Professional Documents
Culture Documents
Health Insurance
Health Insurance
IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF HIGHER NATIONAL DIPLOMA (HND) IN COMPUTER SCIENCE
BY
NAME
HND/19/COM/FT/
INTRODUCTION
The protection of patient privacy and the security of patients’
medical records require a solid security infrastructure as well as a
proven security policy. Tan specifies, “A security policy should
clearly define the guidelines for creating, accessing, and
maintaining the integrity of patient e-health data and the scope of
accountability for each responsible party. A security infrastructure
covers the issues of login authentication, cryptography, access
control, antivirus precautions, risk assessment, auditing, alert for
medication errors, and disaster recovery.” Access control is a
fundamental security problem in shared computing environments
where medical records residing in databases are exchanged through
heterogeneous file systems in networked environments, where roles
and privileges vary depending on the nature of the system and the
organization it belongs. This requires controlling users’ right to use
certain resources by granting or preventing users’ access to
resources as needed. There are three types of 2 access control:
administration, technical (logical), and physical.
Statements of the Problem
1 Rasha 2021 Cryptography The aim of this paper is to the eHealth systems are widely the parameters and metrics that are used to
9 applications in investigate different used and many prestigious medical evaluate the implemented cryptography
Ehealth security aspects of fraud centers depend on them in techniques have been reviewed. Thereafter, a
systems prevention and detection transmitting and receiving the summary of the limitations and the recent
in telecommunication. medical information through trends of cryptography applications in
internet and local networks. Over eHealth systems is presented. Finally, the
the years, several security systems conclusions of this review article with some
have been presented to protect the suggestions for future researches in this field
privacy of the patients and to are offered.
ensure the safety of the exchanged
medical data.
2 Leona 2016 Secure and privacy The increasing the use of mobile devices Many mHealth initiatives, however, fail to
rdo aware data digitalization of people’s (e.g.,mobilephones, sensors,PDAs) address security and privacy issues. This,
collection and health information raises, to support medical and public coupledwith the lack of specific legislation
processing in however, new threats health. Such systems, have been for privacy and data protection in these
mobile health regarding information particularly successful in countries, increases the risk of harm to
systems security and privacy. developing countries, taking individuals.
Accidental or deliberate advantage of their flourishing
data breaches of health mobile market and the irneed to
data may lead to societal expand the coverage of primary
pressures, embarrassment health care programs.
and discrimination.
3 Hayat 2018 healthcare data: Big healthcare data has We proposed an Object-Oriented it is essential to identify the limita‑ tions of
et al preserving security considerable potential to Methodology and developed an existing solutions and envision directions for
and privacy improve patient outcomes, improved software tool based future research. In this paper, we have
predict outbreaks of model thatallows identifying surveyed the state‑of‑the‑art security and
epidemics, gain valuable potential fraudulent customers at privacy challenges in big data as applied to
insights, avoid the time of subscription, which in healthcare industry, assessed how security
preventable diseases, turn prevents fraud inherent in and privacy issues occur in case of big
reduce the cost of GSM communications. A database healthcare data and discussed ways in which
healthcare delivery and with SQL using MySQL IDE, and they may be addressed.
improve the quality of life MySQL command line was
in general. developed.
RESEARCH METHODOLOGY
The method used in this research is the combination of cryptography and
steganography. That is, DES algorithm for encryption and LSB for steganography. The
methodology employed entails two main steps to secure medical data in text format
which stated as follows.
The first step will accept patient data in plain text format as input and encrypt the
plain text using DES to generate cipher text as output. This step requires a key called
secret key
The second step will accept the output of the first step as input and embed it in a
cover image using LSB to generate an output in image form called stego image.
In order to retrieve data for the stego image, the steps involve are mainly two.
(a) The first step in retrieving the secured data is to extract the cipher text form the
stego image. (b) The second step to finally retrieve the secure data is to decrypt the
cipher text using DES algorithm. This step requires a secret key which correspond to
the key used during encryption.
6
RESULT AND DISCUSSION
Complete selection
7
RESULT AND DISCUSSION CON’T
10
CONCLUSION AND RECOMMENDATIONS
CONCLUSION
Among other sectors such as academic, banking and finance, medical sector is
not an exception in experiencing cyber-attack as patient health data are also
stored and shared electronically through the internet. The intrusion and
stealing of patient data automatically affects the service offered at the health
care centres and thus, poses threat to life of the patient. This study employs
both cryptography and steganography technique to improve the security of
medical data. Encryption and data hiding are the two main steps involved in
the method use in this study to secure medical data while the reverse is use in
opposite direction to retrieve the medical data.
RECOMMENDATION
This study demonstrates a double layer security, that is, the combination of
cryptography (3DES encryption algorithm) and steganography (LSB image
encoding technique) to improve data security in medical or health care
organization. The havoc caused by cyber-attack on data relating to health
issues motivates this study to demonstrate a double layer security system. The
result in this study shows a double layered security system offer more security
strength and make successful cyber-attack to be more difficult.
11
REFERENCES
Adams RI (2016) Information Communication Technology and Nigerian Banking
Industry
Aditya et al (2013) securing files using aes algorithm. ) International Journal of
Computer Science and Information Technologies, Vol. 4 (3)
Aganga, FA (2017). Movement of Computer System in broader perspective, 2nd
edition ps
Anshu & Ashish (2013) security by rijndael algorithm using combination of other
new generation security algorithms. International Journal of Computer Trends
and Technology (IJCTT) – volume 5
Awaju (2013) Importance of computerize monitoring system in Nigeria. Journal
vo 3.
Bill D (2001) Impact of Computerize Monitoring information System on
performance of banking industry Journal vol 7 pg 66. World press limited
Biometrics. pp 309-3152006)
Bioinformat 8 474 (2007)and matching technique for fingerprint recognition IEEE
Ezeofor (2014) reviewed analysis of network data encryption & decryption
techniques in communication systems. International Journal12of Innovative
Research in Science, Engineering and Technology.