a secured health records with anonynmous access detection with cloud transfer using block chain

Balaji M ,Vijay B,Kartheesan B S,Kamal R,Kamal N

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:3         Year: 24 April,2023         Pages:1737-1740

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

In the existing system, hospital; details are maintained as a hardcopy like report. In most of hospital records are maintained as a hard copy due to huge volume and complexity, it is difficult to manage those data sets using traditional software and hardware. in this paper we propose an efficient storage system for patient information. Through this system we providing a security system for patient and hospital details. To secure the record we are implementing an efficient system by crypto stegano system. Patient details are stored in cloud for memory management and it will easy way access the data. We are providing permission key to access the patient details. No one can access the information without the knowledge of doctor. So, through this a security level is increased by storing data using crypto steganography.

Kewords

Private key, public key, steganography and encrypting the data storage

Reference

[1] M. Chen, J. Yang, Y. Hao, S. Mao, K. Hwang,” A 5G Cognitive System for Healthcare”, Big Data and Cognitive Computing, Vol. 1, No. 1, DOI:10.3390/ bdcc1010002, 2017. [2] Frost & Sullivan: Drowning in Big Data? Reducing Information Technology Complexities and Costs for Healthcare Organizations. http://www.emc.com/collateral/analyst-reports/ frost-sullivan-reducing-information technology-complexities-ar.pdf [3] M. Chen, S. Mao, Y. Liu,” Big Data: A Survey”, Mobile Networks and Applications, Vol. 19, No. 2, pp. 171-209, April 2014. [4] M. S. Hossain, and G. Muhammad,” Healthcare Big Data Voice Pathology Assessment Framework,” IEEE Access, vol. 4, no. 1, pp. 7806-7815, December 2016. [5] M. Chen, Y. Hao, K. Hwang, L. Wang, L. Wang,” Disease Prediction by Machine Learning over Big Healthcare Data”, IEEE Access, Vol. 5, No. 1, pp. 8869-8879, 2017. [6] M. Chen, P. Zhou, G. Fortino,” Emotion Communication System”, IEEE Access, Vol. 5, pp. 326-337, 2017. [7] M. Chen, Y. Ma, Y. Li, D. Wu, Y. Zhang, C. Youn,” Wearable 2.0: Enable Human-Cloud Integration in Next Generation Healthcare System”, IEEE Communications, Vol. 55, No. 1, pp. 54-61, Jan. 2017. [8] Bian J, Topaloglu U, Yu F, Yu F. Towards Large-scale Twitter Mining for Drug-related Adverse Events. Maui, Hawaii: SHB; 2012. [9] M. S. Hossain and G. Muhammad,” Cloud-assisted Industrial Internet of Things (IIoT) - enabled framework for Health Monitoring,” Elsevier Computer Networks, Vol. 101, No. (2016), pp.192-202, June 2016. [10] Raghupathi W, Raghupathi V. An Overview of Health Analytics. 2013. [11] M. S. Hossain, G. Muhammad, Sk. M. M. Rahman, W. Abdul, A. Alelaiwi and A. Almari,” Towards End-to-End Biometrics-Based Security for IoT Infrastructure,” IEEE Wireless Communication magazine, vol. 23. no. 5, pp. 45-51, October 2016 [12] I. Foster, Yong Zhao, I. Raicu, and Shiyong Lu. Cloud Computing and Grid Computing 360-Degree Compared. Grid Computing Environments Workshop, Austin, 2008. [13] P. T. Grance. (October 2009) The NIST Definition of Cloud Computing. Available online: http://csrc.nist.gov/groups/SNS/cloud-computing [14] Das Sargita, Chandrakar Ankita, and Pradhan Reshamlal. A Review on Issues and Challenges of Cloud Computing. International Journal of Innovations and Advancement in Computer Science 2015, Volume 4, pp. 81-88. [15] Akyol BA. Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry. Pacific Northwest, Washington, 2012.