INFSO-RI Enabling Grids for E-sciencE Security needs in the Medical Data Manager EGEE MWSG, March 7-8 th, 2006 Ákos Frohner on behalf.

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE The gLite middleware distribution OSG Consortium Meeting Seattle,
Advertisements

E-science grid facility for Europe and Latin America A Data Access Policy based on VOMS attributes in the Secure Storage Service Diego Scardaci.
INFSO-RI Enabling Grids for E-sciencE Application Demonstrations C. Loomis, J. Moscicki, J. Montagnat EGEE European Review (CERN)
Makrand Siddhabhatti Tata Institute of Fundamental Research Mumbai 17 Aug
The LCG File Catalog (LFC) Jean-Philippe Baud – Sophie Lemaitre IT-GD, CERN May 2005.
INFSO-RI Enabling Grids for E-sciencE gLite Data Management Services - Overview Mike Mineter National e-Science Centre, Edinburgh.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The EGEE Infrastructure and Remote Instruments.
EGEE-III INFSO-RI Enabling Grids for E-sciencE The Medical Data Manager : the components Johan Montagnat, Romain Texier, Tristan.
Data Management The GSM-WG Perspective. Background SRM is the Storage Resource Manager A Control protocol for Mass Storage Systems Standard protocol:
EGEE-III INFSO-RI Enabling Grids for E-sciencE I. Blanquer (1), L. Martí (2), V. Hernandez (1) (1) Universidad Politécnica de Valencia.
INFSO-RI Enabling Grids for E-sciencE Distributed Metadata with the AMGA Metadata Catalog Nuno Santos, Birger Koblitz 20 June 2006.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks JRA1 summary Claudio Grandi EGEE-II JRA1.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE middleware: gLite Data Management EGEE Tutorial 23rd APAN Meeting, Manila Jan.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
Enabling Grids for E-sciencE Introduction Data Management Jan Just Keijser Nikhef Grid Tutorial, November 2008.
EGEE-III INFSO-RI Enabling Grids for E-sciencE I. Blanquer (1), V. Hernandez (1), L. Martí (2), D. Quilis (1), J. Salavert (1) (1)
INFSO-RI Enabling Grids for E-sciencE Biomedical applications V. Breton, CNRS-IN2P3.
Enabling Grids for E-sciencE Jean Salzemann EGEE08 Conference – Istanbul – 25/09/08 1 HOPE HOsptital Platform for.
INFSO-RI Enabling Grids for E-sciencE gLite Data Management and Interoperability Peter Kunszt (JRA1 DM Cluster) 2 nd EGEE Conference,
INFSO-RI Enabling Grids for E-sciencE NA4/Biomed Demonstration Medical Data Management and processing EGEE 3 rd review rehearsal,
From Digital Objects to Content across eInfrastructures Content and Storage Management in gCube Pasquale Pagano CNR –ISTI on behalf of Heiko Schuldt Dept.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Data Management cluster summary Krzysztof Nienartowicz JRA1 All Hands meeting, Helsinki.
INFSO-RI Enabling Grids for E-sciencE A Grid Approach to Distributed Image Analysis for Early Diagnosis of Alzheimer Disease Livia.
Glite. Architecture Applications have access both to Higher-level Grid Services and to Foundation Grid Middleware Higher-Level Grid Services are supposed.
MEDIGRID project, DataGrid FR meeting, April 18, 2002, Johan Montagnat, WP10 ACI GRID 2002 MEDIGRID: high performance medical image processing on a computational.
WP 10 ATF meeting April 8, 2002 Data Management and security requirements of biomedical applications Johan Montagnat - WP10.
INFSO-RI Enabling Grids for E-sciencE Introduction Data Management Ron Trompert SARA Grid Tutorial, September 2007.
Enabling Grids for E-sciencE EGEE-II INFSO-RI Medical Data Manager 1 Dicom retrieval : overview of the DPM One command line to retrieve a file:
INFSO-RI Enabling Grids for E-sciencE All activity meeting Vincent Breton On behalf of NA4.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Data management in LCG and EGEE David Smith.
INFSO-RI Enabling Grids for E-sciencE /10/20054th EGEE Conference - Pisa1 gLite Configuration and Deployment Models JRA1 Integration.
INFSO-RI Enabling Grids for E-sciencE EGEE-2 NA4 Biomed Bioinformatics in CNRS Christophe Blanchet Institute of Biology and Chemistry.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks gLite Data Management Components Presenter.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The LCG interface Stefano BAGNASCO INFN Torino.
INFSO-RI Enabling Grids for E-sciencE Introduction to Grid Computing, EGEE and Bulgarian Grid Initiatives, Sofia, South.
INFSO-RI Enabling Grids for E-sciencE University of Coimbra GSAF Grid Storage Access Framework Salvatore Scifo INFN of Catania EGEE.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Data Management cluster summary David Smith JRA1 All Hands meeting, Catania, 7 March.
EGEE is a project funded by the European Union under contract IST Data Management Data Access From WN Paolo Badino Ricardo.
INFSO-RI Enabling Grids for E-sciencE NPM Security Alistair K Phipps (NeSC) JRA4 Face To Face, CERN, Geneva.
INFSO-RI Enabling Grids for E-sciencE University of Coimbra gLite 1.4 Data Management System Salvatore Scifo, Riccardo Bruno Test.
INFSO-RI Enabling Grids for E-sciencE University of Coimbra Data Management System gLite – LCG – FiReMan Salvatore Scifo INFN Catania.
INFSO-RI Enabling Grids for E-sciencE EGEE Review Transition from EGEE-II to EGEE- III Biomed cluster V. Breton – J. Montagnat.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Architecture of LHC File Catalog Valeria Ardizzone INFN Catania – EGEE-II NA3/NA4.
Enabling Grids for E-sciencE EGEE-II INFSO-RI Status of SRB/SRM interface development Fu-Ming Tsai Academia Sinica Grid Computing.
User Domain Storage Elements SURL  TURL LFC Domain (LCG File Catalogue) SA1 – Data Grid Interoperation Enabling Grids for E-sciencE EGEE-III INFSO-RI
Scuola Grid INFN, Trieste, 1-12 Dic Managing Confidential Data in the gLite Middleware – The Secure Storage.
2 nd EGEE/OSG Workshop Data Management in Production Grids 2 nd of series of EGEE/OSG workshops – 1 st on security at HPDC 2006 (Paris) Goal: open discussion.
Grid Services for Digital Archive Tao-Sheng Chen Academia Sinica Computing Centre
Riccardo Zappi INFN-CNAF SRM Breakout session. February 28, 2012 Ingredients 1. Basic ingredients (Fabric & Conn. level) 2. (Grid) Middleware ingredients.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Service to Encrypt Biological Data on Grid.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Direct User Support and updates on EGEE.
Data Management & Information Systems
Enabling Grids for E-sciencE EGEE-II INFSO-RI The Development of SRM interface for SRB Fu-Ming Tsai Academia Sinica Grid Computing.
EGEE Data Management Services
Grid based telemedicine application
Jean-Philippe Baud, IT-GD, CERN November 2007
gLite Basic APIs Christos Filippidis
NA4/medical imaging. Medical Data Manager Installation
The lightweight Grid-enabled Disk Pool Manager (DPM)
NA4 Medical Imaging Geneva, September 26, 2006 Johan Montagnat.
Cross-health enterprises Medical Data Management on the EGEE grid
Medical Data Manager use case: 3D medical images analysis workflow.
Scuola Grid INFN, Martina Franca, Nov
Encrypted Data Store, Hydra & Delegation Interface
Johan Montagnat Lyon, April 28, 2006
GSAF Grid Storage Access Framework
Data Management cluster summary
INFNGRID Workshop – Bari, Italy, October 2004
Installation/Configuration
Presentation transcript:

INFSO-RI Enabling Grids for E-sciencE Security needs in the Medical Data Manager EGEE MWSG, March 7-8 th, 2006 Ákos Frohner on behalf of Johan Montagnat

MWSG, March 7-8 th, Security in the Medical Data Manager 2 Enabling Grids for E-sciencE INFSO-RI Medical Data Security Content –Medical images (data, confidential) –Patient folder (attached metadata, very sensitive) Requirements –Patient privacy  Needs fine access control (ACLs on all data and metadata)  Needs metadata contention (metadata databases administrated by accredited staff) –Data protection  Needs data encryption (even grid sites administrators are not accredited to access the data) How important it is? –The medical community will just not use a system in which they are trustful (both a technical and a human problem).

MWSG, March 7-8 th, Security in the Medical Data Manager 3 Enabling Grids for E-sciencE INFSO-RI Medical Data Manager Objectives –Expose an standard grid interface (SRM) for medical image servers (DICOM) –Fulfill application security requirements without interfering with clinical practice DICOM server gLiteIO server SRM-DICOM interface Fireman AMGA Metadata User Interface Worker Node Hydra Key store The MDM components DICOM clients

MWSG, March 7-8 th, Security in the Medical Data Manager 4 Enabling Grids for E-sciencE INFSO-RI Features This is a “read only” kind of storage –Data are written from the hospital imagers, internally –An (authorized) grid user can only read medical data through the SRM interface –DICOM data are not stored in a raw file format: data are transformed before being sent out Privacy –Fireman provide file level ACLs –gLiteIO provide transparent access control –AMGA provides metadata secured communication and ACLs –SRM-DICOM provides on-the-fly data anonimization  It is based on the dCache implementation (SRM v1.1) Data protection –Hydra provides encryption/decryption transparently

MWSG, March 7-8 th, Security in the Medical Data Manager 5 Enabling Grids for E-sciencE INFSO-RI Medical Data Registration DICOM server Fireman AMGA Metadata Hydra Key store gLiteIO server 1. Image is acquired 2. Image is stored in DICOM server 3. glite-eds-put 3a. Image is registered (a GUID is associated) 3b. Image key is produced and registered 4. image metadata are registered

MWSG, March 7-8 th, Security in the Medical Data Manager 6 Enabling Grids for E-sciencE INFSO-RI Medical Data Retrieval DICOM server SRM-DICOM interface Fireman AMGA Metadata User Interfac e Worker Node Hydra Key store gLiteIO client 2. glite-eds- get 3. get SURL from GUID 4. request file 5. get file key 6. on-the-fly encryption and anonimyzation return encrypted file 7. get file key and decrypt file locally File ACL control Metadata ACL control Key ACL control Anonimization & encryption In-memory decryption 1. get GUID from metadata gLiteIO server

MWSG, March 7-8 th, Security in the Medical Data Manager 7 Enabling Grids for E-sciencE INFSO-RI Data replication and retrieval usecase gLiteIO server DICOM server SRM-DICOM interface Fireman User Interface Worker Node Hydra Key store gLiteIO client gLiteIO client Any SE SRM interface An y file 1. Request replication 6. Request file 2. Get SURL 3. Get file 8. Get file 4. Get file key 5. (encrypted) File replication 7. Get SURL 9. Return (encrypted) file File ACL control gLiteIO server

MWSG, March 7-8 th, Security in the Medical Data Manager 8 Enabling Grids for E-sciencE INFSO-RI The DPM + LFC based proposal LFC –As a replacement to FiReMAN. –Not interfaced with any key store: to be interfaced with hydra or Perroquet. DPM –SRM v2 implementation, will provide ACLs –ACLs are only controlling one physical replica on local site Modifications to do –Interface GFAL with encryption  The interface with hydra is planed. Timeline? –Interface the DICOM server with DPM instead of dCache  Jean-Philippe and Daniel started discussing to check how feasible it is. –Provide a coherent file-level ACL control (not just replica-level)  gLiteIO+Fireman does it. What about using gLiteIO+Fireman?

MWSG, March 7-8 th, Security in the Medical Data Manager 9 Enabling Grids for E-sciencE INFSO-RI Data replication and retrieval with DPM DICOM server DPM-based SRM-DICOM LFC (DPNS) User Interface Worker Node Key store GFAL client GFAL client Any SE DPM An y file 1. Get SURL 2. Get file 6. Get file 3. Get file key? 4. (encrypted) File replication 5. Get SURL 7. Return (encrypted) file Replica ACL control LFC (DPNS) Replica ACL control Coherency?

MWSG, March 7-8 th, Security in the Medical Data Manager 10 Enabling Grids for E-sciencE INFSO-RI Conclusions Why we would move to DPM / LFC: –Apparently DPM is more modular than dCache. In a long term we should move to such an SRM implementation. –DPM is interesting for “any biomed storage”  MDM is just an example of one particular case (DICOM servers)  Other biomed data needs encryption/access control (e.g. some bioinformatics databases). Why we would not move to DPM / LFC: –A coherent grid file-level ACL control mechanism is mandatory –Need to rework on the MDM –No interface with encryption today Questions –We try to minimize effort in the migration. Is “providing minimal support to gLiteIO/Fireman/Hydra” until GFAL/DPM/... fulfill the same functionality than what exists today a really good strategy? –What about the other way round?