Download ABC`s of the Internet Cancer Registry

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Net neutrality law wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

IEEE 1355 wikipedia , lookup

Net bias wikipedia , lookup

Deep packet inspection wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Transcript
ABC’s of the Internet Cancer Registry
Chetan Wasekar, MD; Jeannette Jackson-Thompson, MSPH, PhD
Missouri Cancer Registry, University Missouri-Columbia,
Internet Basics
•
The Internet is a global network of networks, connecting millions of
computers all over the world.
•
Every computer that logs on the Internet has a unique identifica tion
number called the Internet Protocol [IP] address which is a number is
a p.q.s.t format
•
Computers connected to the internet communicate via standardized
languages called “protocols”. For example “Hyper Text Transfer
Protocol” [http] is one such language
Central registries have an urgent need to streamline their work
processes due to the numerous challenges registries face,
including an ever-increasing volume of cancer data and the need
to implement new reporting requirements while maintaining or
improving timeliness, completeness and quality of reporting.
This is where web-based data submission promises to help. A
few registries, such as the Florida Cancer Data System and the
New York State Cancer Registry, have already implemented the
web-based process.
Internet Security Basics I:
Public Key Cryptography
•
This method involves generating a “digital signature” by first applying a
special mathematical technique to the data, known as a “Hashing algorithm”
to get a “message digest” and then encrypting that using a secret “private
key.”
Cancer Case Data
Hashing
Algorithm
Attached to
The Internet offers a number of benefits. These include:
Source
IP address =169.10.90.10
INTERNET
IP address =202.22.34.12
Destination
How data travels over the Internet - I
•
Before transmission, all data is first broken into numerous “packets”
or “cells”
•
It is these packets that traverse the Internet wires
Structure of the Internet packet
Packet Component
HEADER
Packet
BODY
FOOTER
Content of the Component
•Sender’s IP Address
•Rec eiver’s IP Address
•Pac ket N umber
•P rotocol
•T he Actual D ata
•Flag to s how end of packet
•E rror Correction
http://computer.howstuffworks.com/question525.htm
How data travels over the Internet - II
•
•
Each packet has enough information to reassemble the whole data in
the correct sequence at the destination
On the way to the destination, there are various “Routers” that read
the packet information. These components redirect the packet to
the next router or computer depending on the packet destination
address
Destination
Pac ket
Pac ket
Source
1. Pre-existing and inexpensive connectivity.
2. Abolishment or abatement of need for document imaging and
associated costs.
3. Pre-formatted and legible data.
4. Application of real-time edit checks.
5. One-time application of NAACCR layout changes at the central
registry server, rather than multiple applications at each
reporting source location.
6.Increased compliance, since the data sources don’t need to
purchase/develop reporting systems or worry about HL7
issues.
7. Automation of data receipt, diagnostic coding and database
updating.
8.Superior tracking.
9.Improvements in data timeliness and completeness.
1. Security And Privacy: As data travels from one computer to
another over the Internet, any of these routing computers can
tap into the information. This poses a security and privacy
threat to protected patient information.
2. Internet Access: Not all hospital and non-hospital data
providers have access to the Internet.
3. Technical Expertise: Some registries may not have the
required networking expertise to set up and maintain webbased reporting systems.
4 . Initial Costs: Though the Internet is inexpensive, some
central registries and reporting facilities may not be able to
afford many of the currently-available technologies for
protecting sensitive patient data.
ROUTER
The Internet revolution has transformed many businesses.
Cancer registries have yet to harness the power of the web, but
we can begin to take the first steps.
This project was supported in part by a cooperative agreement between the CDC and the Missouri
Department of Health and Senior Services (DHSS) (#U55/CCU721904-03) and a Surveillance
Contract between DHSS and the University of Missouri.
Private Key
Digital Signature
•
The web-server at the cancer registry that receives the data then
authenticates itself using a “Digital Certificate” that is purchased from
trusted third-party vendors like Verisign. This is vital to make sure that the
data does not reach the wrong hands.
•
Only after the registry web-server certificate is checked for authenticity can
the cancer data be decoded back to its original form using the sender’s
shared “Public key,” which is transmitted to the receiver along with the
data.
http://www.digsigtrust.com/support/pki_basics.html
Internet Security Basics II:
Virtual Private Networks
•
•
•
These benefits imply a streamlined workflow and savings in
money and time as well as improved data quality and
completeness. However there are also some bottlenecks that
need to be tackled :
Message
digest
•
It would be great to have all cancer data providers wired to the cancer
registry via a private Wide Area Network (WAN). However, this is an
impractical solution due to its enormity and the costs involved of setting
up a private network spanning the entire state.
Virtual Private Networks (VPN) are an effective solution that provides
virtual, dedicated, private channels set up within the public Internet using
special protocols known as “Tunneling Protocols.”
“Tunneling” involves encapsulalting data packets into additional packets
which only authorized receiving parties can unfold.
VPNs also provide additional data security by various methods such as:
– Firewalls between the private session and the public Internet
– Additional protocols, such as Internet Protocol Security Protocol [IPSec]
– In combination with Digital Signatures and Digital Certificates
Source : http://www.networkcomputing.com/905/905colmoskowitz2.html