SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1333
Enhancing the Security for Clinical Document Architecture Generating
System using AES Algorithm with Artificial Neural Network
1M.SriLakshmi, 2Dr. B. Lalitha
1M. Tech Student, Department of CSE, JNTUA Engineering College, District Ananthapur, A.P, India
2Assistant Professor, Department of CSE, JNTUA Engineering College, District Ananthapur, A.P, India
---------------------------------------------------------------------------***---------------------------------------------------------------------------
ABSTRACT─ Electronic Health Record helps to improve
the safety and satisfactory care of each patient details,
which is important to be maintained by the medical
institution, with the interoperability of Health Information
Exchange (HIE).The CDA generation and integration system
in cloud, uses open API to generate CDA files without
purchase of proprietary software . Using CDA record
integration system integrates multiple CDA documents of
patient into a single CDA document. Both physicians and
patient can make use of the scientific statistics in
chronological order. In this paper, the CDA documents are
combine into single record and may be browsed as a
readable format. It is simple to examine and recognize for
physicians correctly .The proposed work have been analyzed
to verify the ability of ANN based key expansion to make the
same cipher text as that accomplished by the conventional
AES(Advanced Encryption Standard) for the same plain text.
This model show the potential of the proposed work to
produce the same secure system even with non-identical key
expansion technique. However, the use of neural network
adds more security to the conventional AES, because the
adversary doesn’t know the topology of neural network.
Key Words: AES, ANN, Key Expansion, PRNG.
1. INTRODUCTION
Electronic Health Record (EHR) is longitudinal series of
electronic fitness statistics of patients where health
information is stored in the form of records. To access EHR
in efficient way between the health information
systems(HIS) one should maintain health information
exchange(HIE). However, most of the Health information
system provider have different characteristics and are
together incompatible. Hence, a standardized health
information exchange between hospitals needs to be
implemented. Especially, medical report standardization
lies at the core of guaranteeing interoperability. Health
Level Seven(HL7) has established CDA for clinical
documents which represents the structure and semantics
of ‘clinical documents’ during exchange of documents. HL7
refer to a set of international standards for transfer clinical
and administrative data between software applications
used by various health care providers. The first version of
CDA was introduced in 2001 and the later version came
out in 2005. Many nations have adopted CDA for their
projects. To establish self-assurance in HIE
interoperability, more HIS’s need to assist CDA. However,
the structure of CDA may be very complicated and the
production of correct CDA report is hard to gain without
deep understanding of the CDA standard. In addition, the
HIS improvement platforms for hospitals vary so
significantly that generation of CDA files in every medical
institution continually calls for a separate CDA generation.
Also, hospitals are very reluctant to adopt new system
unless it is in reality important for provision of care. As an
end result, the adoption rate of EHR is very low in some
nations like New Zealand or Australia. When the patient is
recognized at a medical institution, a CDA file regarding
the diagnosis is generated. The CDA report may be shared
among different clinics if the patient doesn’t have
objection in sharing of his records. The idea of family
doctor does no longer exist in Korea, it might common for
a patient to go to some other clinics. The change of CDA
report is brought on within the following cases: when a
physician desires to study a patient’s medical history.
While a patient is in emergency and the scientific records
wishes to be reviewed. It takes amount of time for the
scientific personnel as the quantity of exchanged CDA
record will increase due to having more documents
allotted in distinct files. This considerably delay the
medical personnel in taking decisions. Hence, when all
the CDA documents are included into a single record, the
clinical employees is empowered to check the patient
diagnose history without difficulty in chronological order.
Unfortunately integration of multiple CDA files into one,
does not exist yet to the best of our knowledge.
2. RELATED WORK
Lee, S. H., Song, J. H., Kim, I. K., & Kim, J.
W.[5],proposed CDA integration system and CDA
integration template for HIES in Korea. As a physician
spend limited time per patient in Korea this system will be
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1334
useful for them. Kim, H. S., Tran, T., & Cho, H[6],proposed a
next-generation hospital information system (HIS) based
on the HL7 clinical document architecture (CDA) including
in electronic health record (EHR) and a clinical data
repository (CDR) to enable the sharing of medical
information among health and medical institutions.
The existing system generates CDA based on cloud
computing .This CDA generation and integration system
works on different platforms as it makes use of an open
API by which interoperability can be achieved. To analyze
the working of existing system consider two hospitals A
and B. In each hospital there will be HIS and CDA
generation interface. With the help of this interface
hospital A and hospital B will get CDA documents from the
CDA generator API present in the cloud. CDA generator API
makes use of the template manager[7] to generate Clinical
documents in CDA standard[7] .The generated CDA will be
validated against the CDA valuator that will give accurate
CDA. Now this validated CDA will send back to the
hospitals through CDA generation interface.
The existing system provides integration of CDA based on
cloud computing. Each hospital will contain CDA
integration API which is used to send the CDA documents
to the cloud where different CDA documents of each
patient will be integrated with the help of CDA parser and
integrator.
This entire process of generation and integration of CDA
performed in cloud not able to provide security to the CDA
