A Secure Communicating MD5 based DICOM Annotation tool

  • Sweta Dey

Abstract

DICOM proceeds through a volume of .dcm files and maintaining all standard as well but still it is not free from attacks. In this paper I present the RTStructure based GUI and the security model of DICOM communication. Here, I use massage digest with the metadata of each volume of DICOM. Metadata is nothing but data about data and it is required for constructing each volume of .dcm files. In my case, it is standardized and static with the help of python packages. After successful construction .dcm files, cryptographic hash function is applied.  Hence, a secure RT-Structured based annotation model is ready for storing and accessing medical information among various medical devices by maintaining HIPPA and PACS standard.  

Keywords: Metadata, DICOM, PACS, HIPPA, IaaS, MD5, grid structure.

Downloads

Download data is not yet available.

References

[1] Dey, S. (2018, November). SBPSO-LB: SB-PSO based Secure Load Balancing Approach for Cloud Data Center with RSA. In 2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON) (pp. 1-6). IEEE.
[2] Ramesh, D., & Dey, S. (2018, March). SCLBA-CC: Slot Based Carton Load Balancing Approach for Cloud Environment. In 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT) (pp. 1-5). IEEE.
[3] Dey, S. (2018, October). A Secure Fair Queuing and SLA based Slotted Round Robin Load Balancing Approach for Cloud Data Centers. In 2018 3rd International Conference on Communication and Electronics Systems (ICCES) (pp. 382-387). IEEE.
[4] Dey, S., & Kaur, U. (2019, January). RSA and SFQ based Secure Heuristic Load Balancing Approach for Cloud Data Centers. In 2019 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-7). IEEE.
[5] Dey, S. (2019, April). SSSD-LB: SRNN based Secure Slotted Dynamic Load Balancing Scheme. In 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 1212-1217). IEEE.
[6] https://docs.anaconda.com/anaconda/
[7] Pavlidis, I., & Faltesek, T. (2002, September). A video-based surveillance solution for protecting the air-intakes of buildings from chem-bio attacks. In Proceedings. International Conference on Image Processing (Vol. 1, pp. I-I). IEEE.
[8] Miciolino, E. E., Bernieri, G., Pascucci, F., & Setola, R. (2015, November). Communications network analysis in a SCADA system testbed under cyber-attacks. In 2015 23rd Telecommunications Forum Telfor (TELFOR) (pp. 341-344). IEEE.
[9] https://en.wikipedia.org/wiki/Cyberattack
[10] Rivest, R. (1992). The MD5 Message-Digest Algorithm. Document of MIT Laboratory for computer Science and RSA Data Security, Inc.
[11] Zhou, X. Q., Huang, H. K., & Lou, S. L. (2001). Authenticity and integrity of digital mammography images. IEEE transactions on medical imaging, 20(8), 784-791.
[12] https://www.dicomstandard.org/
[13] Gorthi, S., Bach, C. M., & Thiran, J. P. (2009). Exporting contours to DICOM-RT structure set. Insight Journal, (1), 1-18.
[14] https://dicom.innolitics.com/ciods
[15] https://www.dicompyler.com/
Statistics
0 Views | 0 Downloads
How to Cite
Dey, S. (2021). A Secure Communicating MD5 based DICOM Annotation tool. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 7(1), 29-37. https://doi.org/10.33130/AJCT.2021v07i01.008