network transmission requirements.4. The encryption scheme combined software encryption and hardware encryption, the local data encryption and network transmission encryption, which use different encryption algorithm for different types of data. The whole scheme has high efficiency, strong stability and effective implementation.
Keywords/Search Tags:Electronic medical record, encryption, data validation, FPGA, VPN
PDF Full Text Request
Related items