SlideShare a Scribd company logo
1 of 21
A BIO CRYPTOGRAPHIC APPROACH FOR IMPROVING THE SECURITY OF ELECTRONIC
HEALTH RECORDS
by
AKINSEYE GEORGE KINGSLEY
&
DAMILOLA ODUBOTE
DEPARTEMENT OF COMPUTER SCIENCE
2009/0869 & 2009/1219
SUPERVISED BY
PROF. D .O ADEWUNMI
&
MR A. OMOTOSHO
SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE,
IN PARTIAL FULFILMENT FOR THE REQUIREMENTS FOR THE AWARD OF THE DEGREE
OF BACHELOR OF TECHNOLOGY (B.TECH) IN COMPUTER SCIENCE.
DECEMBER 2013
INTRODUCTION
EHR(Electronic Health Records) has become too important and can be used by attackers to harm people in
political races or normal people living their day to day lives or even sons look to claim their inheritance.
It is now necessary for Electronic Health Records to be protected and Bio-cryptography is one of the methods
that can be used.
Bio-cryptography Simply means the combination of Biometrics and Cryptography.
Biometrics means using Human signatures or body parts to protect information and serve as a key. Voice
recognition, fingerprint and iris are common examples of biometric techniques.
Cryptography on the other hands means the use of either symmetric or asymmetric keys to protect sensitive
data
After bio-cryptography has been used protect the Electronic Health Record , the Biometric template used, can
now be stored on different platform but preferable Fuzzy Vaults.
STATEMENT OF PROBLEM
Bio-Cryptography as a method of protecting electronic health records is widely adopted worldwide according to
(Brands.2003), (Meingast etal.2006), (Prebakaran, etal.2011) and (Sun, etal. 2011).Bio-cryptographic
methodology helps in key management of Important and sensitive data such as health records which may
contain patients report such as pregnancy report, past medical history, blood test result, mental history,
HIV/AIDS status etc. are often transmitted within industries, offices and companies over protected or
unprotected network every day. This exposes this data to hostile attacks and threats from illegal persons. The
suggestion of this data getting into the incorrect hands cannot be overstated. The research will work using key
management in a cryptographic framework.
AIM
The aim of this study is to develop a bio-cryptographic approach for
improving the security of electronic health records
OBJECTIVES
• To develop a proposed plan for securing Electronic health records
• To protect electronic health records both within one trusted domain of
a hospital or other providers
• To make recommendations based on finding
REVIEW OF RELATED LITERATURE WORKS
YEAR SUMMARY DRAWBACK
Nanadakumar and Jain, 2008 This paper discussed multi
biometric templates security
using fuzzy vault.
Storage of multiple templates is
required for the same user.
Eskander etal, 2011 This paper discusses signature
based fuzzy vaults with boosted
feature selection.
If attacked a signature
verification system, its accuracy
will be meaningless. Enhancing
the Fuzzy vault accuracy have
to be more investigated.
Palacios etal, 2011 This paper discusses biometric
access control for e-Health Records
in pre-hospital Care
The method is not cost effective
and it is not user friendly
METHODOLOGY
• Review of related works.
• Developed the model for bio-cryptography using JAVA, C++,
MATHLAB.
• Gathering Electronic health records from near by hospitals.
• Using an eye scanner to encrypt sensitive electronic health records
• Storage of Biometric data in the fuzzy Vault.
SYSTEM MODELS
Iris
USED A
GENRATED KEY/
PIN
FUZZY VAULT
Organization
EHR
Doctor
FIngerprint
Doctor
FingerPrint
Regenerate
the Keys
BIOMETRIC + KEY
Person Person
CONFIRM IDENTITY
Iris
ENROLLMENT
LOGIN
LOGIN
BIOMETRIC
TEMPLATE
DISCARDED
ENCRYPTION MODEL
BIOMETRICS
FUZZY VAULT
KEY
POLYNOMIAL BINARY
DECRYPTION MODEL
FUZZY
VAULT
BINARY
POLYNOMIAL
IDENTIICATION
COMPLETE
IDENTIFICATION
INCORRECT
STOP
DECRYPT
USE CASE DIAGRAM 1
User
Register
Login
Capture iris
image
register key
Authenticate
user
<uses>
<uses>
<uses>
<uses>
<uses>
USE CASE DIAGRAM 2
PHYSICIAN(S)
PATIENTS
PARAMEDICS
SIGN UP
BIOMETRIC
AUTHENTICATION
GET ACCEESS TO
EHR
EMERGENCY
DATA(car
accident)
ACCESS BASIC
INFORMATION
ORGANAIZATIONS
SYSTEM REQUIREMENTS
Software requirements  Microsoft windows XP or higher
Hardware requirements  Memory: 2 Gigabyte RAM or higher
 Hard disk Space: 1Gigabyte or higher
 Peripherals: Mouse, Keyboard, Monitor
 16bit Video graphics Adaptor (VGA)
 1.5 GHz or higher processor
RESULT
(HOME PAGE)
RESULT CONT.
(Capture Page)
RESULT CONT.
(Captured iris)
RESULT CONT.
(Registration)
RESULT CONT.
(Iris authentication page)
SIGNIFICANCE OF STUDY
• This research is significant because of the importance of electronic health records
and how they are kept worldwide. In our world today anybody with means can
walk in and access the electronic health record of anybody he/she want by bribing
the desk staff or even the hospital doctors without the consent of owner.
Electronic health records can win elections or even destroy lives. Therefore it is
necessary to find a way to protect such sensitive data and bio-cryptography would
be an effective method. If all EHR databases are secured by bio-cryptographic
approaches, the health sector will benefit immensely and would be able to stand
firm in terms of information security.
CONCLUSION
• In conclusion, the need to reform the medical sector by imputing bio-
cryptography into the protection of electronic health records is very
importance. The Medical sector will gain immensely from the
induction of biometrics into the protection of electronic health records
and it will be necessary world-wide.
REFERENCES
H.A. Salman, (2013) Fuzzy Bio-Cryptography Key Generation, Computer Science Department,
and University of Technology, on ACIT'2012 Dec.10-13 ISSN: 1812-0857, 2013.
S. Meenakshi and G. Padmavathi, 2010 Securing Revocable Iris and Retinal Templates using
Combined User and Soft Biometric based Password Hardened Multimodal Fuzzy Vault, 2010.
M.Meingast, T.Roosta, S.Sastry, (2006.) “Security and Privacy Issues with Health Care
Information Technology”, Department of Electrical Engineering and Computer Sciences,
University of California, Berkeley
THANK YOU