of patients. Hence, a cryptographic technique has been
proposed in the present system. Security can be achieved
by using AES with Feed forward network[5] in Artificial
neural network.
3. PROPOSED WORK
AES is an iterated block cipher which takes a key length of
128 bits and it consist of 10 rounds for encrypting the
data. In order to face the attacks a key expansion process
was developed in AES. To provide more security[7] to the
data, a neural network approach for the key expansion
process in AES has been proposed in this paper.
Artificial neural network is an inspiration from biological
nervous system, where millions of artificial neurons will
be interconnected to each other in order to transfer data
within fraction of seconds as does in human nervous
system.
The neural network will take 4 words as input and takes
initial weights with the help of PRNG ( pseudo random
number generator ).This algorithm is for generating a
sequence of numbers. The desired output given by neural
network present in key schedule. We are comparing the
target output denoted by X from training phase, with the
output generated by NN denoted by Y, the difference
between them is the error and the threshold value is set to
1.
Error = X-Y.
If the error is less than threshold value then output
generated by the NN is considered as desired output.
Otherwise we have to adjust the weights till we get error
less than the threshold value. Like this keys will be
extracted for encrypting and decrypting the data. The
entire process is explained in the below fig1.
Fig1. Neural network key Expansion for encryption
and decryption process.
In the training phase of the ANN, the AES algorithm
generating the output from specific input the ANN takes
the initial key (4 Word) as input and the key (40 Word) of
the platform as output then the process will be terminated.
The NN used in the training process has topology [4-4-40-
1]. In other words , the neural networks consists of first
layer with 4 neurons, second layer with 4 neurons, third
layer with 40 neurons and the output layer contains only
one neuron.
In training phase, a sigmoid activation function which is
hyperbolic tangent on each neuron is implemented as
given by the equation (1). AES takes the bits in the range
of 0 to 255 where as the domain of sigmoid function is -1
to 1. In order to implement a neural network based AES
the bits range should be taken from 0 to 1.
∑ 1k.tanh(∑ ∑ kj.tanh(
∑ ∑ ji.tanh(∑ i1.input)))) ----(1)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1335
sigmoid activation function
As AES takes 128 bit key hence the no of rounds will be ten
where each round contains four steps. AES operates on a 4
×4 matrix of bytes, called the state
AES Algorithm:
AddRoundKey(State,key0)
for round=1 to Nr-1
{
SubBytes(State,S-Box)
ShiftRows(State)
MixColumns(State)
AddRoundKey(State,Keyr)
}
SubBytes(State)
ShiftRows(State)
AddRoundKey(State,Keynr)
AddRoundKey(State,Key0)
for round=Nr-1 to 1
{
InvSubBytes(State,S-Box)
InvShiftRows(State)
InvMixColumns(State)
AddRoundKey(State,Keyr)
}
InvSubBytes(State)
InvShiftRows(State)
AddRoundKey(State,Keynr).
STEP-1: Sub Bytes
A nonlinear substitution step where each byte in the state
is replaced by another one by using the Rijndael S-Box.[4].
STEP-2: Shift Row
A transposition step where the last three rows of state are
shifted cyclically.
STEP-3: Mix Column
A mixing operation which operates on the columns of the
state, it combines the four bytes in each column.
STEP-4: Add Round Key
Each byte of the state is combined with a round key, which
is a Different key for each round and derived from NN key
schedule.
For the tenth round step-3 will be omitted.
In Add Round operation, a key generated by neural
network is applied to the state by a simple bitwise XOR.
Hence security for CDA documents in cloud server is
achieved through neural network based AES approach.
4. EXPERIMENTAL RESULTS
The proposed work observed by conducting different
experiments.
Security to the CDA of patients achieved by giving access
only to the authorized user. If an unauthorized user tries
to access the data in CDA it will be appeared in encrypted
format which is not readable for that person.
Fig 1: CDA Generation and Integration system
Fig 1 shows the information provided by the authorized
user such as patient name, provider details, organization
and clinical information details.
Fig2: Patient Data in Encrypted form
5. CONCLUSION
The proposed key generation method reduces the
threats of breaking the symmetric keys by taking artificial
neural networks and from it the overall key will be
generated. This strengthen the security since ANN training
used to obtain the round keys only known by sender and
receiver, Neural cryptography is a division of cryptography
devoted to evaluate the service of stochastic method,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1336
especially neural community algorithms, for use in
encryption and cryptanalysis. Though nevertheless
emerging, this branch of technological know-how gives
safety to records transfer from one gadget to every other.
Neural networks provide greater flexibility in securing
cryptographic passwords as compared to the traditional
techniques.
REFRENCES:
[1] T. Benson, Principles of Health Interoperability HL7
and SNOMED. New York, NY, USA: Spinger, 2009.
[2] S. R. Simon, R. Kaushal, P D. Cleary , C. A. Jenter,
L. A. Volk, E. G. Poon, E. J. Orav, H. G. Lo, D. H. Williams,
and D. W. Bates, “Correlates of electronic health
record adoption in office practices : A statewide
survey,” J. Am. Med.Inform. Assoc., vol. 14, pp. 110–117,
2007.
[3] Fine, T. L. (2006). Feedforward neural network
methodology. Springer Science & Business Media.
[4] K. Ashish, “Meaningful use of electronic health records
the road a head, ”JAMA, vol. 304, no. 10, pp. 1709–1710,
2010
[5]Lee, S. H., Song, J. H., Kim, I. K., & Kim, j. W.(2016).
CDA integration system to support patient referral and
reply letters. Health informatics journal, 22(2), 160-170.
[6]Kim, H. S., Tran, T.,& Cho, H. (2006, September).A CDA
generate Clinical documents within a hospital
information system for e-healthcare services.
In Computer & Information Technology, 2006. CIT'06.
The Sixth IEEE International Conference on(pp. 254-
254). IEEE.
[7] B.lalitha,”Security & QOS cetric protocols for P2P
networks : Current state of the art” vol 2, ISSN:2278-
1323,2013.

