SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1683
Hiding Sensitive Medical Data Using Encryption
Mayur Lagad1, Akhilesh Chaudhari2
1Information Technology Department, PDEA’s COEM, Pune, Maharashtra, India
2Information Technology Department, PDEA’s COEM, Pune, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Healthcare applications are considered as
promising fields for wireless networks, where patients can be
monitored using wireless medical networks (WMNs). Current
WMN healthcare research trends focus on patient reliable
communication, patient mobility,andenergy-efficientrouting,
as a few examples. However, deploying new technologies in
healthcare applications without considering security makes
patient privacy vulnerable. Moreover, the physiological dataof
an individual is highly sensitive. The main contribution of this
paper is to distribute patient’s data securely in multiple data
servers and performing the Paillier cryptosystems to perform
statistical analysis on the patient data without affecting the
patient’s privacy.
Key Words – Categories and Subject Descriptors:
*C.2.1[Computer-Communication Networks]: Network
Architecture and Design—Wireless communication;
*J.3 [Life andMedical Sciences]:MedicalInformation Systems
General Terms:
*Wireless medical network, patient data privacy, Paillier
encryption.
1.INTRODUCTION
A wireless network is a network to monitor physical or
environmental conditions such as temperature, sound,
pressure, etc. The development of wireless networks was
motivated by air pollution monitoring, water quality
monitoring, water quality monitoring, land side detection,
forest fire detection habitat monitoring and so on. Though
there are many applications in wireless network domain,
human healthcare applications takes the major role. In
human healthcare, are used to monitor the patients’ health
status such as temperature level, sugar level, heart beat rate,
blood pressure. For instance, if the patient’s sugar level is
monitored 10 times per day then the data is updated in the
database which is present in the local server. Likewise the
values for blood pressure, heart beat, and temperature are
also noted at regular intervals.Therearemanysecurityissues
such as data stealing, stealingandupdating,storingthe wrong
values. Suppose if the intruder is trying to hack the patient
details, there are many chances for the misuse of data which
may lead to severe consequences. The data can also be
modified by the hackers due to lack of security.Thetreatment
prescribed by the doctors can behackedwhichmay evenlead
to death of the patients. Patients are the victims because of
the above issues. To prevent these issues, the intrusion
detection system is proposed. An intrusion detection system
is a system used to check the malicious activities and
produces electronic reports to a management station. It
consists of Paillier algorithm key cryptosystems. The
algorithm is used to encrypt the patient details beforestoring
it in the database and perform decryption when needed by
the physician.
1.1 Related Work:
For real-world implementation, wireless networks and
healthcare networks may employ different topologies, while
the trusted IDS principles are still the same. Therefore, this
section introduces existing approaches on how to establish
trust management for wireless networks and distributed IDS
networks.
Intrusion detection systems (IDSs): These systems are
usually deployed to identify any behavioral anomalies or
policy violations through monitoring the protected networks
and systems. Typically, an IDS can be classified into two
categories: signature-based IDS and anomaly-based IDS. The
former detects attacks by matching network or system events
with available signatures. A signature (or rule) is a kind of
descriptions of a known attack or exploit, which determines
the detection capability in real-world applications (i.e., its
detection accuracy would not be better than its available
signatures). The latter first builds a profile for typical activities
on the target computer and network, and then identifies
potential anomalies if the deviation between the monitored
events and the normal profile exceeds a predefined threshold.
Alarms will be generated if anomalies are discovered. To
improve the detection performance, distributed and
collaborative IDSs are often applied in real-world
environments.
Trust management for wireless networks: The notion of
trust in computer science derives mainly from the field of
social science, aiming to predict and judge the situationsofan
object. In literature, many trust-based approaches with
intrusion detection technology have been developed and
studied.
Trust management for distributed IDS networks: To
enhance the detection performanceofa singleIDS,distributed
or collaborative IDS networks have been widely developed
through enabling the information collection and exchange
among a set of IDS nodes.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1684
1.2 Architecture:
Like most of healthcare applications with wireless medical
network, our architecture has four systems as follows:
