© 2000 D W Chadwick2 Session T27 Securing Patient Specific Data on the Internet for the UK National Health Service Dr David W Chadwick Senior Lecturer,

Slides:



Advertisements
Similar presentations
International Telecommunication Union Workshop on Standardization in E-health Geneva, May 2003 The Use of X.509 in E-Healthcare Professor David W.
Advertisements

Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
How the Internet Works Course Objectives Introduce the various web browsers Introduce some new terms Explain the basic Internet to PC hookup  ISP  Wired.
Internet Based Client Management
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Product and Technology News Georg Bommer, Inter-Networking AG (Switzerland)
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
INTERNET DATABASE. Internet and E-commerce Internet – a worldwide collection of interconnected computer network Internet – a worldwide collection of interconnected.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Tervisepank ® e-solution for primary care Madis Tiik, MD CEO, Estonian Society of Family Doctors
Client Server Security. Introduction Although client/server architecture is the most popular and widely used computing environment, it the most vulnerable.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Client Server Security DeSiaMorePowered by DeSiaMore1.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Solution Overview for NIPDEC- CDAP July 15, 2005.
Security Directions - Release 6 and beyond SearchDomino.com Webcast Patricia Booth Security and Directory Product Management 9/25/02.
DIRAC Web User Interface A.Casajus (Universitat de Barcelona) M.Sapunov (CPPM Marseille) On behalf of the LHCb DIRAC Team.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
E-HospitalGPsIKTA4-133 projcet presentation, May , Roma 1 Internet-based communication between Hospital and General Practitioners IKTA4-133 PROJECT.
what is contacts? In-contacts is an online contacts database designed from the ground up to be compatible with modern business needs.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Lecture 7 Interaction. Topics Implementing data flows An internet solution Transactions in MySQL 4-tier systems – business rule/presentation separation.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Copyright 2000 eMation SECURITY - Controlling Data Access with
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
ISSRG Information Systems Security Research Group Contact: An Application Programming Interface for.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
AMSI Hosting Options User Panel Discussion Presented by Brian Torney Session 107 Advantages of Self Hosting.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
ICT in Healthcare. Electronic prescription service GPs and nurses can send electronic prescriptions to a dispenser (pharmacy) of the patients choice.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Creating and Managing Digital Certificates Chapter Eleven.
Some Technical Issues in PKI Deployment David Chadwick
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
The Hierarchical Trust Model. PGP Certificate Server details Fast, efficient key repository –LDAP, HTTP interfaces Secure remote administration –“Pending”
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
ArcGIS for Server Security: Advanced
Chapter 7. Identifying Assets and Activities to Be Protected
Chapter 5 Electronic Commerce | Security Threats - Solution
Chapter 5 Electronic Commerce | Security Threats - Solution
FTP - File Transfer Protocol
IBM Certified WAS 8.5 Administrator
Unit 27: Network Operating Systems
Patient Access to Electronic Medical Records
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

© 2000 D W Chadwick2 Session T27 Securing Patient Specific Data on the Internet for the UK National Health Service Dr David W Chadwick Senior Lecturer, University of Salford Tuesday, 2nd May, pm-5.00pm

© 2000 D W Chadwick3 Securing Patient Specific Data on the Internet for the UK National Health Service D W Chadwick, A J Young University of Salford J New Hope Hospital

© 2000 D W Chadwick4 Background - Main Players University of Salford - Technological University in Greater Manchester, UK Hope Hospital - Large university teaching hospital in Greater Manchester National Health Service - Policy setter Entrust Technologies - the PKI provider EPSRC - UK research funding body EC IV Framework - European research funding body

© 2000 D W Chadwick5 Background - University of Salford Building networking software since 1970s Worked on ISO, ITU-T and Internet standards since 1982 –Editors of ASN.1 and X.500 standards, LDAP drafts Installed first university PKI in 1996

© 2000 D W Chadwick6 Background - Hope Hospital Serves a population of approx. 0.5 million Developed a centralised database application (Diabetes Register) to hold medical histories of diabetic patients Holds data on all 5,000 diabetic patients in its region (Salford District Diabetes IS) Diabetes Register software is at use 35 NHS districts in the UK –data on 200,000 patients in UK

© 2000 D W Chadwick7 Background - NHS Funds healthcare in the UK Sets standards for health and information systems Runs a private intranet for all primary (GPs) and secondary carers (hospitals) - NHSnet Strict security policy for connecting to NHSnet Patient data must be kept confidential

© 2000 D W Chadwick8 Salford District Diabetes Information System Centralised database only accessible over hospital LAN Client-server (SQL) interface also available Relies on passwords for authentication and usernames for privileges - different doctors can see different records But much information flow is paper based (to all primary carers and some hospital staff)

© 2000 D W Chadwick9 Primary Care Access to SDDIS Paper output sent every year to GP (one page per patient) GP sees patient for annual review and sends updated results back on paper Hope data entry administrator inputs the updates to the database

© 2000 D W Chadwick10 Problems with current system Long time lag between sending update and seeing output Double keying of data (by GP and admin) can lead to input errors If patient visits GP before annual review, no current data is available Paper mail can get lost or misplaced Data is not protected during transit, so potential for breach of confidentiality

