Batch 5

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

DELEGATED AUTHORIZATION FRAMEWORK FOR

EHR SERVICES USING QR CODE GENERATION

Mr. E. Sankar[1]
Assistant professor, SCSVMV University, Kanchipuram, TamilNadu, India.
Thota Sai Divya[2]
CSE, SCSVMV University, Kanchipuram, Tamilnadu, India.
Rangu Gunasri[3]
CSE, SCSVMV University, Kanchipuram, Tamilnadu, India.

ABSTRACT
Many Medical organizations use the cloud-based Electronic Health Record(EHR) services due
to the high risk of the data of a person that is accessed by the unauthorized user and the resulting
compromise of patient data. To use EHR Management many organizations follow a patient-
centric method so that the patient can authorize every access of their health records as the
control is given to the patients. It is impractical as the patient may not always be available to
provide authorization. To secure and to use cloud-based EHR services there is a need to develop
a proper authorization delegation mechanism. The main objective of this project is to create a
mobile application for patients through web-based management that provides secured access
to patient’s records through cloud storage services. Admin remotely stores the patient’s data in
the cloud safely and the patients can access easily their data that are stored in cloud-based EHR
management. In some cloud storage systems, cloud files may contain some sensitive
information. The sensitive information hiding can be found by encrypting the file but this
makes the shared file unable to use by the other person. In this project we propose a document
reference id that automatically converts to the QR code then just scan and then download the
document, Signatures are used to verify the file.
Keywords: Attribute Based Encryption, Attribute Based Access Control, Electronic Health
Record, Cloud Storage, Semantic Web, Access Broker, Cloud Computing.
INTRODUCTION
An EHR (Electronic Health Record) is a or acquired from vendors like care cloud,
digital version of a patient’s medical history Athena health, egocentricity, clinical
maintained by the authorities of an works, etc... By maintaining the many
organization over a period of time. It helps digital copies of patient’s records increase
the medical organization by providing the possibility of attacks on patient’s
services that automatically access the information, so they need high-security
patient’s record. Many service providers controls. EHR security requirement
are rapidly moved to cloud-based EHR to includes functionality, interoperability,
manage the patient’s information and they password protection, audit trails, data
are platform-independent, provide patients encryption.
information with vigorous data searching,
EXISTING AND PROPOSED SYSTEM
easy retrieval, anywhere accessibility, cost-
effective. Services are developed internally EXISTING MODEL
The Existing concept is a proper security and protection issues that can be
authorization delegation mechanism to use tended to that we leave for future work.
cloud-based EHR service management
EXTRAVAGANCE
using Attribute-Based Encryption in web
technologies that involve the combination Predictive Learning of auditing
of using semantic web technic with
attributes based schemes. Real-time business analysis summary

Algorithm WORKING PROCEDURE

Attribute-based encryption. SYSTEM ARCHITECTURE

The user prepared the document in the


manual.
DRAWBACKS
Developed in Web technologies.
The Network could be exploited.
PROPOSED MODEL
In this paper, we propose a remote
document reference id automatically
converts to the QR code then just scan user
module the download the particular
document integrity that realizes data
sharing with sensitive information hiding.
Algorithm
QR code generate algorithm
As compared to other tracking and
identification methods, such as the simple
barcode it proves that to be expensive for
many applications.
By default, each hospital will be given by
ADVANTAGES
one unique id. Based on the unique id the
The advantage of using these tools is that patient fills the registration form and gets
you can develop the content once and then the login details, all the details will be
revise it as necessary. stored in the cloud database by cloud
storage providers. The patient came to
Advanced security using QR code.
hospital and get treated by the doctor and
FUTURE ENHANCEMENT the report of the patient will be stored by the
head of the organization or the admin based
In the future, it will also enhance our
on EHR management by using the hospital
framework to include the EHR data
unique id. The admin or the one who stored
exchange and routing functionality that are
the patient information, except the patients
essential for inter-organizational HER
the others cannot view or download the
frameworks. There are numerous extra
particular data. Whenever the patient wants stored in a database. Login screen contains
to view or download his/her information a email id or username and password when
QR code is generated from the cloud and the user logs in the app it should retrieve the
the patient scans the QR code using QR data to the database and combine based in
Scanner (scanner will be in the mobile of a the user input if it match’s user name and
patient), after scanning the OTP is password to allow in the app otherwise alert
generated from the cloud in the patients and shows a message to the user. The
mobile. After entering it the fill is viewed Language used is XML.
and it can be downloaded. The whole
access is given to patient only.
SYSTEM REQUIREMENTS
HARDWARE
PROCESSOR : Intel core i3
RAM: 4 GB DDR2 RAM
MONITORS: 15’’ COLOR
HARD DISK: 100 GB
SOFTWARE DATABASE CREATION
Front End: ANDROID XML, JAVA User email id or username and password
Back End: MYSQL, PHP have been stored after registration, Android
used SQLite Database for storing and
Operating System: Windows 07 fetching user application details.
IDE: Eclipse, Android Studio
MODULES
Login/Registration
Database Creation
Medical Data upload
QR Code Encrypted
Medical data View/Remove
Security Scanner
Medical File Download
LOGIN & REGISTRATION
In this module, we design to develop a login
and sign up screen. This module describes
the signup page contains email id or MEDICAL DATA UPLOAD
username, password and confirms the In this module, to upload the user
password that kind of details should be information in storage cloud in secure data
are user information, Medical record MEDICAL DATA VIEW/REMOVE
information and patients details, etc…
In this module, medical data view/remove
that process can be used in logged user view
a medical data and in case that data can
remove.

Recor

Rec
QR CODE ENCRYPTOR
Record
In this module, we have created a QR code
that generates a using Encrypt the value link
medical records data and patient details that SECURITY SCANNER
can be created are login users.
In this module are security scanner like the
three security can be using the projects are
security patch, unique QR code Reader and
Make QR code that particular person can be
used in the application.

S
e
c
u
r

Security QR
Patch Code
otp Scanner

QR
Code
MEDICAL FILE DOWNLOAD personal health records in cloud computing
using ABE, “IEEE transactions on parallel
We have to create a medical file download
and distributed systems, vol.24, no 1, pp.
are overall data stored in the cloud the
131-143, 2013.
specific user medical records find to view
and download the particular user records. [4] M. Lavin and M. Nathan, “System and
method for managing patient medical
s records,” Jun. 30 1998, uS Patent 5,
772,585.
[5] S. Narayana, M. Gagne, and R. Safavi-
Naini,” Privacy preserving her system
using attribute-based infrastructure,” in
Medical CCSW, 2010.
record
records
download

CONCLUSION
EHR System helps to facilitate the use of e-
health and are the most important and most
complex type of health information system.
EHR services improve the quality of health
care by making healthcare data secure,
providing anywhere easy access. However,
providing the security to data the chances of
data breaches are more. Therefore, identify
and eliminate those breaches before
implementing it.
REFERENCES
[1] K. H” ayrinen, K. Saranto, and P.Nyk”
anen, “Definition, structure, content, use
and impacts of electronic health records: a
review of the research literature,”
International journal of medical
informatics, vol. 77, no. 5, pp.291-304,
2008.
[2] Maithilee Joshi, Karuna P. Joshi and
Tim Finin, “Delegated Authorization
Framework for EHR Services using
attribute based encryption”, IEEE
Transactions on Services Computing, 2019.
[3] M. Li, S. YU, Y. Zheng, K. Ren, and W.
Lou, “Scalable and secure sharing of

You might also like