1. A BIO CRYPTOGRAPHIC APPROACH FOR IMPROVING THE SECURITY OF ELECTRONIC
HEALTH RECORDS
by
AKINSEYE GEORGE KINGSLEY
&
DAMILOLA ODUBOTE
DEPARTEMENT OF COMPUTER SCIENCE
2009/0869 & 2009/1219
SUPERVISED BY
PROF. D .O ADEWUNMI
&
MR A. OMOTOSHO
SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE,
IN PARTIAL FULFILMENT FOR THE REQUIREMENTS FOR THE AWARD OF THE DEGREE
OF BACHELOR OF TECHNOLOGY (B.TECH) IN COMPUTER SCIENCE.
DECEMBER 2013
2. INTRODUCTION
EHR(Electronic Health Records) has become too important and can be used by attackers to harm people in
political races or normal people living their day to day lives or even sons look to claim their inheritance.
It is now necessary for Electronic Health Records to be protected and Bio-cryptography is one of the methods
that can be used.
Bio-cryptography Simply means the combination of Biometrics and Cryptography.
Biometrics means using Human signatures or body parts to protect information and serve as a key. Voice
recognition, fingerprint and iris are common examples of biometric techniques.
Cryptography on the other hands means the use of either symmetric or asymmetric keys to protect sensitive
data
After bio-cryptography has been used protect the Electronic Health Record , the Biometric template used, can
now be stored on different platform but preferable Fuzzy Vaults.
3. STATEMENT OF PROBLEM
Bio-Cryptography as a method of protecting electronic health records is widely adopted worldwide according to
(Brands.2003), (Meingast etal.2006), (Prebakaran, etal.2011) and (Sun, etal. 2011).Bio-cryptographic
methodology helps in key management of Important and sensitive data such as health records which may
contain patients report such as pregnancy report, past medical history, blood test result, mental history,
HIV/AIDS status etc. are often transmitted within industries, offices and companies over protected or
unprotected network every day. This exposes this data to hostile attacks and threats from illegal persons. The
suggestion of this data getting into the incorrect hands cannot be overstated. The research will work using key
management in a cryptographic framework.
4. AIM
The aim of this study is to develop a bio-cryptographic approach for
improving the security of electronic health records
OBJECTIVES
• To develop a proposed plan for securing Electronic health records
• To protect electronic health records both within one trusted domain of
a hospital or other providers
• To make recommendations based on finding
5. REVIEW OF RELATED LITERATURE WORKS
YEAR SUMMARY DRAWBACK
Nanadakumar and Jain, 2008 This paper discussed multi
biometric templates security
using fuzzy vault.
Storage of multiple templates is
required for the same user.
Eskander etal, 2011 This paper discusses signature
based fuzzy vaults with boosted
feature selection.
If attacked a signature
verification system, its accuracy
will be meaningless. Enhancing
the Fuzzy vault accuracy have
to be more investigated.
Palacios etal, 2011 This paper discusses biometric
access control for e-Health Records
in pre-hospital Care
The method is not cost effective
and it is not user friendly
6. METHODOLOGY
• Review of related works.
• Developed the model for bio-cryptography using JAVA, C++,
MATHLAB.
• Gathering Electronic health records from near by hospitals.
• Using an eye scanner to encrypt sensitive electronic health records
• Storage of Biometric data in the fuzzy Vault.
7. SYSTEM MODELS
Iris
USED A
GENRATED KEY/
PIN
FUZZY VAULT
Organization
EHR
Doctor
FIngerprint
Doctor
FingerPrint
Regenerate
the Keys
BIOMETRIC + KEY
Person Person
CONFIRM IDENTITY
Iris
ENROLLMENT
LOGIN
LOGIN
BIOMETRIC
TEMPLATE
DISCARDED
10. USE CASE DIAGRAM 1
User
Register
Login
Capture iris
image
register key
Authenticate
user
<uses>
<uses>
<uses>
<uses>
<uses>
11. USE CASE DIAGRAM 2
PHYSICIAN(S)
PATIENTS
PARAMEDICS
SIGN UP
BIOMETRIC
AUTHENTICATION
GET ACCEESS TO
EHR
EMERGENCY
DATA(car
accident)
ACCESS BASIC
INFORMATION
ORGANAIZATIONS
12. SYSTEM REQUIREMENTS
Software requirements Microsoft windows XP or higher
Hardware requirements Memory: 2 Gigabyte RAM or higher
Hard disk Space: 1Gigabyte or higher
Peripherals: Mouse, Keyboard, Monitor
16bit Video graphics Adaptor (VGA)
1.5 GHz or higher processor
18. SIGNIFICANCE OF STUDY
• This research is significant because of the importance of electronic health records
and how they are kept worldwide. In our world today anybody with means can
walk in and access the electronic health record of anybody he/she want by bribing
the desk staff or even the hospital doctors without the consent of owner.
Electronic health records can win elections or even destroy lives. Therefore it is
necessary to find a way to protect such sensitive data and bio-cryptography would
be an effective method. If all EHR databases are secured by bio-cryptographic
approaches, the health sector will benefit immensely and would be able to stand
firm in terms of information security.
19. CONCLUSION
• In conclusion, the need to reform the medical sector by imputing bio-
cryptography into the protection of electronic health records is very
importance. The Medical sector will gain immensely from the
induction of biometrics into the protection of electronic health records
and it will be necessary world-wide.
20. REFERENCES
H.A. Salman, (2013) Fuzzy Bio-Cryptography Key Generation, Computer Science Department,
and University of Technology, on ACIT'2012 Dec.10-13 ISSN: 1812-0857, 2013.
S. Meenakshi and G. Padmavathi, 2010 Securing Revocable Iris and Retinal Templates using
Combined User and Soft Biometric based Password Hardened Multimodal Fuzzy Vault, 2010.
M.Meingast, T.Roosta, S.Sastry, (2006.) “Security and Privacy Issues with Health Care
Information Technology”, Department of Electrical Engineering and Computer Sciences,
University of California, Berkeley