More Related Content

Viewers also liked

Reporte de noticia 2
Reporte de noticia 2Reporte de noticia 2
Reporte de noticia 2samy451
 
Design of the Stampede Preventing Monitoring and Early Warning System Based o...
Design of the Stampede Preventing Monitoring and Early Warning System Based o...Design of the Stampede Preventing Monitoring and Early Warning System Based o...
Design of the Stampede Preventing Monitoring and Early Warning System Based o...IJRES Journal
 
Noticia1
Noticia1Noticia1
Noticia1samy451
 
Insurance review of eastern europe 2012
Insurance review of eastern europe 2012Insurance review of eastern europe 2012
Insurance review of eastern europe 2012Serge Brovko
 
Double Page Spread draft
Double Page Spread draftDouble Page Spread draft
Double Page Spread draftMWBECKERMEDIA
 
Novecentismo y vanguardias
Novecentismo y vanguardiasNovecentismo y vanguardias
Novecentismo y vanguardiasjsanzman
 
SteriTouch Co-Branding
SteriTouch Co-BrandingSteriTouch Co-Branding
SteriTouch Co-BrandingDamian Harvey
 
Realismo y Naturalismo
Realismo y NaturalismoRealismo y Naturalismo
Realismo y Naturalismojsanzman
 

Viewers also liked (11)

Reporte de noticia 2
Reporte de noticia 2Reporte de noticia 2
Reporte de noticia 2
 
Design of the Stampede Preventing Monitoring and Early Warning System Based o...
Design of the Stampede Preventing Monitoring and Early Warning System Based o...Design of the Stampede Preventing Monitoring and Early Warning System Based o...
Design of the Stampede Preventing Monitoring and Early Warning System Based o...
 