 A patient database system which stores the patient
data from medical and provides querying services
to users (e.g., physicians and medical
professionals);
 A patient data access control system which is used
by the user (e.g., physician) to access the patient
data and monitor the patient;
 A patient data analysis system which is used by the
user (e.g., medical researcher) to query the patient
database system and analyze the patient data
statistically.
WMNs deployed at a large scale in a distributed manner, and
their data rates differs based on their applications, wherethe
Wireless Medical Networks have direct human involvement
are deployed on a small scalemustsupportmobility(apatient
can carry the devices), and WMNs requires high data rates
with reliable communication. Physiological conditions of
patients are closely monitored by deploying Wireless medical
motes. These medical are used to sense the patient’s vital
body parameters and transmit the sensed data in a timely
fashion to someremotelocationwithouthumaninvolvement.
Using these medical readings the doctor can get the details of
a patient’s health status. The patient’s vital body parameters
include heart beats, body temperature, blood pressure, sugar
level, pulse rate.
WMNs carry the quality of care across wide variety of
healthcare applications. In addition, other applications that
also benefit from WMNs include sports-person health status
monitoring and patients self-care. Several research groups
and projects have started to develop health monitoring using
wireless networks. Wireless Medical healthcare application
offers a number of challenges, like, reliable transmission of
data, secured data transmission, nodes mobility, detection of
event delivery of data in time, power management, etc.
Deploying new technologies in healthcare applications
without considering security often makes patient privacy
vulnerable. For instance, the patient’s physiological vital
signals are very sensitive so the leakage of the patient’s
diseased data could makes the patient embarrassed.
Sometimes revealing disease information can make it
impossible for them to obtain insurance protection and also
result in a person losing their job.
To prevent the patient data from the inside attacks, we
propose a new data collection protocol, where a splits the
sensitive patient data into three components according to a
random number generator based on hash functionandsends
them to three servers, respective, via secure channels.
To keep the privacy of the patient data in data access, we
propose a new data access protocol on the basis of the
Paillier cryptosystem. The protocol allows the user (e.g.
physician) to access the patient data without revealing it to
any data server.
To preserve the privacy of the patient data in statistical
analysis, we propose somenewprivacy-preservingstatistical
analysis protocol on the basis of the Paillier cryptosystems.
These protocols allow the user (e.g., medical researcher) to
perform statistical analysis on the patient data without
compromising the patient data privacy.
2. DATA MODEL & DESCRIPTION
Privacy is the major design constraint in the health care
application for providing security to patient’s sensitive data
from hacker. Our system usesJava as a front end with Apache
web server/ Apache Tomcat/ IIS as the webserver. And
MySQL as the back end of the system.
2.1 Mathematical Model:
Let W be the whole system which consists:
W= {IP, PRO, OP}
Where,
IP is the input of the system.
A) IP= {P, SD, SN, PD, U}
P is the number of patients in the system.
SN is the set of number of sensing nodes in the system.
SD is the sensing data sensed from the medical SD.
PD is the patient’s database system which consistsof number
of databases.
U is the set of number of user in the systems that are
accessing the data from patient’s database server.
B) PRO is the procedure of our proposed system:
Step 1: At first the wirelessmedical network whichsenses the
patient’s body and transmits the patient data to a patient
database system.
Step 2: A patient database system which stores the patient
data from medical and provides querying services to users
(e.g., physicians and medical professionals).
Step 3: A patient data access control system which is used by
the user (e.g., physician) to access the patient data and
monitor the patient.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1685
Step 4: A patient data analysis system which is used by the
user (e.g., medical researcher) to query the patient database
system and analyze the patient data statistically.
OP is the output of the system:
The system provides the privacy to the patient’s sensibledata
available on the patient’s database system in the sense of
inside attacks.
2.2 Algorithms:
A) Paillier Public-Key Cryptosystem:
It is composed of key generation, encryption and decryption
algorithms as follows.
1)Key generation –
The key generation algorithm works as follows.
 Choose two large prime numbers p and q randomly
and independently of each other such that;
gcd(pq,(p− 1)(q− 1))= 1
 Compute
N= pq,λ= lcm(p− 1,q− 1)
Where lcm stands for the “least common multiple”.
