SlideShare a Scribd company logo
End-To-End Asymmetric Encryption of
Biomedical Data In-Transit and At-Rest
Ryan M Harrison, Ph.D.
Head of Engineering
BioBright
BioIT World
Track 13: Data Security
24 May 2017
Considerations
Data store
3
Data store
4
5
Data store
Data store
6
Data accessibility
ad hoc
Image Metadata
Objective
Intranet
Excitation
Emission
Label
Reagents
Protocols
Exp Metadata Analysis MetadataRaw Image
7
Raw Image Analysis Metadata
Data accessibility
API
Experiment MetadataImage Metadata
API APIAPIAPI
8
Encrypted File Encrypted File
Decrypted
Original File
AES
AES
Internet
Intranet
Cloud
Encryption
TLS
Original File
Encrypted AES Key
9
Encrypted File Encrypted File
Decrypted
Original File
AES
AES
Internet
Intranet
Cloud
Encryption
Original File
Encrypted AES Key
RSA
Encrypted AES KeyEncrypted AES Key
RSA
Encrypted
AES Key
10
Encrypted File Encrypted File
Decrypted
Original File
AES
AES
Intranet
Cloud
Encryption
Original File
Encrypted AES Key
RSA
Encrypted AES KeyEncrypted AES Key
RSA
Encrypted
AES Key
In-mem
On disk
11
Encrypted File Encrypted File
Decrypted
Original File
AES
AES
Intranet
Cloud
Key management
Vendor
Original File
RSA
Encrypted AES Key
RSA
Encrypted
AES Key
RSA Pub Key
RSA Pri Key
12
Encrypted File Encrypted File
Decrypted
Original File
AES
AES
Intranet
Cloud
Key management
Client
Original File
RSA
RSA
Encrypted
AES Key
Encrypted AES Key Encrypted AES KeyEncrypted AES Key
13
Encrypted File Encrypted File
Decrypted
Original File
AES
AES
Intranet
Cloud
Key management
AWS Key Management Service
Original File
RSA
Encrypted AES Key
RSA
Encrypted
AES Key
RSA Pub Key
RSA Pri Key
Encrypted AES KeyEncrypted AES KeyEncrypted AES KeyEncrypted AES Key
Metadata extraction
Vendor
14
Metadata
Metadata
Metadata
Metadata
Metadata
Metadata
Metadata
Metadata
Metadata
Analysis Metadata
API
15
Metadata
Metadata
Metadata
Metadata
Metadata
Metadata
Metadata
Metadata
Metadata
Analysis Metadata
API
Metadata extraction
Client
Considerations
16
● Data store
● API access
● Encryption
○ Per session
○ Per file
● Key management: Client, Vendor, AWS
● Metadata extraction: Client, Vendor
Implementation
Design choices
18
Deployment Cloud-prefered; on-prem optionality
Architecture Single-tenant SOA (service-oriented architecture)
Key management Vendor
Metadata extraction Vendor
Sync
Stack 1
Bio-equipment Co
Single tenant
19
Stack 2Pharma Co
VPC
Bio-equipment Co
Stack 1Stack 1
VPC
Pharma Co
Architecture
20
Metadata
Metadata
Metadata
Metadata
Metadata
Metadata
Analysis Metadata
Image Metadata
API
API
Raw Image
API
Metadata
Metadata
Metadata
Client
Indexing
Metadata Extractor
Metadata Extractor
Data Store
(Encrypted)
Architecture
21
Client Data Store
(Encrypted)
Architecture
22
drag
file
Encrypted File
+ Initiation Vector
AES256-GCM
Original File
Client
Encrypted AES KeyEncrypted AES KeyEncrypted AES Key
RSA Pub Key
Per Device
AES Key
Per File
Lab Network (Intranet) VPC
RDS
S3RSA-4096
Architecture
23
Metadata
Metadata
Metadata
Metadata Extractor
Data Store
(Encrypted)
Architecture
24
Metadata
Metadata
Metadata
Encrypted File
+ Initiation Vector
Encrypted AES KeyEncrypted AES KeyEncrypted AES Key
RSA Pri Key
Per Device
Decrypted AES Key
Decrypted File
Stream
AES256-GCM
RSA-4096
vs
RDS
RDS
S3
Optional:
SQS SNS
+
DynamoDB
Architecture
25
Raw Image
API
+vs
Service oriented Microservices
API Gateway LambdaElastic Beanstalk
On prem optionality
26
Elastic Beanstalk
and
or
RDS DynamoDB
S3 minio
vs
Pick your poison :-)
ryan@biobright.com

More Related Content

Similar to End-To-End Asymmetric Encryption of Biomedical Data In-Transit and At-Rest (9)

PDF
Medical image encryption techniques: a technical survey and potential challen...
IJECEIAES
 
PDF
Why BioEMR is Crucial for Improving Patient Data Security.pdf
BioAro
 
PPTX
A Major Project Presentation on Lightweight image encryption
aftabsoo20
 
PDF
Batch 21 - Final project review -PPT.pdf
hariomprakaas
 
PDF
Embedding and Extraction Techniques for Medical Images-Issues and Challenges
csandit
 
PDF
An efficient data masking for securing medical data using DNA encoding and ch...
IJECEIAES
 
PDF
Secure E- Health Care Model
IOSR Journals
 
PDF
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
AMD Developer Central
 
PDF
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET Journal
 
Medical image encryption techniques: a technical survey and potential challen...
IJECEIAES
 
