A Secure Cloud-Based Patient Electronic Medical Records System Using Two-Factor Authentication
A Secure Cloud-Based Patient Electronic Medical Records System Using Two-Factor Authentication
ISSN No:-2456-2165
Abstract:- This work demonstrates a model that In cloud computing, individual users and companies
enhances security and predictive analytics of cloud-based are allowed to oversee the communications of files,
clinical and patients’ medical records for hospital information, and applications without specific software
management systems with adequate storage capacity, installed on their devices; only internet access is required
access to data for only authorized users, low cost medical [9]. Figure 1 shows a typical cloud computing environment.
services and implementation. The enhanced system uses
Two-Factor Authentication (Password and Token) to
grant access to authorized users in the system.
Specifically aiming at providing greater security for
sensitive information transmission, thereby enhancing
the level of security in hospital management systems. The
application was built with Python programming
language, Django framework and machine learning
algorithm with the capability to handle analytics. The
efficiency of the model developed was tested and
observed to be higher than previous models in terms of
Security, Stakeholders’ Participation, Access Control,
Data Privacy and Flexibility.Thetoken authentication
and verification time were performed and an average of
10.95 seconds is required to access a patient’s medical
record which is not significant enough to compromise
security.
I. INTRODUCTION
Fig 1:- Cloud computing environment (Source: Mansor et al.
Cloud computing generally is referred to as the 2013)
delivery of technological services over the web [1].It offers a
simple on-demand network access model to an easily Data mining is simply the process of extracting and
distribution, reduced management efforts, interaction analyzing a large set of information in order to discern
between service providers and a communal pool of trends and patterns. Data mining depends on effective data
configurable computing resources[2].Cloud Computing and collection, warehousing, and computer processing.The
its business models have impacted immensely on method of retrieving and processing data efficiently has
developments in the twenty-first century, not only in the been a major problem for many years of data management,
computing industry but in many other sectors [7].Cloud given the exponential growth of data generated ranging from
computing delivers computing and storage capacity as a Petabytes to Exabytes.
service to a community of end recipients [6].
A medical record is a confidential record maintained
Cloud computing is the advancement of dispersed by a medical practitioner or agency for a patient. This
Computing, Parallel Computing, and Grid Computing, and includes a description of the patient's medical history and
the coordinates advancement result of Virtualization, Utility information about each of the cases, including symptoms,
Computing, IaaS (infrastructure as a service), PaaS diagnosis, care, and results, such as the patient's name,
(platform as a service), and SaaS (Software as a service) [8]. address, birth date.The primary aim of the medical record is
to document the interaction and treatment of the patient with
a health care provider to ensure sufficient healthcare for
future references.
Figure 4 shows the step by step breakdown of the Fig.4.Sequence Diagram for the developed system.
operations of the system using a sequence diagram.
V. RESULTS ANDDISCUSSION
In order to attain a quantifiable measurement of the All in all, health delivery organizations (HDOs) are
system, a unit point scale of X = 10 is allocated to each lacking in terms of data management. A significant number
metric assuming if true. Table 1 and Figure 5 illustrates the of deaths are been recorded annually due to mismanagement
table and graphical representation of the systems security of clinical records. Some factors responsible for these are;
level respectively. high cost of medical services, inadequate access to quality
healthcare personnel and infrastructure, inaccurate
Patients Time Sec Patients Time Sec diagnostic and therapeutic procedures, and poor storage of
1 9 11 10 medical/clinical data.This work provides a better and
2 11 12 7 secured cloud-based Platform for Healthcare Delivery
3 5 13 5 Organizations in the cloud to enable them to carry out their
4 7 14 10 operations efficiently. The proposed system incorporates a
5 15 15 13 one-time password (OTP) Scheme that guarantees the
6 8 16 15 security and confidentiality of patients’ electronic health
7 20 17 6 records as well as prevents unauthorized access to such
8 15 18 7 records. The platform also provides a means which useful
information can be mined through its machine learning
9 10 19 16
predictive support system.
10 18 20 12
Table 2: Token Time Interval
REFERENCES
Figure 6 shows demonstrates the token time interval
[1]. Srinivasa, R., Nageswara, R., and Ekusuma, K., 2009.
.
“Cloud computing: An overview,” Journal of
Theoretical and Applied Information Technology
(JATIT), Pp. 71-76.
[2]. IBM Corporate Marketing White paper, “Cloud
computing: Building a new foundation for
Healthcare,”.ibm.com/cloud, 2011.
[3]. Zimmermann, H. J. (2006). Knowledge Management,
Knowledge Discovery, and Dynamic Intelligent Data
Mining. Cybernetics and Systems: An International
Journal, 37(6), pp. 509- 531.
[4]. Becerra-Fernandez, I. &Sabherwal, R. (2010).
Knowledge Management: Systems and processes...
New York: ME Sharpe.
[5]. DU, H. 2010. Data Mining Techniques and
Applications: An Introduction. Hampshire: Cengage.
[6]. K. ShanthaShalini, R. Shobana, S. Leelavathy andV.
Sridevi.A Cloud Based Approach for Health
CareManagement. Int. J. Chem. Sci.: 14(4), 2016,
2927-2932.
Fig. 6. Token Time Interval [7]. Sanjay, P. A., Sindhu, M., and Jesus, Z. 2012. “A
Survey of the state of Cloud computing in Healthcare,”
A salient aspect of this system is the time taken to gain in Canadian Center of Science and Education, Network
access to the patient’s EMR, in other words, the time and Communication Technologies; Vol. 1, No. 2;
interval in sending the token, receiving and verifying the ISSN 1927-064X E.
token in order to access the medical record is negligible. [8]. Jun Zeng (2018). The Development and Application of
Although, there are several factors that affects the time Data Mining Based on Cloud Computing. J. Phys.:
interval in delivering the token on the patient’s device, such Conf. Ser. 1087032008
as internet speed and mobile phone capability.An [9]. MansorZauir, Mohamad M. Al Rahhal, Abdullah Al-
experiment of 20 persons from different locations were Faifi, Alaaeldin M. Hafez, Hassan Abdalla (Jan, 2013).
assumed as patients and registered into the EHR system. Survey of Data Mining Usage in Cloud Computing