 Select random integer g where g ∈ZN2
¿
and ensure
N divides the order of g by checking the existence of
the following modular multiplicative inverse:
μ= (L(gλ
(modN2
)))
−1
(modN)
where function L is defined as;
L(u)=
u− 1
N
Note that the notation a/b does not denote the modular
multiplication of a times the modularmultiplicativeinverseof
b but rather the quotient of a divided by b.
The public (encryption) key pk is (N,g).
The private (decryption) key sk is (λ,µ).
If using p,q of equivalent length, one can simply choose;
g= N+1,λ= φ(N)− 1
(modN)
where N = pq andφ(N)= (P− 1)(q− 1)
2)Encryption:
The encryption algorithm works as follows.
 Let m be a message to encrypt, where m ∈ZN
 Select random r where r ∈ZN
¿
 Compute cipher text as:
C= gm
.rN
(modN2
)
3)Decryption:
The decryption algorithm works as follows.
 Let c be the cipher text to decrypt, where the cipher text;
c ∈ ZN2
¿
.
 Compute the plain text message as:
m= (cλ
(modN2
)).μ(modN)
4)Homomorphic Properties:
A notable feature of the Paillier cryptosystem is its
homomorphic properties. Given two cipher texts;
E(m1,pk)= g
m1
r1
N
(modN
2
)
E(m2,pk)= g
m2
r2
N
(modN
2
)
where r1,r2 are randomly chosen forZN
¿
,we have
the following homomorphic properties –
D(E(m1 ,pk1).E(m2 ,pk2))= m1+m2(modN)
The product of a cipher text with a plain text raising g will
decrypt to the sum of the corresponding plain texts;
D(E(m1,pk1).gm2
)= m1+m2(modN)
An encrypted plain text raised to a constant k will decrypt to
the product of the plain text and the constant;
D(E(m1 ,pk1)k
)= km1(modN)
2.3 Major Constraints:
The patient data may be decimal numbers with several digits
after the point. In this case, the information should convertit
to an integer and sends the shares of the data together with
the unit of the data to three data servers, respectively.
2.4 Functional Model and Description:
Patient: The patient sensitive data is stored in multiple
servers by using some new crypto systems protocols.
System: The system will protects the patients data from
hacker while data transmission by administrator.
2.5 Data Design:
A description of all data structures including internal, global,
and temporary data structures, database design (tables), file
formats.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1686
A. Internal software data structure –
When SQL returns the results of the query sent to it by user,
the results of the query will be passed back to user using the
built in data structures.
B. Global data structure –
We are not using any global data structure.
C. Temporary data structure –
We will be using a cookie saved on the user’s machine to
temporarily store the user’s query entry. This is so the user
can go back to the query page and easily modify their last
query to refine or widen their search as needed.
D. Database description –
MySQL: MySQL, the most popular Open Source SQL database
management system, isdeveloped, distributed,andsupported
by Oracle Corporation. The MySQL Web site
(http://www.mysql.com/) provides the latest information
about MySQL software.
MySQL is a database management system. A database is a
structured collection of data. It may be anythingfromasimple
shopping list to a picture gallery or the vast amounts of
information in a corporate network. To add, access, and
process data stored in a computer database, you need a
database management system such as MySQL Server. Since
computers are very good at handling large amounts of data,
database management systems play a central role in
computing, as standalone utilities, or as parts of other
applications.
REFERENCES
[1] Yi, Xun, et al. ”Privacy Protection for Wireless Medical
Sensor Data.” IEEE Transactions on Dependable and
Secure Computing 13.3 (2016): 369-380.
[2] X. Yi, J. Willemson, F. Nat-Abdesselam.Privacy-Preserving
Wireless Medical Sensor Net-work.InProc.TrustCom13,
pages 118-125, 2013.
[3] D. He, S. Chan and S. Tang. A Novel and Lightweight
System to Secure Wireless Medical Sensor Networks.
IEEE Journal of Biomedical and Health Informatics, 18
(1): 316-326, 2014.
[4] Y. M. Huang, M. Y. Hsieh, H. C. Hung, J. H. Park. Pervasive,
Secure Access to a Hierarchi-cal Sensor-Based
Healthcare Monitoring Architecture in Wireless
Heterogeneous Networks. IEEE J. Select. AreasCommun.
27: 400-411, 2009.
[5] K. Malasri, L. Wang. Design andImplementationofSecure
Wireless Mote-Based Medical Sensor Network. Sensors
9: 6273-6297, 2009.
[6] P. Belsis and G. Pantziou. A k-anonymity privacy-
preserving approach in wireless medical monitoring
environments. Journal Personal and Ubiquitous
Computing, 18(1): 61-74, 2014.
[7] T. ElGamal. A Public-Key Cryptosystem and a Signature
Scheme Based on Discrete Loga-rithms. IEEE
Transactions on Information Theory, 31 (4): 469-472,
1985.
[8] P. Paillier. Public-keyCryptosystemsBasedonComposite
Degree Residuosity Classes. In Proc. EUROCRYPT99,
pages 223-238, 1999.
BIOGRAPHIES
Mr. Mayur Lagad
(BE Information Technology
2019)
PDEA’S College of Engineering,
Manjari(Bk) Pune – 412307
Mr. Akhilesh Chaudhari
(BE Information Technology
2019)
PDEA’S College of Engineering,
Manjari(Bk) Pune - 412307