Why BioEMR is Crucial for Improving Patient Data Security.pdf
BioAro
 
A Major Project Presentation on Lightweight image encryption
aftabsoo20
 
Batch 21 - Final project review -PPT.pdf
hariomprakaas
 
Embedding and Extraction Techniques for Medical Images-Issues and Challenges
csandit
 
An efficient data masking for securing medical data using DNA encoding and ch...
IJECEIAES
 
Secure E- Health Care Model
IOSR Journals
 
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
AMD Developer Central
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET Journal
 

More from Ryan M Harrison (8)

PPTX
2020-11-13 Anatomy of a FHIR Implementation Guide
Ryan M Harrison
 
PDF
2021 12-03 TOGAF for Developers
Ryan M Harrison
 
PDF
Positioning yourself for success in technical careers
Ryan M Harrison
 
PPTX
2019-01-24 Sequelize ORM (Object Relational Mapper): models, migrations, oh my
Ryan M Harrison
 
PPTX
2019-08-23 API contract testing with Dredd
Ryan M Harrison
 
PDF
Breaking a monolith: In-place refactoring with service-oriented architecture ...
Ryan M Harrison
 
PDF
Nest v. Flat with EmberData
Ryan M Harrison
 
PDF
DEF CON 24: Reverse engineering biomedical equipment for fun and open science
Ryan M Harrison
 
2020-11-13 Anatomy of a FHIR Implementation Guide
Ryan M Harrison
 
2021 12-03 TOGAF for Developers
Ryan M Harrison
 
Positioning yourself for success in technical careers
Ryan M Harrison
 
2019-01-24 Sequelize ORM (Object Relational Mapper): models, migrations, oh my
Ryan M Harrison
 
2019-08-23 API contract testing with Dredd
Ryan M Harrison
 
Breaking a monolith: In-place refactoring with service-oriented architecture ...
Ryan M Harrison
 
Nest v. Flat with EmberData
Ryan M Harrison
 
DEF CON 24: Reverse engineering biomedical equipment for fun and open science
Ryan M Harrison
 
Ad

Recently uploaded (20)

PDF
MiniTool Partition Wizard Free Crack + Full Free Download 2025
bashirkhan333g
 
PPTX
ChiSquare Procedure in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
IDM Crack with Internet Download Manager 6.42 Build 43 with Patch Latest 2025
bashirkhan333g
 
PPTX
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
PPTX
Milwaukee Marketo User Group - Summer Road Trip: Mapping and Personalizing Yo...
bbedford2
 
PPTX
Foundations of Marketo Engage - Powering Campaigns with Marketo Personalization
bbedford2
 
PDF
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
PDF
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pdf
Varsha Nayak
 
PDF
HiHelloHR – Simplify HR Operations for Modern Workplaces
HiHelloHR
 
PPTX
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
PDF
iTop VPN With Crack Lifetime Activation Key-CODE
utfefguu
 
PDF
Empower Your Tech Vision- Why Businesses Prefer to Hire Remote Developers fro...
logixshapers59
 
PDF
Unlock Efficiency with Insurance Policy Administration Systems
Insurance Tech Services
 
PDF
Linux Certificate of Completion - LabEx Certificate
VICTOR MAESTRE RAMIREZ
 
PDF
MiniTool Partition Wizard 12.8 Crack License Key LATEST
hashhshs786
 
PDF
The 5 Reasons for IT Maintenance - Arna Softech
Arna Softech
 
PDF
Build It, Buy It, or Already Got It? Make Smarter Martech Decisions
bbedford2
 
PDF
How to Hire AI Developers_ Step-by-Step Guide in 2025.pdf
DianApps Technologies
 
PDF
Download Canva Pro 2025 PC Crack Full Latest Version
bashirkhan333g
 
PDF
유니티에서 Burst Compiler+ThreadedJobs+SIMD 적용사례
Seongdae Kim
 
MiniTool Partition Wizard Free Crack + Full Free Download 2025
bashirkhan333g
 
ChiSquare Procedure in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
IDM Crack with Internet Download Manager 6.42 Build 43 with Patch Latest 2025
bashirkhan333g
 
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
Milwaukee Marketo User Group - Summer Road Trip: Mapping and Personalizing Yo...
bbedford2
 
Foundations of Marketo Engage - Powering Campaigns with Marketo Personalization
bbedford2
 
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pdf
Varsha Nayak
 
HiHelloHR – Simplify HR Operations for Modern Workplaces
HiHelloHR
 
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
iTop VPN With Crack Lifetime Activation Key-CODE
utfefguu
 
Empower Your Tech Vision- Why Businesses Prefer to Hire Remote Developers fro...
logixshapers59
 
Unlock Efficiency with Insurance Policy Administration Systems
Insurance Tech Services
 
Linux Certificate of Completion - LabEx Certificate
VICTOR MAESTRE RAMIREZ
 
MiniTool Partition Wizard 12.8 Crack License Key LATEST
hashhshs786
 
The 5 Reasons for IT Maintenance - Arna Softech
Arna Softech
 
Build It, Buy It, or Already Got It? Make Smarter Martech Decisions
bbedford2
 
How to Hire AI Developers_ Step-by-Step Guide in 2025.pdf
DianApps Technologies
 
Download Canva Pro 2025 PC Crack Full Latest Version
bashirkhan333g
 
유니티에서 Burst Compiler+ThreadedJobs+SIMD 적용사례
Seongdae Kim
 
Ad

End-To-End Asymmetric Encryption of Biomedical Data In-Transit and At-Rest