A Distribution Network using PKI or PGP and Architecture Barriers Presented by: Jared Davison B. Inf Tech (QUT), B. Eng (QUT), M. IEEE, GradIEAust, AACS.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

PHINMS: Application Integration
Using PHINMS and Web-Services for Interoperability The findings and conclusions in this presentation are those of the author and do not necessarily represent.
17 March 2010 Workshop on Efficient and Effective eGovernment FASTeTEN : a Flexible Technology in Different European Administrative Contexts
Internet Protocol Security (IP Sec)
Enabling Secure Internet Access with ISA Server
A demonstration of Australian Innovation and capabilities in Health Informatics Jared Davison B. Inf Tech (QUT), B. Eng (QUT), M. IEEE, GradIEAust, AACS.
Welcome to Middleware Joseph Amrithraj
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
Meganet Corporation VME Office Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
An object oriented HL7 Framework Hands-on Workshop HL7 Version 2.x Implementation Tools An object oriented HL7 Framework Andrew McIntyre & Jared Davison.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Chapter 17: WEB COMPONENTS
DIRECT TRANSPORT FOR QH 10/18-19 F2F NOTES (SPN).
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Reliability on Web Services Presented by Pat Chan 17/10/2005.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Technical Brief v1.0. Communication tools that broadcast visual content directly onto the screens of computers, using multiple channels and formats Easy.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to Sharepoint.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Masud Hasan Secue VS Hushmail Project 2.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
CIS 375—Web App Dev II Microsoft’s.NET. 2 Introduction to.NET Steve Ballmer (January 2000): Steve Ballmer "Delivering an Internet-based platform of Next.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
1 Version 3.0 Module 11 TCP Application and Transport.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
EIDE Design Considerations 1 EIDE Design Considerations Brian Wright Portland General Electric.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Two Installing and Configuring Exchange Server 2003.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Computer Emergency Notification System (CENS)
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
Introduction TO Network Administration
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Endpoints Lesson 17. Skills Matrix Endpoints Endpoints provide a reliable, securable, scalable messaging system that enables SQL Server to communicate.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Server Concepts Dr. Charles W. Kann.
Goals Introduce the Windows Server 2003 family of operating systems
ONLINE SECURE DATA SERVICE
PerformanceBridge Application Suite and Practice 2.0 IT Specifications
Sending data to EUROSTAT using STATEL and STADIUM web client
Presentation transcript:

A Distribution Network using PKI or PGP and Architecture Barriers Presented by: Jared Davison B. Inf Tech (QUT), B. Eng (QUT), M. IEEE, GradIEAust, AACS. Software Engineer Buderim GE Centre

Buderim Gastroenterology Centre Small privately owned day surgery 3 Specialists, 17 Staff Catchment area ~250,000 Established 12 years EHR Active HL7 R&D program since HL7 USA member since 1999 HL7 Australia member since inception

Electronic Records Developed HL7 system 35,000 patients 190,000 reports 250 GPs in the local area. w/copies 244,000 individual recipients 1.3 copies per document Pathology dating to the start of PIT distribution by QML & S&N path. All outgoing clinical letters since 1991 HL7 format for storage for all this = 750 MB

Report Distribution Trial Real-time HL7 Transmission of –Specialist reports –GP referrals > 12 months 240 connected doctors 22 specialists Sunshine Coast Division Allied Health Nursing Home 40,000 reports delivered (including copies to other recipients doctors)

Report Distribution Trial Integrated with existing practice software –GP computer systems –Specialist computer systems Report delivery into GP software is an unattended operation All transmission in HL7 format, encrypted & signed PIT conversion performed as necessary Imported by GP computer system –same as pathology import

Transmission Specialist report creation –Word Processor integration –HL7 based custom reporting clients

Transmission GP referrals –Captured from clinical practice software –Digitally signed HESA PKI USB key –Encrypted with PKI certificates –Encrypted provider lookup –Zero configuration install Reports are delivered real-time

GP Referral Digital Signature Block

Architectural & Technical Barriers to distribution network implementation Transport Recipient/Provider Addressing Delivery & Acknowledgment Protocols Security & Authentication Routing Use of standards – HL7

Transport Internet access assumed Consideration of OSI Layer 6 protocols –HL7 over –HL7 over HTTP –HL7 Lower Level Protocol

Transport - Advantages –Technical Simplicity –Widely accessible –Asynchronous (recipient need not be online when sending) Disadvantages –No acknowledgement of delivery –No guaranteed order of delivery –Spam filters / Spam –Backup Mail Servers –No sender authentication –No control over infrastructure quality –Blacklists

HL7 over HTTP Advantages –HL7 standard acknowledgement possible –Ability to reject connections –Industry standard –Ease of interoperability for 3 rd parties –Connectionless scalable –URL & Headers available for protocol variations Eg. Http1.1 keep alive, content types Disadvantages –Need for full time internet presence