More Related Content

What's hot

IRJET - Implementation of Disease Prediction Chatbot and Report Analyzer ...
IRJET -  	  Implementation of Disease Prediction Chatbot and Report Analyzer ...IRJET -  	  Implementation of Disease Prediction Chatbot and Report Analyzer ...
IRJET - Implementation of Disease Prediction Chatbot and Report Analyzer ...IRJET Journal
 
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...IJERA Editor
 
Lvq based person identification system
Lvq based person identification systemLvq based person identification system
Lvq based person identification systemIAEME Publication
 
Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Net...
Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Net...Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Net...
Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Net...IJECEIAES
 
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...An enhanced lossless compression with cryptography hybrid mechanism for ECG b...
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...IJECEIAES
 
Real time ECG Monitoring: A Review
Real time ECG Monitoring: A ReviewReal time ECG Monitoring: A Review
Real time ECG Monitoring: A Reviewijtsrd
 
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOTSecurity and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOTIRJET Journal
 
IRJET - IoT based E-Prognosis System
IRJET - IoT based E-Prognosis SystemIRJET - IoT based E-Prognosis System
IRJET - IoT based E-Prognosis SystemIRJET Journal
 
Secure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care SystemSecure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care SystemIJTET Journal
 
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageIAEME Publication
 
Predicting the Maintenance of Aircraft Engines using LSTM
Predicting the Maintenance of Aircraft Engines using LSTMPredicting the Maintenance of Aircraft Engines using LSTM
Predicting the Maintenance of Aircraft Engines using LSTMijtsrd
 
