SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661, ISBN: 2278-8727Volume 5, Issue 6 (Sep-Oct. 2012), PP 21-24
www.iosrjournals.org
www.iosrjournals.org 21 | Page
Secure E- Health Care Model
1
A.B Rajesh Kumar, 2
Prof. M. Padmavathamma
Department of computer science, S.V. University Tirupati, A.P. India
ABSTRACT: With the development of information technology, Information is being exchanged several kinds of
networks. Internet is playing an increasing important role in all walks of life. With the advent of Internet it has
become technically possible to provide patient access through online. Health care is very important aspect in
Human life. In this paper, we propose secure E- Health care system, which provides to the registered users to
analyze their health position, To find disease details, about their diseases and treatment. Particularly, to take
decision about the Hospital where they have to take treatment, from when they have to take treatment and the
required treatment to their disease.
Keywords: Image encryption, Biometric, Decryption, Patient privacy.
I. Introduction
Health care services that benefits both patients, Doctors and Hospitals, due to the advances in
communication and information technology an increasing number of health services available. The development
of computer network and the advances in digital technologies information is being exchanged several kinds of
networks images with biometric information transfer on web for easy accessing and sharing and image with text
data can be utilized by means of encryption. In recent years image encryption has been developed in several
applications. Here, patients are used to register his personal information and divides information into two parts
one is for photo with biometric information and another for name, address. Digital Health card is a portable data
storage and data processing capabilities, and transfer of health data and provides data communications and it is
used for secure and authenticated data communication between patients and web services.[8,6]
In this paper, we propose secure E- Health care system, which provides to the registered users to
analyze their health position, to find disease details, about their diseases and treatment particularly to take
decision about the Hospital where they have to take treatment, from when they have to take treatment and the
required treatment to their disease.
II. Related Work
2.1 Digital Health Card System:
To secure sensitive information electronic implementation of Digital Health Card and security
interoperability like cryptography standards besides, to ensure authenticity of health card. Digital Health Card is
used to maintain authentication it has data storage and processing capabilities. In a online based health care
system individual data is kept in patient health card.[8]
2.2 Decision tree:
ID3 is a decision tree induction algorithm that uses information gaining as the quality function for
choosing attributes. Information gain is defined as the difference of entropy of data set T before and after it is
splitted with attribute A.[4I
Information gain (A) = E(T) – E(T
A
)
If there are categories C1_Cl.
Tc is the set of records where Class = Ci; and (T) is cardinality of the set, then there entropy E(T) is defined as
1
| | | |
( ). log
| | | |
l
ci ci
i
T T
E T
T T
 
 
 