More Related Content

What's hot

IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET Journal
 
Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...
arpublication
 
Designing an Architecture for Monitoring Patients at Home: Ontologies and We...
Designing an Architecture  for Monitoring Patients at Home: Ontologies and We...Designing an Architecture  for Monitoring Patients at Home: Ontologies and We...
Designing an Architecture for Monitoring Patients at Home: Ontologies and We...
IRJET Journal
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care management
mohamedmoosa2
 
IRJET - Review on Classi?cation and Prediction of Dengue and Malaria Dise...
IRJET -  	  Review on Classi?cation and Prediction of Dengue and Malaria Dise...IRJET -  	  Review on Classi?cation and Prediction of Dengue and Malaria Dise...
IRJET - Review on Classi?cation and Prediction of Dengue and Malaria Dise...
IRJET Journal
 
Design of Self-Learning System for Diagnosing Health Parameters using ANFIS
Design of Self-Learning System for Diagnosing Health Parameters using ANFISDesign of Self-Learning System for Diagnosing Health Parameters using ANFIS
Design of Self-Learning System for Diagnosing Health Parameters using ANFIS
IRJET Journal
 
Ijcet 06 06_004
Ijcet 06 06_004Ijcet 06 06_004
Ijcet 06 06_004
IAEME Publication
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
IRJET Journal
 
Patient Privacy Control for Health Care in Cloud Computing System
Patient Privacy Control for Health Care in Cloud Computing  SystemPatient Privacy Control for Health Care in Cloud Computing  System
Patient Privacy Control for Health Care in Cloud Computing System
IRJET Journal
 
IRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET- EMR using RFID Technology
IRJET- EMR using RFID Technology
IRJET Journal
 
IRJET- Smart ICU using IoT
IRJET- Smart ICU using IoTIRJET- Smart ICU using IoT
IRJET- Smart ICU using IoT
IRJET Journal
 
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicineconnected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
Alessandro Sappia
 
IRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET- Android base Healthcare Monitoring and Management System using IoTIRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET Journal
 
Private Hidden Data for Health Care
Private Hidden Data for Health CarePrivate Hidden Data for Health Care
Private Hidden Data for Health Care
IRJET Journal
 
IRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET- Health Monitoring System using IoT using Arduino Uno MicrocontrollerIRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET Journal
 
Medical applications using io t
Medical applications using io tMedical applications using io t
Medical applications using io t
KPR INSTITUE OF ENGINEERING AND TECHNOLOGY
 
Internet of things & healthcare
Internet of things & healthcareInternet of things & healthcare
Internet of things & healthcare
khalidhassan105
 
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoTIntegration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
zaman174
 
IRJET- IoT based Patient Health Monitoring using ESP8266
IRJET-  	  IoT based Patient Health Monitoring using ESP8266IRJET-  	  IoT based Patient Health Monitoring using ESP8266
IRJET- IoT based Patient Health Monitoring using ESP8266
IRJET Journal
 

What's hot (19)

IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
 
Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...
 
Designing an Architecture for Monitoring Patients at Home: Ontologies and We...
Designing an Architecture  for Monitoring Patients at Home: Ontologies and We...Designing an Architecture  for Monitoring Patients at Home: Ontologies and We...
Designing an Architecture for Monitoring Patients at Home: Ontologies and We...
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care management
 
IRJET - Review on Classi?cation and Prediction of Dengue and Malaria Dise...
IRJET -  	  Review on Classi?cation and Prediction of Dengue and Malaria Dise...IRJET -  	  Review on Classi?cation and Prediction of Dengue and Malaria Dise...
IRJET - Review on Classi?cation and Prediction of Dengue and Malaria Dise...
 
Design of Self-Learning System for Diagnosing Health Parameters using ANFIS
Design of Self-Learning System for Diagnosing Health Parameters using ANFISDesign of Self-Learning System for Diagnosing Health Parameters using ANFIS
Design of Self-Learning System for Diagnosing Health Parameters using ANFIS
 
Ijcet 06 06_004
Ijcet 06 06_004Ijcet 06 06_004
Ijcet 06 06_004
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
Patient Privacy Control for Health Care in Cloud Computing System
Patient Privacy Control for Health Care in Cloud Computing  SystemPatient Privacy Control for Health Care in Cloud Computing  System
Patient Privacy Control for Health Care in Cloud Computing System
 
IRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET- EMR using RFID Technology
IRJET- EMR using RFID Technology
 
IRJET- Smart ICU using IoT
IRJET- Smart ICU using IoTIRJET- Smart ICU using IoT
IRJET- Smart ICU using IoT
 
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicineconnected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
 
IRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET- Android base Healthcare Monitoring and Management System using IoTIRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET- Android base Healthcare Monitoring and Management System using IoT
 
Private Hidden Data for Health Care
Private Hidden Data for Health CarePrivate Hidden Data for Health Care
Private Hidden Data for Health Care
 
IRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET- Health Monitoring System using IoT using Arduino Uno MicrocontrollerIRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
 
