Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

ENHANCED SECURITY INFRASTRUCTURE FOR

THE HEALTH CARE GRID

A PROJECT REPORT

Submitted by

AKASH.S (312114104001)
NARESH GODARA.M (312114104010)
SIVAKUMAR.K (312114104018)
GANESH.S (312114104006)

in partial fulfillment for the award of the degree


of
BACHELOR OF TECHNOLOGY

in

COMPUTER SCIENCE

S.M.K FOMRA INSTITUTE OF TECHNOLOGY, KANCHIPURAM

ANNA UNIVERSITY : CHENNAI 600 025

APRIL 2018

ANNA UNIVERSITY: CHENNAI 600 025


BONAFIDE CERTIFICATE

Certified that this project report “ENHANCED SECURITY

INFRASTRUCTURE FOR THE HEALTH CARE GRID” is the bonafide

work of “AKASH.S(312114104001),NARESH GODARA.M(312114104010),

SIVAKUMAR.K(312114104018),GANESH.S(312114104006)” who carried

out the project under my supervision.

SIGNATURE SIGNATURE

Mrs.S.Jeyalaximi(M.E.,) Mr.G.GANDHI JABAKUMAR(M.E.,)

HEAD OF THE DEPARTMENT Associate Professor

Department of computer science Department of computer science

S.m.k Fomra institute of technology S.m.k Fomra institute of technology

Kanchipuram, Chennai - 600 123 Kanchipuram, Chennai - 600 123

Submitted for the project and viva-voce examination held on ______________

SIGNATURE SIGNATURE

INTERNAL EXAMINER EXTERNAL EXAMINER

DECLARATION

ii
I hereby declare that the project report entitled “ENHANCED
SECURITY INFRASTRUCTURE FOR THE HEALTH CARE GRID”
which is being submitted in partial fulfilment of the requirement of the course
leading to the award of the ‘Bachelor of Technology in computer science ’ in
SMK FOMRA INSTITUTE OF TECHNOLOGY, Affiliated to Anna
University- Chennai is the result of the project carried out by me under the
guidance and supervision of Mr.G.GANDHI JABAKUMAR,(M.E).,
Assistant Professor in the Department of computer science. I further
declared that I or any other person has not previously submitted this project
report to any other institution/university for any other degree/ diploma or any
other person.

Date:
Place: Chennai Signature of Batch Members

(AKASH.S)

(NARESH GODARA.M)

(SIVAKUMAR.K)

(GANESH.S)

It is certified that this project has been prepared and submitted under my
guidance.

Date: (Mr.G.GANDHI JABAKUMAR)


Place: Chennai (Assistant Professor / CSE )

ACKNOWLEDGEMENT

iii
A project of this magnitude and nature requires kind co-
operation and support from many, for successful completion . We wish to
express our sincere thanks to all those who were involved in the
completion of this project.
We would like to express our deep gratitude to Our Honorable
Secretary and Correspondent, Dr. SHREE KUMAR FOMRA, M.A.,
Ph.D., for his kind words and enthusiastic motivation which inspired us a
lot in completing this project.
We also express our sincere thanks to Our Respected Directors
Mrs. C. VIJAYA RAJESHWARI and Mr. C. SAKTHI KUMAR, M.E.
and Mrs. Saranya Sree Sakthi Kumar, B.E for providing us with the
necessary facilities for completion of this project.
We also express our appreciation and gratefulness to
Our Principal Dr. K. Murugesan, M.E., Ph.D., who helped us in the
completion of the project. We wish to convey our thanks and gratitude to our
head of the department, Mrs. S. Jeyalaximi, M.E., Department of
Information Technology, for her support and by providing us ample time
to complete our project.
We express our indebtedness and gratitude to our staff in charge,
Mr.G.GANDHI JABAKUMAR, M.E., Assistant Professor, Department of
Information Technology for her guidance throughout the course of our project.

Last, we thank our parents and friends for providing their extensive
moral support and encouragement during the course of the project.