To make classification make the leaf node with the class that has the highest number of instances.
2.3. Confidentiality and Integrity
In a web service communication health care system is prove to unauthorized people. In this case patient,
Doctor and Hospital data may be violated.
Secure E- Health Care Model
www.iosrjournals.org 22 | Page
Cryptosystem:
There are two kinds of cryptosystems symmetric and asymmetric. Symmetric cryptosystem use the
some key to encrypt and decrypt a message and asymmetric cryptosystem use and key (public key) to encrypt a
message and a differential key (private key) to decrypt it. Asymmetric cryptosystems are also called public key
cryptosystems. More efficient and reliable solution is a public key cryptosystem such as RSA which is used in
the popular security. Cryptography is practice of hiding information.
 Cryptography is the art of science encompassing the principles and methods of transforming message
(plain text) into one that is unintelligible (cipher text) and then retransforming that message back to its
original form.
 One of the famous cryptographic schemes in the RSA scheme. The idea of this scheme is the usage of the
properties of Euler’s totient function  (n). The generalization function of the above function of the above
function is the jordan’s Totient function J2(n). We can general the RSA scheme with the help of the
properties of J2(n).[1]
2.4. Image encryption
Image encryption process transforms plain – image information into cipher-image for involving the
original image with one or more key. Technology that use the same secret key for encryption and decryption
under private key techniques asymmetric key technique use two different keys, are public key for encryption and
two private keys for decryption. Cryptosystem can be serve all types of attacks they try to violate the system such
as, Plain test attack, cipher text attack.[7,8]
Encryption image:
1. load the plain image (original image)
2. calculate the width and height of the input image.
3. lower horizontal number of blocks = integer (Image – Height/n)
4. lower vertical number of Blocks = integer (Image = width/n)
No of blocks = horizontal number of blocks x vertical number of blocks
Biometric authentication:
Biometric authentication can be maintained by using finger printing.
III. The Proposed Secure E- Health Care Model
Phase 1: Registration Phase
Fig 1: Proposed Secure E- Health care Registration Phase
Secure E- Health Care Model
www.iosrjournals.org 23 | Page
Phase 2: Decision Making Phase
Fig 2: Proposed Secure E- Health care Decision making Phase
3.1 Proposed E-Secure Health care model consists of the following parts and roles:
The process starts with the access to registration phase, patient data consists of with two parts are is
used for image with biometric information and the other for name, address, disease, through which encryption
can be made in the security module the keys are divided into one for public key with two private keys one private
key for patient access control and other private key for Doctor and Hospital control. To generate health card for a
patient for allowing a symptoms to make diagnosis with feasible solutions.
By using image encryption process can generate Health card. In this system of Digital card has to be
connected to an encryption module at the Doctor’s practice where the patients has to enter his perusal
information. In the Hospital module decision about doctor given by Hospitals authority because patient needs to
get service. Necessary for specialized care for specialized areas in the payment module the process of payment
can be made through web service.
3.2. Doctor Decision tree:
Doctor wants to determine where patients in a disease prone or not, the attributes correspond roughly to
temperature and stage of a patient by using decision tree
> 37 >36 and < 37 >37
High Low Severe Normal
Fig 3: Decision tree
Case Temp Condition Disease Result
1. > 37 High Severe Yes
2. >= 36 and <=37 Mild Moderate Yes
3. >=38 High Severe Yes
4. <=37 Low Normal No
Fig 4: Decision Table
Patient symptoms a decision tree could be used to determining the patients diagnosis or treatment,
forecasting whether patient will affect disease based on data from the repository.
Patient Submit Health
Card
Web service
Disease Analysis Doctor Decision
making tool
Hospital Decision
making tool
Data
Base
Temp
condition Disease
Y
e
s
Y
e
s
N
o
Y
e
s
N
o
Secure E- Health Care Model
www.iosrjournals.org 24 | Page
3.3 Hospital Decision Tree:
Fig 5: Decision tree Related to Secure E-Health Care
The flow of decision tree is starts from a patient sign in based on health card membership to access into web
service. To check his optimum level conditional for choosing better treatment.
IV. Conclusion
In this paper, we have developed a novel approach development of a model architecture for image
encryption in securing patient data and serves patient information through web service.
References
[1] “New variant M. J2 – RSA Cryptosystem” : E. Madhusudhan Reddy, B. H. Nagaraiasri, A. B. Rajesh kumar, M. Padmavathamma.
[2] “Threshold Extended ID3 algorithm”, A.B. Rajesh Kumar, C. Pani Ramesh, E. Madhusudhan, M. Padmavathamma, ICDIP 2012
International Conference in Malasia.
[3] Quinlan, J. R. 1986. introduction of decision trees. Machine learning vol. 1, 81-106.
[4] “General criteria on building Decision trees for data classification”: Yo- Ping Haung, Vu Thi Thann Hoa
[5] “Privacy preserving decision tree learning over multiple parties “: F. Emekci*. O.D. Sahin , D. Agarwal, A.EI Abbadi.
[6] “A cryptographic key management solution for HIPAA privacy/ security regulations: Wei – Bin Lee, Member, IEEE, and Chien –
Ding Lee, IEEE transaction on information technology in biomedicine, vol 12, No.1, January 2008.
[7] Image encryption using block – based transformation algorithm:Mohammad Ali Bani Younes and Aman Jantan IAENG international
journal of computer science, 35: 1, IJCS _35_1_03.
[8] Design and implementation of a smart card based healthcare information system: Geylani Karda, E. Turhan Tunali* Computer
methods and programs in biomedicine 8I(2006) 66-78.
[9] A novel encryption method for image security: Mohammed Abbas Fadhil A1- Husainy, internation journal of security and its
applications Vol. 6 No. 1 January, 2012.

More Related Content

What's hot

Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...IJERA Editor
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGA SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGpharmaindexing
 
An Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security TechniquesAn Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security TechniquesIJCSIS Research Publications
 
INTERNET OF THINGS BASED MODEL FOR IDENTIFYING PEDIATRIC EMERGENCY CASES
INTERNET OF THINGS BASED MODEL FOR IDENTIFYING PEDIATRIC EMERGENCY CASESINTERNET OF THINGS BASED MODEL FOR IDENTIFYING PEDIATRIC EMERGENCY CASES
INTERNET OF THINGS BASED MODEL FOR IDENTIFYING PEDIATRIC EMERGENCY CASESpijans
 
INTERNET OF THINGS BASED MODEL FOR IDENTIFYING PEDIATRIC EMERGENCY CASES
INTERNET OF THINGS BASED MODEL FOR IDENTIFYING PEDIATRIC EMERGENCY CASESINTERNET OF THINGS BASED MODEL FOR IDENTIFYING PEDIATRIC EMERGENCY CASES
INTERNET OF THINGS BASED MODEL FOR IDENTIFYING PEDIATRIC EMERGENCY CASESamsjournal
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET Journal
 
IRJET - IoT based E-Prognosis System
IRJET - IoT based E-Prognosis SystemIRJET - IoT based E-Prognosis System
IRJET - IoT based E-Prognosis SystemIRJET Journal
 
Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Editor Jacotech
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationseSAT Journals
 
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan Phd
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan PhdSMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan Phd
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan PhdHealthcare consultant
 
IRJET- Mobile Assisted Remote Healthcare Service
IRJET- Mobile Assisted Remote Healthcare ServiceIRJET- Mobile Assisted Remote Healthcare Service
IRJET- Mobile Assisted Remote Healthcare ServiceIRJET Journal
 