Medical applications using io t
Medical applications using io tMedical applications using io t
Medical applications using io t
 
Internet of things & healthcare
Internet of things & healthcareInternet of things & healthcare
Internet of things & healthcare
 
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoTIntegration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
 
IRJET- IoT based Patient Health Monitoring using ESP8266
IRJET-  	  IoT based Patient Health Monitoring using ESP8266IRJET-  	  IoT based Patient Health Monitoring using ESP8266
IRJET- IoT based Patient Health Monitoring using ESP8266
 

Similar to IRJET- Hiding Sensitive Medical Data using Encryption

A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
IRJET Journal
 
IRJET - IoT based Health Monitoring System and Telemedicine
IRJET - IoT based Health Monitoring System and TelemedicineIRJET - IoT based Health Monitoring System and Telemedicine
IRJET - IoT based Health Monitoring System and Telemedicine
IRJET Journal
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET Journal
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
IRJET Journal
 
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
IRJET Journal
 
ealth Monitoring System in Emergency Using IoT: A Review
ealth Monitoring System in Emergency Using IoT: A Reviewealth Monitoring System in Emergency Using IoT: A Review
ealth Monitoring System in Emergency Using IoT: A Review
IRJET Journal
 
Secret key generation
Secret key generationSecret key generation
Secret key generation
Karthikeyan Ece venkatesan
 
IRJET- Patient Health Monitoring using IoT with Machine Learning
IRJET- Patient Health Monitoring using IoT with Machine LearningIRJET- Patient Health Monitoring using IoT with Machine Learning
IRJET- Patient Health Monitoring using IoT with Machine Learning
IRJET Journal
 
journal papers.pdf
journal papers.pdfjournal papers.pdf
journal papers.pdf
KSAravindSrivastava
 
IoT Based Patient Monitoring System
IoT Based Patient Monitoring SystemIoT Based Patient Monitoring System
IoT Based Patient Monitoring System
IRJET Journal
 
Patient Health Monitoring System using IOT
Patient Health Monitoring System using IOTPatient Health Monitoring System using IOT
Patient Health Monitoring System using IOT
IRJET Journal
 
Dynamic Medical Machine
Dynamic Medical MachineDynamic Medical Machine
Dynamic Medical Machine
IRJET Journal
 
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoTIRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET Journal
 
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET Journal
 
security and privacy for medical implantable devices
security and privacy for medical implantable devicessecurity and privacy for medical implantable devices
security and privacy for medical implantable devicesAjay Ohri
 
IRJET- A Framework for Disease Risk Prediction
IRJET- A Framework for Disease Risk PredictionIRJET- A Framework for Disease Risk Prediction
IRJET- A Framework for Disease Risk Prediction
IRJET Journal
 
IRJET - IoT based E-Prognosis System
IRJET - IoT based E-Prognosis SystemIRJET - IoT based E-Prognosis System
IRJET - IoT based E-Prognosis System
IRJET Journal
 
IRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoTIRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoT
IRJET Journal
 
Private & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptxPrivate & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptx
Komal526846
 
IRJET-Cloud Based Patient Referral System
IRJET-Cloud Based Patient Referral SystemIRJET-Cloud Based Patient Referral System
IRJET-Cloud Based Patient Referral System
IRJET Journal
 

Similar to IRJET- Hiding Sensitive Medical Data using Encryption (20)

A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
 
IRJET - IoT based Health Monitoring System and Telemedicine
IRJET - IoT based Health Monitoring System and TelemedicineIRJET - IoT based Health Monitoring System and Telemedicine
IRJET - IoT based Health Monitoring System and Telemedicine
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
 
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
 
ealth Monitoring System in Emergency Using IoT: A Review
ealth Monitoring System in Emergency Using IoT: A Reviewealth Monitoring System in Emergency Using IoT: A Review
ealth Monitoring System in Emergency Using IoT: A Review
 
Secret key generation
Secret key generationSecret key generation
Secret key generation
 
IRJET- Patient Health Monitoring using IoT with Machine Learning
IRJET- Patient Health Monitoring using IoT with Machine LearningIRJET- Patient Health Monitoring using IoT with Machine Learning
IRJET- Patient Health Monitoring using IoT with Machine Learning
 
journal papers.pdf
journal papers.pdfjournal papers.pdf
journal papers.pdf
 
IoT Based Patient Monitoring System
IoT Based Patient Monitoring SystemIoT Based Patient Monitoring System
IoT Based Patient Monitoring System
 
Patient Health Monitoring System using IOT
Patient Health Monitoring System using IOTPatient Health Monitoring System using IOT
Patient Health Monitoring System using IOT
 