Computers in medicine (revised) 2 (1)
Computers in medicine (revised) 2 (1)Computers in medicine (revised) 2 (1)
Computers in medicine (revised) 2 (1)Abhijit Mukherji
 
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...IRJET Journal
 
A 128 bit secret key generation using unique ecg bio-signal for medical data ...
A 128 bit secret key generation using unique ecg bio-signal for medical data ...A 128 bit secret key generation using unique ecg bio-signal for medical data ...
A 128 bit secret key generation using unique ecg bio-signal for medical data ...Karthikeyan Ece venkatesan
 
Training feedforward neural network using genetic algorithm to diagnose left ...
Training feedforward neural network using genetic algorithm to diagnose left ...Training feedforward neural network using genetic algorithm to diagnose left ...
Training feedforward neural network using genetic algorithm to diagnose left ...TELKOMNIKA JOURNAL
 
Internet of Things: Low Cost and Wearable SpO2 Device for Health Monitoring
Internet of Things: Low Cost and Wearable SpO2 Device for Health Monitoring Internet of Things: Low Cost and Wearable SpO2 Device for Health Monitoring
Internet of Things: Low Cost and Wearable SpO2 Device for Health Monitoring IJECEIAES
 
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKSECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
 

What's hot (20)

IRJET - Implementation of Disease Prediction Chatbot and Report Analyzer ...
IRJET -  	  Implementation of Disease Prediction Chatbot and Report Analyzer ...IRJET -  	  Implementation of Disease Prediction Chatbot and Report Analyzer ...
IRJET - Implementation of Disease Prediction Chatbot and Report Analyzer ...
 
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...
 
Lvq based person identification system
Lvq based person identification systemLvq based person identification system
Lvq based person identification system
 
Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Net...
Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Net...Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Net...
Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Net...
 
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...An enhanced lossless compression with cryptography hybrid mechanism for ECG b...
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...
 
Real time ECG Monitoring: A Review
Real time ECG Monitoring: A ReviewReal time ECG Monitoring: A Review
Real time ECG Monitoring: A Review
 
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOTSecurity and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
 
IRJET - IoT based E-Prognosis System
IRJET - IoT based E-Prognosis SystemIRJET - IoT based E-Prognosis System
IRJET - IoT based E-Prognosis System
 
28 cej-3201.f
28 cej-3201.f28 cej-3201.f
28 cej-3201.f
 
Secure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care SystemSecure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care System
 
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
 
Predicting the Maintenance of Aircraft Engines using LSTM
Predicting the Maintenance of Aircraft Engines using LSTMPredicting the Maintenance of Aircraft Engines using LSTM
Predicting the Maintenance of Aircraft Engines using LSTM
 
CNC upgradation
CNC upgradationCNC upgradation
CNC upgradation
 
Embedded Patient Monitoring System
Embedded Patient Monitoring SystemEmbedded Patient Monitoring System
Embedded Patient Monitoring System
 
Computers in medicine (revised) 2 (1)
Computers in medicine (revised) 2 (1)Computers in medicine (revised) 2 (1)
Computers in medicine (revised) 2 (1)
 
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
 
A 128 bit secret key generation using unique ecg bio-signal for medical data ...
A 128 bit secret key generation using unique ecg bio-signal for medical data ...A 128 bit secret key generation using unique ecg bio-signal for medical data ...
A 128 bit secret key generation using unique ecg bio-signal for medical data ...
 
Training feedforward neural network using genetic algorithm to diagnose left ...
Training feedforward neural network using genetic algorithm to diagnose left ...Training feedforward neural network using genetic algorithm to diagnose left ...
Training feedforward neural network using genetic algorithm to diagnose left ...
 