© 2000 D W Chadwick11 Attributes of Solution Fully distributed and accessible over a WAN (NHSnet or Internet) Strong encryption to enforce data confidentiality in transit Strong authentication to ensure genuine users (especially if Internet accessible) Must be user friendly for non-IT professionals Easy to install and manage

© 2000 D W Chadwick12 Possible alternatives Provide dial-in access to the hospital and one time PW cards –requires new hardware and client for each primary carer –hospital has to manage modem banks (they are not an ISP, and its not a WAN solution) Secure the existing SQL client-server interaction –new client for each primary carer –interface current system to security infrastructure Use a Web browser and secured HTTP traffic –Preferred. Primary carers are used to this interface. –single access to multiple services –no special client or hardware needed

© 2000 D W Chadwick13 Chosen Architecture Web Browser (Client) Web Server HTTP Requests and Responses Diabetes Register SQL Requests and Responses DBMS Server WAN Secure with PKI Hospital LAN Fire wall

© 2000 D W Chadwick14 Product Choice SSL & Internet Certs vs. –Was weak encryption (40 bits) –Manual checking of CRLs by client –Trust is managed by end users –Manual key backup, recovery and renewal –De-facto standard –Low initial cash outlay Entrust Direct & own Certs –Is strong encryption (128 bits) –CRLs automatically checked in client and server –Trust is managed by security officers –Automated key backup and renewal, managed recovery –Proprietary solution –High initial cash outlay

© 2000 D W Chadwick15 Conclusions SSL seems good for technically aware users who have time to manage their own environment Entrust Direct seems good for naïve, busy users who just want it to work, and where security cannot be left to chance

© 2000 D W Chadwick16 Architecture Implementation Entrust Direct client will sit in users machines Entrust Direct server will sit in a firewall at Hope –Permission needed from NHS IA Telecommunications Branch to connect Hope intranet to the Internet via a Firewall Direct server will send normal http requests to MS IIS on Hope intranet CGI scripts called from MS IIS, make SQL calls to Diabetic Register –Scripts mirror the behaviour of the existing SQL client

© 2000 D W Chadwick17 PKI Implementation at Salford Entrust v4 CA running on NT4 Protected by firewall running on Linux MessagingDirect (formerly ISODE) Directory running on Sun Sparc holds certificates and CLRs

© 2000 D W Chadwick18 System Components Client (GP/ Practice Nurse) Netscape/IE + Entrust Direct Client Proxy Hospital Firewall (Checkpoint) Entrust Direct Server Proxy Hospital Diabetes Register Server Intranet Internet UoS TTP Server UoS X.500 Server Entrust CA Firewall MS IIS + CGI scripts

© 2000 D W Chadwick19 Validation Testing 36 sets of tests performed July-Sept 1999 X31 completed, 25% successfully Revocation 100% success Entrust CA 100% available MessagingDirect Directory 100% available IIS Server & CGI scripts 100% available Time to learn to use, <8 minutes Time to initiate a request & get a reply <35s

© 2000 D W Chadwick20 The Bad Results XInstallation, 50% within 15 mins, 86% within 24 hrs XEntrust Direct server, 66% available XNote. Possibly due to CRL publication every 4 hours, but never resolved. It eventually disappeared XSalford’s network, 93% available XTime to launch application, 158% insecure XIncorrect update data displayed >50% XNote. A bug in the CGI meant that only the date and not date & time was used to search database. Subsequently fixed.

© 2000 D W Chadwick21 Pilot Results (User Installation) Installation for the 10 pilot users (Nov-Dec 99) was problematical and difficult –Number of unforeseen technical problems Problems with most free ISPs wanting calling tel no Some ISPs blocked traffic we needed One user messed up initial password entering Technical problem with Database rejecting one user One surgery with a LAN needed 4 visits to get it working –GPs had little time to spend if things did not work right first time –We had to provide PCs to two of users

© 2000 D W Chadwick22 Pilot Results (Usage) Interface was intuitive and easy to use Performance of data access was fine, but Dialling the Internet and starting the application was too slow for surgeries Use of smart cards was abandoned –Difficulties are in IEEE Computer, Dec 99 Made their job more difficult/costly –Had to run the paper system in parallel –Prefer to use paper when with patients –Paper system free, had to pay for Internet X X X

© 2000 D W Chadwick23 Demonstration 1. User invokes Entrust Direct (icon on Desktop) 2. User inputs secret password 3. Direct invokes Web browser which contacts Web server 4. User sees Welcome Page and may optionally re-register as a different database user to the one used last time 5. User types in patient query (one or more fields) 6. User sees patient details

© 2000 D W Chadwick24

© 2000 D W Chadwick25

© 2000 D W Chadwick26

© 2000 D W Chadwick27

© 2000 D W Chadwick28

© 2000 D W Chadwick29 Updating Diabetic Register User may update one of several fields and press send button Database is automatically updated User may check this by re- reading the patient details

© 2000 D W Chadwick30 Any Questions ?