Chosen Transport HL7 over HTTP HL7 Lower Level Protocol supported –for compatibility & interoperability

Provider Addressing Issues HIC Provider Numbers Advantages –Specified by Australian HL7 Standard –Ideal for doctors in private practice –Check digit scheme –Location Specific –Virtually always obtained (billing)

Provider Addressing Issues HIC Provider Numbers Disadvantages –Not universal –Not all health care providers/facilities have HIC provider numbers Public hospital doctors Nursing homes Allied health Nursing staff –Only some sections of medical community have access to Provider number lists

An Addressing Solution A mixed solution HIC provider numbers used where available Proprietary identifiers used if no provider number –Disadvantage: some software only accepts provider numbers PKI key common name used for Author identification

Address/Recipient Lookup HL7 2.3 Master files –Defines messages for maintenance & query for providers using the STF segment –CH Solution: Master files implemented

HL7 Master Files Query

HL7 for Mere Mortals

Protocol Standard HL7 Delivery Protocol Message Acknowledgement Eg. ORU – ACK, REF – ACK (messages) Assumes –Internet server availability –Push model as new reports are sent unsolicited (ORU) Retry sending if ACK not received

Protocol Problems –Many clients DO NOT or CAN NOT open their networks (inadequate knowledge/skills) have persistent internet connectivity Some clients need to poll

Polling protocol Non-HL7 standard QRY.Z02 ORU.R01 (report downloads) ACK.R01 OK But the payload is HL7 standard!

Security & Authentication Encryption used for security Digital signatures used for all authentication 1024 bit public keys only Encryption Mechanisms: –X.509 HeSA Certificates & HIC PKI –Native PGP compatible (explicit trust model only) No usernames / passwords –(weak security)

Routing Enable communication between practices and doctors running independent systems. Manual configuration of connections between every practice is not feasible –Because the number of direct path configurations required is n(n-1)/2 (where n is the number of independent systems) Internet enables virtual/potential connections

Routing Solution: use HL7 Master File messages to enable dynamic discovery of newly connected users Allow existing users to change their address without manual reconfiguration being required

Centralised vs. Distributed nets. Centralised (Star network) –Each node communicates with each other node via central point –Issues Service availability –Network connections –Limited Processing capacity Redundancy required Serial communication DDoS (distributed denial of service) attacks on hub Vulnerability of stored/transit data (all eggs in one basket) Natural disaster –Eg. earthquake

Centralised vs. Distributed nets. Distributed network (fully connected mesh) –Every node is able to communicate directly with any other node –Fewer points of failure in transit –Very powerful Load sharing possibilities –Parallel communication –Very Fast –DDoS can at worst case affect limited nodes only –Robust to natural disasters

HL7 Support Workable delivery format at this time is HL7 ORU messages. –This is all we have delivered at this stage to GPs Minor modifications to messages are required depending on target application. –Satisfying import assumptions of software –No change to report payload. REF message have potential in future –No support in practice software at present

HL7 Support By sticking to published standards we have had few compatibility problems Moral: Stick to Standards!

Putting it together The Software Medical Objects Currently undergoing beta testing Participants welcome

HL7 Servers Servers –Message encoding supported HL7 v2.x (Classic & XML), PIT –Win32 platform –Multi-tier architecture SQL database tier (Linux or Windows) Application server tier –Replication supported (over HL7) –Standalone Service IIS (ISAPI) or Apache (module) –run locally or in Application Service Provider (ASP) mode –Persists 10,000+ messages per hour (Athlon 1.5GHz, 7200 RPM, 512 RAM) –Serves queries many-many times more!!! Server Types –Lightweight GP receive only (file based db) –Gateway –Distribution –Practice –Provider Directory –Terminology –Routing

GP Solutions Receiving Specialist Messages –GP Reception Server Acks messages and saves as files Win 32 platform (95, 98, ME, NT4, 2000, XP, 2003) –Polling Client (works with Distribution Service) Win 32 platform (95, 98, ME, NT4, 2000, XP, 2003) –Tray Icon service –NT service Linux Mac OS X Any future HIC PKI Supported platform Integrated PIT conversion Acknowledged delivery Simple download setup 4.2MB Easy install – no reboots or downtime

GP Solutions Sending Referrals –Win32 (98, ME, 2000, XP, 2003) –PKI Signed referrals –HIC PKI Rainbow iKey required –Setup: 2.7MB internet download Zero configuration easy install no reboots or downtime

Specialist Solution Sending Reports –Word Processor integration Word 97, 2000, XP, 2003 Word Perfect 10 –PKI signing possible –Setup 3 MB download Easy & quick install No reboots

Medical Objects Network Today