Internet of Things: Low Cost and Wearable SpO2 Device for Health Monitoring
Internet of Things: Low Cost and Wearable SpO2 Device for Health Monitoring Internet of Things: Low Cost and Wearable SpO2 Device for Health Monitoring
Internet of Things: Low Cost and Wearable SpO2 Device for Health Monitoring
 
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKSECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
 

Similar to Enhancing the Security for Clinical Document Architecture Generating System using AES Algorithm with Artificial Neural Network

Patient Privacy Control for Health Care in Cloud Computing System
Patient Privacy Control for Health Care in Cloud Computing  SystemPatient Privacy Control for Health Care in Cloud Computing  System
Patient Privacy Control for Health Care in Cloud Computing SystemIRJET Journal
 
Intelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIntelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIRJET Journal
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionIRJET Journal
 
Dr Dennis Kehoe- Connected Health Cities: Using Learning Health Systems
Dr Dennis Kehoe- Connected Health Cities: Using Learning Health SystemsDr Dennis Kehoe- Connected Health Cities: Using Learning Health Systems
Dr Dennis Kehoe- Connected Health Cities: Using Learning Health SystemsInnovation Agency
 
Cloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health RecordsCloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health Recordsijtsrd
 
Mapping CDA Documents for Health Information Exchange from Multiple Hospitals...
Mapping CDA Documents for Health Information Exchange from Multiple Hospitals...Mapping CDA Documents for Health Information Exchange from Multiple Hospitals...
Mapping CDA Documents for Health Information Exchange from Multiple Hospitals...IRJET Journal
 
ELECTRONIC HEALTH RECORD SYSTEM BY ADOPTING BLOCKCHAIN
ELECTRONIC HEALTH RECORD SYSTEM BY ADOPTING BLOCKCHAINELECTRONIC HEALTH RECORD SYSTEM BY ADOPTING BLOCKCHAIN
ELECTRONIC HEALTH RECORD SYSTEM BY ADOPTING BLOCKCHAINIRJET Journal
 
grover2018.pdf
grover2018.pdfgrover2018.pdf
grover2018.pdfwallvedha
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET Journal
 
Review on Medical Reports Extraction and Storage in EHR systems
Review on Medical Reports Extraction and Storage in EHR systemsReview on Medical Reports Extraction and Storage in EHR systems
Review on Medical Reports Extraction and Storage in EHR systemsIRJET Journal
 
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET Journal
 
IRJET- Prediction of Heart Disease using RNN Algorithm
IRJET- Prediction of Heart Disease using RNN AlgorithmIRJET- Prediction of Heart Disease using RNN Algorithm
IRJET- Prediction of Heart Disease using RNN AlgorithmIRJET Journal
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET Journal
 
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...IRJET Journal
 
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATIONCLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATIONijdpsjournal
 
DESIGN AND IMPLEMENTATION OF CARDIAC DISEASE USING NAIVE BAYES TECHNIQUE
DESIGN AND IMPLEMENTATION OF CARDIAC DISEASE USING NAIVE BAYES TECHNIQUEDESIGN AND IMPLEMENTATION OF CARDIAC DISEASE USING NAIVE BAYES TECHNIQUE
DESIGN AND IMPLEMENTATION OF CARDIAC DISEASE USING NAIVE BAYES TECHNIQUEIRJET Journal
 
Electronic Health Records (EHR) storage using blockchain
Electronic Health Records (EHR) storage using blockchainElectronic Health Records (EHR) storage using blockchain
Electronic Health Records (EHR) storage using blockchainIRJET Journal
 

Similar to Enhancing the Security for Clinical Document Architecture Generating System using AES Algorithm with Artificial Neural Network (20)

Patient Privacy Control for Health Care in Cloud Computing System
Patient Privacy Control for Health Care in Cloud Computing  SystemPatient Privacy Control for Health Care in Cloud Computing  System
Patient Privacy Control for Health Care in Cloud Computing System
 
Ibrahem
IbrahemIbrahem
Ibrahem
 
Intelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIntelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosis
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
 
Dr Dennis Kehoe- Connected Health Cities: Using Learning Health Systems
Dr Dennis Kehoe- Connected Health Cities: Using Learning Health SystemsDr Dennis Kehoe- Connected Health Cities: Using Learning Health Systems
Dr Dennis Kehoe- Connected Health Cities: Using Learning Health Systems
 
Cloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health RecordsCloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health Records
 
Mapping CDA Documents for Health Information Exchange from Multiple Hospitals...
Mapping CDA Documents for Health Information Exchange from Multiple Hospitals...Mapping CDA Documents for Health Information Exchange from Multiple Hospitals...
Mapping CDA Documents for Health Information Exchange from Multiple Hospitals...
 