ABSTRACT
iv
Cloud based storage of Patients Health Record and outsourcing an encrypted
record is an emerging technique. Patients Health Record is stored in hospital’s
Private cloud and this will be accessed by the hospital administrator. In the
existing system patient records are maintained by the patients and it is they who
decide on the algorithm to be used for encrypting the records. Patient will
provide the key for accessing their record by third parties. This leads to issues
like scalability, security, Key management overhead etc. To overcome this
challenges , three stage security is provided .Security is enhanced by using AES
and Triple DES algorithm while authenticating login credentials and in sharing
of records between the servers. AES is used for hiding the information about the
users Triple DES is used for encrypting the record before it is been outsourced.
Decryption key is sent to the user for encrypting the content as an OTP message
so that health records are shared securely. Triple DES algorithm is used to
encrypt the whole record that has to be sent to other user.

v
CONTENTS

vi
TABLE OF CONTENTS

CHAPTER NO. TITLE PAGE NO

ABSTRACT V

LIST OF ABBREVIATIONS X

1 INTRODUCTION 1

1.1. OVERVIEW OF THE PROJECT 2

1.2 NEED FOR THE PROJECT 3

1.3 OBJECTIVE OF THE PROJECT 3

1.4 SCOPE OF THE PROJECT 4

2 LITERATURE SURVEY 5

2.1 SCALABLE AND SECURE SHARING OF PERSONAL 6

HEALTH RECORDS IN CLOUD COMPUTING USING

ATTRIBUTE-BASED ENCRYPTION

2.2 SCALABLE AND SECURE SHARING OF PERSONAL 6

HEALTH RECORDS IN CLOUD COMPUTING

2.3 SECURING PERSONAL HEALTH RECORDS IN CLOUD 7

COMPUTING: PATIENT-CENTRIC AND FINE-GRAINED

DATA ACCESS CONTROL IN MULTI-OWNER SETTINGS

2.4 SECURE SHARING OF ELECTRONIC HEALTH RECORDS 7

IN CLOUD

2.5 MEDIATED CIPHERTEXT-POLICY ATTRIBUTE-BASED 8


ENCRYPTION AND ITS APPLICATION

2.6 REALIZING FINE-GRAINED AND FLEXIBLE ACCESS

vii
CONTROL TO OUTSOURCED DATA WITH ATTRIBUTE- 8
BASED CRYPTOSYSTEMS

2.7 COMPARISION TABLE


9
2.8 FEASIBILITY STUDY
11

3 SYSTEM DESIGN 14

3.1 PROPOSED SYSTEM ARCHITECTURE DESIGN 15

3.2 LIST OF MODULES 15

3.3 MODULE DESCRIPTION 15

3.3.1. PROFILE CREATION 16

3.3.2 DOCTORS AND PATIENT LOGIN 16

3.3.3 SLICING TECHNIQUE 16

3.3.4. OTP REQUEST 17

3.5 UML DIAGRAMS

3.4.1 USE CASE DIAGRAM 18

3.4.2 SEQUENCE DIAGRAM 19

3.4.3 ACTIVITY DIAGRAM 20

3.4.4 CLASS DIAGRAM 21

3.4.5 COMPONENT DIGRAM 22

3.4.6 DEPLOYMENT DIAGRAM 23

4 REQUIREMENT SPECIFICATION 24

4.1 HARDWARE REQUIREMENTS 25

viii
4.2 SOFTWARE REQUIREMENTS 25

4.2.1 FEATURES OF WINDOWS 7 26

5 IMPLEMENTATION 29

5.1 SAMPLE CODE 32

5.2 SAMPLE SCREEN SHOTS 60

6 TESTING AND MAINTENANCE 69

6.1 BLACK BOX TESTING 70

6.2 WHITE BOX TESTING 72

6.3 UNIT TESTING 73

6.4 INTEGRATION TESTING 75

6.5 SYSTEM TESTING 77

6.6 ACCEPTANCE TESTING 78

7 CONCLUSION AND FUTURE ENHANCEMENTS 80

REFERENCES 82

ix
LIST OF ABBREVIATIONS

PHR Patient Health Record


OTP One Time Password
AES Advanced Encryption Standard
DES Data Encryption Standard
ABE Attribute Based Encryption
OPHR Online Personal Health Record
CP-ABE Cipher text Policy Attribute Based Encryption
MCP-ABE Mediated Cipher text Policy Attribute Based Encryption

ABS Attribute Based Signature

You might also like