Dynamic Medical Machine
Dynamic Medical MachineDynamic Medical Machine
Dynamic Medical Machine
 
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoTIRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
 
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
 
security and privacy for medical implantable devices
security and privacy for medical implantable devicessecurity and privacy for medical implantable devices
security and privacy for medical implantable devices
 
IRJET- A Framework for Disease Risk Prediction
IRJET- A Framework for Disease Risk PredictionIRJET- A Framework for Disease Risk Prediction
IRJET- A Framework for Disease Risk Prediction
 
IRJET - IoT based E-Prognosis System
IRJET - IoT based E-Prognosis SystemIRJET - IoT based E-Prognosis System
IRJET - IoT based E-Prognosis System
 
IRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoTIRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoT
 
Private & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptxPrivate & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptx
 
IRJET-Cloud Based Patient Referral System
IRJET-Cloud Based Patient Referral SystemIRJET-Cloud Based Patient Referral System
IRJET-Cloud Based Patient Referral System
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
nikitacareer3
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
RicletoEspinosa1
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Self-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptxSelf-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptx
iemerc2024
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 

Recently uploaded (20)

Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Self-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptxSelf-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptx
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 

IRJET- Hiding Sensitive Medical Data using Encryption

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1683 Hiding Sensitive Medical Data Using Encryption Mayur Lagad1, Akhilesh Chaudhari2 1Information Technology Department, PDEA’s COEM, Pune, Maharashtra, India 2Information Technology Department, PDEA’s COEM, Pune, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Healthcare applications are considered as promising fields for wireless networks, where patients can be monitored using wireless medical networks (WMNs). Current WMN healthcare research trends focus on patient reliable communication, patient mobility,andenergy-efficientrouting, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological dataof an individual is highly sensitive. The main contribution of this paper is to distribute patient’s data securely in multiple data servers and performing the Paillier cryptosystems to perform statistical analysis on the patient data without affecting the patient’s privacy. Key Words – Categories and Subject Descriptors: *C.2.1[Computer-Communication Networks]: Network Architecture and Design—Wireless communication; *J.3 [Life andMedical Sciences]:MedicalInformation Systems General Terms: *Wireless medical network, patient data privacy, Paillier encryption. 1.INTRODUCTION A wireless network is a network to monitor physical or environmental conditions such as temperature, sound, pressure, etc. The development of wireless networks was motivated by air pollution monitoring, water quality monitoring, water quality monitoring, land side detection, forest fire detection habitat monitoring and so on. Though there are many applications in wireless network domain, human healthcare applications takes the major role. In human healthcare, are used to monitor the patients’ health status such as temperature level, sugar level, heart beat rate, blood pressure. For instance, if the patient’s sugar level is monitored 10 times per day then the data is updated in the database which is present in the local server. Likewise the values for blood pressure, heart beat, and temperature are also noted at regular intervals.Therearemanysecurityissues such as data stealing, stealingandupdating,storingthe wrong values. Suppose if the intruder is trying to hack the patient details, there are many chances for the misuse of data which may lead to severe consequences. The data can also be modified by the hackers due to lack of security.Thetreatment prescribed by the doctors can behackedwhichmay evenlead to death of the patients. Patients are the victims because of the above issues. To prevent these issues, the intrusion detection system is proposed. An intrusion detection system is a system used to check the malicious activities and produces electronic reports to a management station. It consists of Paillier algorithm key cryptosystems. The algorithm is used to encrypt the patient details beforestoring it in the database and perform decryption when needed by the physician. 