Noticia1
Noticia1Noticia1
Noticia1
 
charu_wipro
charu_wiprocharu_wipro
charu_wipro
 
Insurance review of eastern europe 2012
Insurance review of eastern europe 2012Insurance review of eastern europe 2012
Insurance review of eastern europe 2012
 
Double Page Spread draft
Double Page Spread draftDouble Page Spread draft
Double Page Spread draft
 
Cover page draft
Cover page draftCover page draft
Cover page draft
 
Novecentismo y vanguardias
Novecentismo y vanguardiasNovecentismo y vanguardias
Novecentismo y vanguardias
 
SteriTouch Co-Branding
SteriTouch Co-BrandingSteriTouch Co-Branding
SteriTouch Co-Branding
 
Level Up Your S.T.E.A.M. Programs
Level Up Your S.T.E.A.M. ProgramsLevel Up Your S.T.E.A.M. Programs
Level Up Your S.T.E.A.M. Programs
 
Realismo y Naturalismo
Realismo y NaturalismoRealismo y Naturalismo
Realismo y Naturalismo
 

Similar to final year defence

Exploiting multimodal biometrics in e privacy scheme for electronic health re...
Exploiting multimodal biometrics in e privacy scheme for electronic health re...Exploiting multimodal biometrics in e privacy scheme for electronic health re...
Exploiting multimodal biometrics in e privacy scheme for electronic health re...Alexander Decker
 
Internet of medical things (IOMT)
Internet of medical things (IOMT)Internet of medical things (IOMT)
Internet of medical things (IOMT)K Raman Sethuraman
 
Identification of newborn abandoned babies, criminals of rape cases & unknown...
Identification of newborn abandoned babies, criminals of rape cases & unknown...Identification of newborn abandoned babies, criminals of rape cases & unknown...
Identification of newborn abandoned babies, criminals of rape cases & unknown...IRJET Journal
 
Transforming Healthcare Industry by Implementing Cloud Computing
Transforming Healthcare Industry by Implementing Cloud ComputingTransforming Healthcare Industry by Implementing Cloud Computing
Transforming Healthcare Industry by Implementing Cloud Computingijtsrd
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTijcisjournal
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTijcisjournal
 
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud ComputingIRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud ComputingIRJET Journal
 
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET Journal
 
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...IRJET Journal
 
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...IRJET Journal
 
IOT-Based Medicine Reminder and Monitoring System for Safe Health
IOT-Based Medicine Reminder and Monitoring System for Safe HealthIOT-Based Medicine Reminder and Monitoring System for Safe Health
IOT-Based Medicine Reminder and Monitoring System for Safe HealthIRJET Journal
 
IoT potential in Asia Healthcare System_i4
IoT potential in Asia Healthcare System_i4IoT potential in Asia Healthcare System_i4
IoT potential in Asia Healthcare System_i4Guna Sekaran
 
Life Technologies' Journey to the Cloud (ENT208) | AWS re:Invent 2013
Life Technologies' Journey to the Cloud (ENT208) | AWS re:Invent 2013Life Technologies' Journey to the Cloud (ENT208) | AWS re:Invent 2013
Life Technologies' Journey to the Cloud (ENT208) | AWS re:Invent 2013Amazon Web Services
 
How Informatics Will Change the Future of Pharmacy
How Informatics Will Change the Future of PharmacyHow Informatics Will Change the Future of Pharmacy
How Informatics Will Change the Future of PharmacyKevin Clauson
 
A literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring SystemA literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring SystemBRNSSPublicationHubI
 
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdfJanuary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 
IoE in Clinical Trials
IoE in Clinical TrialsIoE in Clinical Trials
IoE in Clinical TrialsCRF Health
 

Similar to final year defence (20)

Exploiting multimodal biometrics in e privacy scheme for electronic health re...
Exploiting multimodal biometrics in e privacy scheme for electronic health re...Exploiting multimodal biometrics in e privacy scheme for electronic health re...
Exploiting multimodal biometrics in e privacy scheme for electronic health re...
 
