Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine
Characteristics of the information Confidentiality only authorized persons may become familiar with the information Integrity only authorized persons may in any way modify the information Accessibility any authorized object may obtain data within the certain (short) time interval
Teleworkers Remote SitesCentral Sites ATM / FR / ISDN WAN Router Network Reference Model PBX Hub IPT Gateway Hub PSTN Router WAN Violator (internal) L3 Switch L2 Switch PBX Violator (External) Internet WAN Router/ IPT Gateway
Confidentiality The violation of confidentiality (privacy): disclosure of information Typical ways for disclosure of information: –“sniffing”: listening of the data transmitted via a telecommunication channel –“spoofing”: an authorized object of telecommunication exchange is substituted by an unauthorized object
Teleworkers Spoofing Sniffing WAN Router Violation of confidentiality Hub WAN L3 Switch L2 Switch Internet WAN Router/ IPT Gateway Router
Integrity The violation of integrity: –partial or complete loss of the information –falsification of data Hub WAN Router/ IPT Gateway Router
Accessibility The violation of accessibility: denial of service (DoS) attacks Hub WAN Router/ IPT Gateway Router
Methods of information protection Authentication of objects Data ciphering (encryption) Signing of data Redundancy and backup in storage of data Redundant data channels
Virtual Private Networks Public Internet (Untrusted network) Private Public Private Public FR or Leased Line (Intranet, trusted private network) Public WAN VPN (Dynamic routing over encrypted tunnels) Public WAN (Clear-text, static routing) Private WAN (Clear-text or Encrypted Routing - Static, RIP, OSPF) Branch Office Tunnel IP Phones Video conference
Transport and Tunnel Mode New IP Header Sec Protocol Header Data IP Header Data Tunnel Mode Original IP Header Sec Protocol Header Transport Mode Original IP Header Data Encryption Outer IP Header Inner IP Header
A good example: Nortel Networks Contivity Modular Service Options Decreased Cost Software License Keys Firewall Services VPN Services Adv Routing Base Services Contivity can function as –VPN device –Router –Firewall –Or any combination