1.1 Related Work: For real-world implementation, wireless networks and healthcare networks may employ different topologies, while the trusted IDS principles are still the same. Therefore, this section introduces existing approaches on how to establish trust management for wireless networks and distributed IDS networks. Intrusion detection systems (IDSs): These systems are usually deployed to identify any behavioral anomalies or policy violations through monitoring the protected networks and systems. Typically, an IDS can be classified into two categories: signature-based IDS and anomaly-based IDS. The former detects attacks by matching network or system events with available signatures. A signature (or rule) is a kind of descriptions of a known attack or exploit, which determines the detection capability in real-world applications (i.e., its detection accuracy would not be better than its available signatures). The latter first builds a profile for typical activities on the target computer and network, and then identifies potential anomalies if the deviation between the monitored events and the normal profile exceeds a predefined threshold. Alarms will be generated if anomalies are discovered. To improve the detection performance, distributed and collaborative IDSs are often applied in real-world environments. Trust management for wireless networks: The notion of trust in computer science derives mainly from the field of social science, aiming to predict and judge the situationsofan object. In literature, many trust-based approaches with intrusion detection technology have been developed and studied. Trust management for distributed IDS networks: To enhance the detection performanceofa singleIDS,distributed or collaborative IDS networks have been widely developed through enabling the information collection and exchange among a set of IDS nodes.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1684 1.2 Architecture: Like most of healthcare applications with wireless medical network, our architecture has four systems as follows:  A patient database system which stores the patient data from medical and provides querying services to users (e.g., physicians and medical professionals);  A patient data access control system which is used by the user (e.g., physician) to access the patient data and monitor the patient;  A patient data analysis system which is used by the user (e.g., medical researcher) to query the patient database system and analyze the patient data statistically. WMNs deployed at a large scale in a distributed manner, and their data rates differs based on their applications, wherethe Wireless Medical Networks have direct human involvement are deployed on a small scalemustsupportmobility(apatient can carry the devices), and WMNs requires high data rates with reliable communication. Physiological conditions of patients are closely monitored by deploying Wireless medical motes. These medical are used to sense the patient’s vital body parameters and transmit the sensed data in a timely fashion to someremotelocationwithouthumaninvolvement. Using these medical readings the doctor can get the details of a patient’s health status. The patient’s vital body parameters include heart beats, body temperature, blood pressure, sugar level, pulse rate. WMNs carry the quality of care across wide variety of healthcare applications. In addition, other applications that also benefit from WMNs include sports-person health status monitoring and patients self-care. Several research groups and projects have started to develop health monitoring using wireless networks. Wireless Medical healthcare application offers a number of challenges, like, reliable transmission of data, secured data transmission, nodes mobility, detection of event delivery of data in time, power management, etc. Deploying new technologies in healthcare applications without considering security often makes patient privacy vulnerable. For instance, the patient’s physiological vital signals are very sensitive so the leakage of the patient’s diseased data could makes the patient embarrassed. Sometimes revealing disease information can make it impossible for them to obtain insurance protection and also result in a person losing their job. To prevent the patient data from the inside attacks, we propose a new data collection protocol, where a splits the sensitive patient data into three components according to a random number generator based on hash functionandsends them to three servers, respective, via secure channels. To keep the privacy of the patient data in data access, we propose a new data access protocol on the basis of the Paillier cryptosystem. The protocol allows the user (e.g. physician) to access the patient data without revealing it to any data server. To preserve the privacy of the patient data in statistical analysis, we propose somenewprivacy-preservingstatistical analysis protocol on the basis of the Paillier cryptosystems. These protocols allow the user (e.g., medical researcher) to perform statistical analysis on the patient data without compromising the patient data privacy. 2. DATA MODEL & DESCRIPTION Privacy is the major design constraint in the health care application for providing security to patient’s sensitive data from hacker. Our system usesJava as a front end with Apache web server/ Apache Tomcat/ IIS as the webserver. And MySQL as the back end of the system. 2.1 Mathematical Model: Let W be the whole system which consists: W= {IP, PRO, OP} Where, IP is the input of the system. A) IP= {P, SD, SN, PD, U} P is the number of patients in the system. SN is the set of number of sensing nodes in the system. SD is the sensing data sensed from the medical SD. PD is the patient’s database system which consistsof number of databases. U is the set of number of user in the systems that are accessing the data from patient’s database server. B) PRO is the procedure of our proposed system: Step 1: At first the wirelessmedical network whichsenses the patient’s body and transmits the patient data to a patient database system. Step 2: A patient database system which stores the patient data from medical and provides querying services to users (e.g., physicians and medical professionals). Step 3: A patient data access control system which is used by the user (e.g., physician) to access the patient data and monitor the patient.