Fast and fire-walled IOT healthcare-Baseer
Fast and fire-walled  IOT healthcare-BaseerFast and fire-walled  IOT healthcare-Baseer
Fast and fire-walled IOT healthcare-Baseer
 
journal papers.pdf
journal papers.pdfjournal papers.pdf
journal papers.pdf
 
Internet of medical things (IOMT)
Internet of medical things (IOMT)Internet of medical things (IOMT)
Internet of medical things (IOMT)
 
Identification of newborn abandoned babies, criminals of rape cases & unknown...
Identification of newborn abandoned babies, criminals of rape cases & unknown...Identification of newborn abandoned babies, criminals of rape cases & unknown...
Identification of newborn abandoned babies, criminals of rape cases & unknown...
 
Transforming Healthcare Industry by Implementing Cloud Computing
Transforming Healthcare Industry by Implementing Cloud ComputingTransforming Healthcare Industry by Implementing Cloud Computing
Transforming Healthcare Industry by Implementing Cloud Computing
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
 
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud ComputingIRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
 
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
 
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
 
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
 
IOT-Based Medicine Reminder and Monitoring System for Safe Health
IOT-Based Medicine Reminder and Monitoring System for Safe HealthIOT-Based Medicine Reminder and Monitoring System for Safe Health
IOT-Based Medicine Reminder and Monitoring System for Safe Health
 
IoT potential in Asia Healthcare System_i4
IoT potential in Asia Healthcare System_i4IoT potential in Asia Healthcare System_i4
IoT potential in Asia Healthcare System_i4
 
Life Technologies' Journey to the Cloud (ENT208) | AWS re:Invent 2013
Life Technologies' Journey to the Cloud (ENT208) | AWS re:Invent 2013Life Technologies' Journey to the Cloud (ENT208) | AWS re:Invent 2013
Life Technologies' Journey to the Cloud (ENT208) | AWS re:Invent 2013
 
How Informatics Will Change the Future of Pharmacy
How Informatics Will Change the Future of PharmacyHow Informatics Will Change the Future of Pharmacy
How Informatics Will Change the Future of Pharmacy
 
A literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring SystemA literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring System
 
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdfJanuary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
IoE in Clinical Trials
IoE in Clinical TrialsIoE in Clinical Trials
IoE in Clinical Trials
 