ELECTRONIC HEALTH RECORD SYSTEM BY ADOPTING BLOCKCHAIN
ELECTRONIC HEALTH RECORD SYSTEM BY ADOPTING BLOCKCHAINELECTRONIC HEALTH RECORD SYSTEM BY ADOPTING BLOCKCHAIN
ELECTRONIC HEALTH RECORD SYSTEM BY ADOPTING BLOCKCHAIN
 
grover2018.pdf
grover2018.pdfgrover2018.pdf
grover2018.pdf
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using Encryption
 
Review on Medical Reports Extraction and Storage in EHR systems
Review on Medical Reports Extraction and Storage in EHR systemsReview on Medical Reports Extraction and Storage in EHR systems
Review on Medical Reports Extraction and Storage in EHR systems
 
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
 
IRJET- Prediction of Heart Disease using RNN Algorithm
IRJET- Prediction of Heart Disease using RNN AlgorithmIRJET- Prediction of Heart Disease using RNN Algorithm
IRJET- Prediction of Heart Disease using RNN Algorithm
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
 
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
 
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATIONCLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION
 
DESIGN AND IMPLEMENTATION OF CARDIAC DISEASE USING NAIVE BAYES TECHNIQUE
DESIGN AND IMPLEMENTATION OF CARDIAC DISEASE USING NAIVE BAYES TECHNIQUEDESIGN AND IMPLEMENTATION OF CARDIAC DISEASE USING NAIVE BAYES TECHNIQUE
DESIGN AND IMPLEMENTATION OF CARDIAC DISEASE USING NAIVE BAYES TECHNIQUE
 
Electronic Health Records (EHR) storage using blockchain
Electronic Health Records (EHR) storage using blockchainElectronic Health Records (EHR) storage using blockchain
Electronic Health Records (EHR) storage using blockchain
 
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 

Recently uploaded (20)

🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 

Enhancing the Security for Clinical Document Architecture Generating System using AES Algorithm with Artificial Neural Network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1333 Enhancing the Security for Clinical Document Architecture Generating System using AES Algorithm with Artificial Neural Network 1M.SriLakshmi, 2Dr. B. Lalitha 1M. Tech Student, Department of CSE, JNTUA Engineering College, District Ananthapur, A.P, India 2Assistant Professor, Department of CSE, JNTUA Engineering College, District Ananthapur, A.P, India ---------------------------------------------------------------------------***--------------------------------------------------------------------------- ABSTRACT─ Electronic Health Record helps to improve the safety and satisfactory care of each patient details, which is important to be maintained by the medical institution, with the interoperability of Health Information Exchange (HIE).The CDA generation and integration system in cloud, uses open API to generate CDA files without purchase of proprietary software . Using CDA record integration system integrates multiple CDA documents of patient into a single CDA document. Both physicians and patient can make use of the scientific statistics in chronological order. In this paper, the CDA documents are combine into single record and may be browsed as a readable format. It is simple to examine and recognize for physicians correctly .The proposed work have been analyzed to verify the ability of ANN based key expansion to make the same cipher text as that accomplished by the conventional AES(Advanced Encryption Standard) for the same plain text. This model show the potential of the proposed work to produce the same secure system even with non-identical key expansion technique. However, the use of neural network adds more security to the conventional AES, because the adversary doesn’t know the topology of neural network. Key Words: AES, ANN, Key Expansion, PRNG. 1. INTRODUCTION Electronic Health Record (EHR) is longitudinal series of electronic fitness statistics of patients where health information is stored in the form of records. To access EHR in efficient way between the health information systems(HIS) one should maintain health information exchange(HIE). However, most of the Health information system provider have different characteristics and are together incompatible. Hence, a standardized health information exchange between hospitals needs to be implemented. Especially, medical report standardization lies at the core of guaranteeing interoperability. Health Level Seven(HL7) has established CDA for clinical documents which represents the structure and semantics of ‘clinical documents’ during exchange of documents. HL7 refer to a set of international standards for transfer clinical and administrative data between software applications used by various health care providers. The first version of CDA was introduced in 2001 and the later version came out in 2005. Many nations have adopted CDA for their projects. To establish self-assurance in HIE interoperability, more HIS’s need to assist CDA. However, the structure of CDA may be very complicated and the production of correct CDA report is hard to gain without deep understanding of the CDA standard. In addition, the HIS improvement platforms for hospitals vary so significantly that generation of CDA files in every medical institution continually calls for a separate CDA generation. Also, hospitals are very reluctant to adopt new system unless it is in reality important for provision of care. As an end result, the adoption rate of EHR is very low in some nations like New Zealand or Australia. When the patient is recognized at a medical institution, a CDA file regarding the diagnosis is generated. The CDA report may be shared among different clinics if the patient doesn’t have objection in sharing of his records. The idea of family doctor does no longer exist in Korea, it might common for a patient to go to some other clinics. The change of CDA report is brought on within the following cases: when a physician desires to study a patient’s medical history. While a patient is in emergency and the scientific records wishes to be reviewed. It takes amount of time for the scientific personnel as the quantity of exchanged CDA record will increase due to having more documents allotted in distinct files. This considerably delay the medical personnel in taking decisions. Hence, when all the CDA documents are included into a single record, the clinical employees is empowered to check the patient diagnose history without difficulty in chronological order. Unfortunately integration of multiple CDA files into one, does not exist yet to the best of our knowledge. 2. RELATED WORK Lee, S. H., Song, J. H., Kim, I. K., & Kim, J. W.[5],proposed CDA integration system and CDA integration template for HIES in Korea. As a physician spend limited time per patient in Korea this system will be
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1334 useful for them. Kim, H. S., Tran, T., & Cho, H[6],proposed a next-generation hospital information system (HIS) based on the HL7 clinical document architecture (CDA) including in electronic health record (EHR) and a clinical data repository (CDR) to enable the sharing of medical information among health and medical institutions. The existing system generates CDA based on cloud computing .This CDA generation and integration system works on different platforms as it makes use of an open API by which interoperability can be achieved. To analyze the working of existing system consider two hospitals A and B. In each hospital there will be HIS and CDA generation interface. With the help of this interface hospital A and hospital B will get CDA documents from the CDA generator API present in the cloud. CDA generator API makes use of the template manager[7] to generate Clinical documents in CDA standard[7] .The generated CDA will be validated against the CDA valuator that will give accurate CDA. Now this validated CDA will send back to the hospitals through CDA generation interface. The existing system provides integration of CDA based on cloud computing. Each hospital will contain CDA integration API which is used to send the CDA documents to the cloud where different CDA documents of each patient will be integrated with the help of CDA parser and integrator. This entire process of generation and integration of CDA performed in cloud not able to provide security to the CDA of patients. Hence, a cryptographic technique has been proposed in the present system. Security can be achieved by using AES with Feed forward network[5] in Artificial neural network. 