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1685 Step 4: A patient data analysis system which is used by the user (e.g., medical researcher) to query the patient database system and analyze the patient data statistically. OP is the output of the system: The system provides the privacy to the patient’s sensibledata available on the patient’s database system in the sense of inside attacks. 2.2 Algorithms: A) Paillier Public-Key Cryptosystem: It is composed of key generation, encryption and decryption algorithms as follows. 1)Key generation – The key generation algorithm works as follows.  Choose two large prime numbers p and q randomly and independently of each other such that; gcd(pq,(p− 1)(q− 1))= 1  Compute N= pq,λ= lcm(p− 1,q− 1) Where lcm stands for the “least common multiple”.  Select random integer g where g ∈ZN2 ¿ and ensure N divides the order of g by checking the existence of the following modular multiplicative inverse: μ= (L(gλ (modN2 ))) −1 (modN) where function L is defined as; L(u)= u− 1 N Note that the notation a/b does not denote the modular multiplication of a times the modularmultiplicativeinverseof b but rather the quotient of a divided by b. The public (encryption) key pk is (N,g). The private (decryption) key sk is (λ,µ). If using p,q of equivalent length, one can simply choose; g= N+1,λ= φ(N)− 1 (modN) where N = pq andφ(N)= (P− 1)(q− 1) 2)Encryption: The encryption algorithm works as follows.  Let m be a message to encrypt, where m ∈ZN  Select random r where r ∈ZN ¿  Compute cipher text as: C= gm .rN (modN2 ) 3)Decryption: The decryption algorithm works as follows.  Let c be the cipher text to decrypt, where the cipher text; c ∈ ZN2 ¿ .  Compute the plain text message as: m= (cλ (modN2 )).μ(modN) 4)Homomorphic Properties: A notable feature of the Paillier cryptosystem is its homomorphic properties. Given two cipher texts; E(m1,pk)= g m1 r1 N (modN 2 ) E(m2,pk)= g m2 r2 N (modN 2 ) where r1,r2 are randomly chosen forZN ¿ ,we have the following homomorphic properties – D(E(m1 ,pk1).E(m2 ,pk2))= m1+m2(modN) The product of a cipher text with a plain text raising g will decrypt to the sum of the corresponding plain texts; D(E(m1,pk1).gm2 )= m1+m2(modN) An encrypted plain text raised to a constant k will decrypt to the product of the plain text and the constant; D(E(m1 ,pk1)k )= km1(modN) 2.3 Major Constraints: The patient data may be decimal numbers with several digits after the point. In this case, the information should convertit to an integer and sends the shares of the data together with the unit of the data to three data servers, respectively. 2.4 Functional Model and Description: Patient: The patient sensitive data is stored in multiple servers by using some new crypto systems protocols. System: The system will protects the patients data from hacker while data transmission by administrator. 2.5 Data Design: A description of all data structures including internal, global, and temporary data structures, database design (tables), file formats.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1686 A. Internal software data structure – When SQL returns the results of the query sent to it by user, the results of the query will be passed back to user using the built in data structures. B. Global data structure – We are not using any global data structure. C. Temporary data structure – We will be using a cookie saved on the user’s machine to temporarily store the user’s query entry. This is so the user can go back to the query page and easily modify their last query to refine or widen their search as needed. D. Database description – MySQL: MySQL, the most popular Open Source SQL database management system, isdeveloped, distributed,andsupported by Oracle Corporation. The MySQL Web site (http://www.mysql.com/) provides the latest information about MySQL software. MySQL is a database management system. A database is a structured collection of data. It may be anythingfromasimple shopping list to a picture gallery or the vast amounts of information in a corporate network. To add, access, and process data stored in a computer database, you need a database management system such as MySQL Server. Since computers are very good at handling large amounts of data, database management systems play a central role in computing, as standalone utilities, or as parts of other applications. REFERENCES [1] Yi, Xun, et al. ”Privacy Protection for Wireless Medical Sensor Data.” IEEE Transactions on Dependable and Secure Computing 13.3 (2016): 369-380. [2] X. Yi, J. Willemson, F. Nat-Abdesselam.Privacy-Preserving Wireless Medical Sensor Net-work.InProc.TrustCom13, pages 118-125, 2013. [3] D. He, S. Chan and S. Tang. A Novel and Lightweight System to Secure Wireless Medical Sensor Networks. IEEE Journal of Biomedical and Health Informatics, 18 (1): 316-326, 2014. [4] Y. M. Huang, M. Y. Hsieh, H. C. Hung, J. H. Park. Pervasive, Secure Access to a Hierarchi-cal Sensor-Based Healthcare Monitoring Architecture in Wireless Heterogeneous Networks. IEEE J. Select. AreasCommun. 27: 400-411, 2009. [5] K. Malasri, L. Wang. Design andImplementationofSecure Wireless Mote-Based Medical Sensor Network. Sensors 9: 6273-6297, 2009. [6] P. Belsis and G. Pantziou. A k-anonymity privacy- preserving approach in wireless medical monitoring environments. Journal Personal and Ubiquitous Computing, 18(1): 61-74, 2014. [7] T. ElGamal. A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Loga-rithms. IEEE Transactions on Information Theory, 31 (4): 469-472, 1985. [8] P. Paillier. Public-keyCryptosystemsBasedonComposite Degree Residuosity Classes. In Proc. EUROCRYPT99, pages 223-238, 1999. BIOGRAPHIES Mr. Mayur Lagad (BE Information Technology 2019) PDEA’S College of Engineering, Manjari(Bk) Pune – 412307 Mr. Akhilesh Chaudhari (BE Information Technology 2019) PDEA’S College of Engineering, Manjari(Bk) Pune - 412307