final year defence

  • 1. A BIO CRYPTOGRAPHIC APPROACH FOR IMPROVING THE SECURITY OF ELECTRONIC HEALTH RECORDS by AKINSEYE GEORGE KINGSLEY & DAMILOLA ODUBOTE DEPARTEMENT OF COMPUTER SCIENCE 2009/0869 & 2009/1219 SUPERVISED BY PROF. D .O ADEWUNMI & MR A. OMOTOSHO SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE, IN PARTIAL FULFILMENT FOR THE REQUIREMENTS FOR THE AWARD OF THE DEGREE OF BACHELOR OF TECHNOLOGY (B.TECH) IN COMPUTER SCIENCE. DECEMBER 2013
  • 2. INTRODUCTION EHR(Electronic Health Records) has become too important and can be used by attackers to harm people in political races or normal people living their day to day lives or even sons look to claim their inheritance. It is now necessary for Electronic Health Records to be protected and Bio-cryptography is one of the methods that can be used. Bio-cryptography Simply means the combination of Biometrics and Cryptography. Biometrics means using Human signatures or body parts to protect information and serve as a key. Voice recognition, fingerprint and iris are common examples of biometric techniques. Cryptography on the other hands means the use of either symmetric or asymmetric keys to protect sensitive data After bio-cryptography has been used protect the Electronic Health Record , the Biometric template used, can now be stored on different platform but preferable Fuzzy Vaults.
  • 3. STATEMENT OF PROBLEM Bio-Cryptography as a method of protecting electronic health records is widely adopted worldwide according to (Brands.2003), (Meingast etal.2006), (Prebakaran, etal.2011) and (Sun, etal. 2011).Bio-cryptographic methodology helps in key management of Important and sensitive data such as health records which may contain patients report such as pregnancy report, past medical history, blood test result, mental history, HIV/AIDS status etc. are often transmitted within industries, offices and companies over protected or unprotected network every day. This exposes this data to hostile attacks and threats from illegal persons. The suggestion of this data getting into the incorrect hands cannot be overstated. The research will work using key management in a cryptographic framework.
  • 4. AIM The aim of this study is to develop a bio-cryptographic approach for improving the security of electronic health records OBJECTIVES • To develop a proposed plan for securing Electronic health records • To protect electronic health records both within one trusted domain of a hospital or other providers • To make recommendations based on finding
  • 5. REVIEW OF RELATED LITERATURE WORKS YEAR SUMMARY DRAWBACK Nanadakumar and Jain, 2008 This paper discussed multi biometric templates security using fuzzy vault. Storage of multiple templates is required for the same user. Eskander etal, 2011 This paper discusses signature based fuzzy vaults with boosted feature selection. If attacked a signature verification system, its accuracy will be meaningless. Enhancing the Fuzzy vault accuracy have to be more investigated. Palacios etal, 2011 This paper discusses biometric access control for e-Health Records in pre-hospital Care The method is not cost effective and it is not user friendly
  • 6. METHODOLOGY • Review of related works. • Developed the model for bio-cryptography using JAVA, C++, MATHLAB. • Gathering Electronic health records from near by hospitals. • Using an eye scanner to encrypt sensitive electronic health records • Storage of Biometric data in the fuzzy Vault.
  • 7. SYSTEM MODELS Iris USED A GENRATED KEY/ PIN FUZZY VAULT Organization EHR Doctor FIngerprint Doctor FingerPrint Regenerate the Keys BIOMETRIC + KEY Person Person CONFIRM IDENTITY Iris ENROLLMENT LOGIN LOGIN BIOMETRIC TEMPLATE DISCARDED
  • 10. USE CASE DIAGRAM 1 User Register Login Capture iris image register key Authenticate user <uses> <uses> <uses> <uses> <uses>
  • 11. USE CASE DIAGRAM 2 PHYSICIAN(S) PATIENTS PARAMEDICS SIGN UP BIOMETRIC AUTHENTICATION GET ACCEESS TO EHR EMERGENCY DATA(car accident) ACCESS BASIC INFORMATION ORGANAIZATIONS
  • 12. SYSTEM REQUIREMENTS Software requirements  Microsoft windows XP or higher Hardware requirements  Memory: 2 Gigabyte RAM or higher  Hard disk Space: 1Gigabyte or higher  Peripherals: Mouse, Keyboard, Monitor  16bit Video graphics Adaptor (VGA)  1.5 GHz or higher processor
  • 18. SIGNIFICANCE OF STUDY • This research is significant because of the importance of electronic health records and how they are kept worldwide. In our world today anybody with means can walk in and access the electronic health record of anybody he/she want by bribing the desk staff or even the hospital doctors without the consent of owner. Electronic health records can win elections or even destroy lives. Therefore it is necessary to find a way to protect such sensitive data and bio-cryptography would be an effective method. If all EHR databases are secured by bio-cryptographic approaches, the health sector will benefit immensely and would be able to stand firm in terms of information security.
  • 19. CONCLUSION • In conclusion, the need to reform the medical sector by imputing bio- cryptography into the protection of electronic health records is very importance. The Medical sector will gain immensely from the induction of biometrics into the protection of electronic health records and it will be necessary world-wide.
  • 20. REFERENCES H.A. Salman, (2013) Fuzzy Bio-Cryptography Key Generation, Computer Science Department, and University of Technology, on ACIT'2012 Dec.10-13 ISSN: 1812-0857, 2013. S. Meenakshi and G. Padmavathi, 2010 Securing Revocable Iris and Retinal Templates using Combined User and Soft Biometric based Password Hardened Multimodal Fuzzy Vault, 2010. M.Meingast, T.Roosta, S.Sastry, (2006.) “Security and Privacy Issues with Health Care Information Technology”, Department of Electrical Engineering and Computer Sciences, University of California, Berkeley