3. PROPOSED WORK AES is an iterated block cipher which takes a key length of 128 bits and it consist of 10 rounds for encrypting the data. In order to face the attacks a key expansion process was developed in AES. To provide more security[7] to the data, a neural network approach for the key expansion process in AES has been proposed in this paper. Artificial neural network is an inspiration from biological nervous system, where millions of artificial neurons will be interconnected to each other in order to transfer data within fraction of seconds as does in human nervous system. The neural network will take 4 words as input and takes initial weights with the help of PRNG ( pseudo random number generator ).This algorithm is for generating a sequence of numbers. The desired output given by neural network present in key schedule. We are comparing the target output denoted by X from training phase, with the output generated by NN denoted by Y, the difference between them is the error and the threshold value is set to 1. Error = X-Y. If the error is less than threshold value then output generated by the NN is considered as desired output. Otherwise we have to adjust the weights till we get error less than the threshold value. Like this keys will be extracted for encrypting and decrypting the data. The entire process is explained in the below fig1. Fig1. Neural network key Expansion for encryption and decryption process. In the training phase of the ANN, the AES algorithm generating the output from specific input the ANN takes the initial key (4 Word) as input and the key (40 Word) of the platform as output then the process will be terminated. The NN used in the training process has topology [4-4-40- 1]. In other words , the neural networks consists of first layer with 4 neurons, second layer with 4 neurons, third layer with 40 neurons and the output layer contains only one neuron. In training phase, a sigmoid activation function which is hyperbolic tangent on each neuron is implemented as given by the equation (1). AES takes the bits in the range of 0 to 255 where as the domain of sigmoid function is -1 to 1. In order to implement a neural network based AES the bits range should be taken from 0 to 1. ∑ 1k.tanh(∑ ∑ kj.tanh( ∑ ∑ ji.tanh(∑ i1.input)))) ----(1)
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1335 sigmoid activation function As AES takes 128 bit key hence the no of rounds will be ten where each round contains four steps. AES operates on a 4 ×4 matrix of bytes, called the state AES Algorithm: AddRoundKey(State,key0) for round=1 to Nr-1 { SubBytes(State,S-Box) ShiftRows(State) MixColumns(State) AddRoundKey(State,Keyr) } SubBytes(State) ShiftRows(State) AddRoundKey(State,Keynr) AddRoundKey(State,Key0) for round=Nr-1 to 1 { InvSubBytes(State,S-Box) InvShiftRows(State) InvMixColumns(State) AddRoundKey(State,Keyr) } InvSubBytes(State) InvShiftRows(State) AddRoundKey(State,Keynr). STEP-1: Sub Bytes A nonlinear substitution step where each byte in the state is replaced by another one by using the Rijndael S-Box.[4]. STEP-2: Shift Row A transposition step where the last three rows of state are shifted cyclically. STEP-3: Mix Column A mixing operation which operates on the columns of the state, it combines the four bytes in each column. STEP-4: Add Round Key Each byte of the state is combined with a round key, which is a Different key for each round and derived from NN key schedule. For the tenth round step-3 will be omitted. In Add Round operation, a key generated by neural network is applied to the state by a simple bitwise XOR. Hence security for CDA documents in cloud server is achieved through neural network based AES approach. 4. EXPERIMENTAL RESULTS The proposed work observed by conducting different experiments. Security to the CDA of patients achieved by giving access only to the authorized user. If an unauthorized user tries to access the data in CDA it will be appeared in encrypted format which is not readable for that person. Fig 1: CDA Generation and Integration system Fig 1 shows the information provided by the authorized user such as patient name, provider details, organization and clinical information details. Fig2: Patient Data in Encrypted form 5. CONCLUSION The proposed key generation method reduces the threats of breaking the symmetric keys by taking artificial neural networks and from it the overall key will be generated. This strengthen the security since ANN training used to obtain the round keys only known by sender and receiver, Neural cryptography is a division of cryptography devoted to evaluate the service of stochastic method,
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1336 especially neural community algorithms, for use in encryption and cryptanalysis. Though nevertheless emerging, this branch of technological know-how gives safety to records transfer from one gadget to every other. Neural networks provide greater flexibility in securing cryptographic passwords as compared to the traditional techniques. REFRENCES: [1] T. Benson, Principles of Health Interoperability HL7 and SNOMED. New York, NY, USA: Spinger, 2009. [2] S. R. Simon, R. Kaushal, P D. Cleary , C. A. Jenter, L. A. Volk, E. G. Poon, E. J. Orav, H. G. Lo, D. H. Williams, and D. W. Bates, “Correlates of electronic health record adoption in office practices : A statewide survey,” J. Am. Med.Inform. Assoc., vol. 14, pp. 110–117, 2007. [3] Fine, T. L. (2006). Feedforward neural network methodology. Springer Science & Business Media. [4] K. Ashish, “Meaningful use of electronic health records the road a head, ”JAMA, vol. 304, no. 10, pp. 1709–1710, 2010 [5]Lee, S. H., Song, J. H., Kim, I. K., & Kim, j. W.(2016). CDA integration system to support patient referral and reply letters. Health informatics journal, 22(2), 160-170. [6]Kim, H. S., Tran, T.,& Cho, H. (2006, September).A CDA generate Clinical documents within a hospital information system for e-healthcare services. In Computer & Information Technology, 2006. CIT'06. The Sixth IEEE International Conference on(pp. 254- 254). IEEE. [7] B.lalitha,”Security & QOS cetric protocols for P2P networks : Current state of the art” vol 2, ISSN:2278- 1323,2013.