IRJET - Review on Classi?cation and Prediction of Dengue and Malaria Dise...
IRJET -  	  Review on Classi?cation and Prediction of Dengue and Malaria Dise...IRJET -  	  Review on Classi?cation and Prediction of Dengue and Malaria Dise...
IRJET - Review on Classi?cation and Prediction of Dengue and Malaria Dise...IRJET Journal
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...IJCSIS Research Publications
 
Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
 
Healthcare information exchange using blockchain technology
Healthcare information exchange using blockchain technologyHealthcare information exchange using blockchain technology
Healthcare information exchange using blockchain technologyIJECEIAES
 
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGESAN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGESijait
 

What's hot (18)

Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGA SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
 
Iy3615601568
Iy3615601568Iy3615601568
Iy3615601568
 
An Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security TechniquesAn Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security Techniques
 
INTERNET OF THINGS BASED MODEL FOR IDENTIFYING PEDIATRIC EMERGENCY CASES
INTERNET OF THINGS BASED MODEL FOR IDENTIFYING PEDIATRIC EMERGENCY CASESINTERNET OF THINGS BASED MODEL FOR IDENTIFYING PEDIATRIC EMERGENCY CASES
INTERNET OF THINGS BASED MODEL FOR IDENTIFYING PEDIATRIC EMERGENCY CASES
 
INTERNET OF THINGS BASED MODEL FOR IDENTIFYING PEDIATRIC EMERGENCY CASES
INTERNET OF THINGS BASED MODEL FOR IDENTIFYING PEDIATRIC EMERGENCY CASESINTERNET OF THINGS BASED MODEL FOR IDENTIFYING PEDIATRIC EMERGENCY CASES
INTERNET OF THINGS BASED MODEL FOR IDENTIFYING PEDIATRIC EMERGENCY CASES
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
 
IRJET - IoT based E-Prognosis System
IRJET - IoT based E-Prognosis SystemIRJET - IoT based E-Prognosis System
IRJET - IoT based E-Prognosis System
 
Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applications
 
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan Phd
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan PhdSMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan Phd
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan Phd
 
IRJET- Mobile Assisted Remote Healthcare Service
IRJET- Mobile Assisted Remote Healthcare ServiceIRJET- Mobile Assisted Remote Healthcare Service
IRJET- Mobile Assisted Remote Healthcare Service
 
IRJET - Review on Classi?cation and Prediction of Dengue and Malaria Dise...
IRJET -  	  Review on Classi?cation and Prediction of Dengue and Malaria Dise...IRJET -  	  Review on Classi?cation and Prediction of Dengue and Malaria Dise...
IRJET - Review on Classi?cation and Prediction of Dengue and Malaria Dise...
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
 
Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...
 
Healthcare information exchange using blockchain technology
Healthcare information exchange using blockchain technologyHealthcare information exchange using blockchain technology
Healthcare information exchange using blockchain technology
 
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGESAN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
 

Viewers also liked

To Improve Speech Recognition in Noise for Cochlear Implant Users
To Improve Speech Recognition in Noise for Cochlear Implant UsersTo Improve Speech Recognition in Noise for Cochlear Implant Users
To Improve Speech Recognition in Noise for Cochlear Implant UsersIOSR Journals
 
A Density Based Clustering Technique For Large Spatial Data Using Polygon App...
A Density Based Clustering Technique For Large Spatial Data Using Polygon App...A Density Based Clustering Technique For Large Spatial Data Using Polygon App...
A Density Based Clustering Technique For Large Spatial Data Using Polygon App...IOSR Journals
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  NetworksSecure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor NetworksIOSR Journals
 
A Comprehensive Overview of Clustering Algorithms in Pattern Recognition
A Comprehensive Overview of Clustering Algorithms in Pattern  RecognitionA Comprehensive Overview of Clustering Algorithms in Pattern  Recognition
A Comprehensive Overview of Clustering Algorithms in Pattern RecognitionIOSR Journals
 
Simulation Based Performance Evaluation of Queueing Disciplines for Multi-Cl...
Simulation Based Performance Evaluation of Queueing  Disciplines for Multi-Cl...Simulation Based Performance Evaluation of Queueing  Disciplines for Multi-Cl...
Simulation Based Performance Evaluation of Queueing Disciplines for Multi-Cl...IOSR Journals
 
Efficient Design of Reversible Sequential Circuit
Efficient Design of Reversible Sequential CircuitEfficient Design of Reversible Sequential Circuit
Efficient Design of Reversible Sequential CircuitIOSR Journals
 

Viewers also liked (20)

D0342934
D0342934D0342934
D0342934
 
To Improve Speech Recognition in Noise for Cochlear Implant Users
To Improve Speech Recognition in Noise for Cochlear Implant UsersTo Improve Speech Recognition in Noise for Cochlear Implant Users
To Improve Speech Recognition in Noise for Cochlear Implant Users
 
A Density Based Clustering Technique For Large Spatial Data Using Polygon App...
A Density Based Clustering Technique For Large Spatial Data Using Polygon App...A Density Based Clustering Technique For Large Spatial Data Using Polygon App...
A Density Based Clustering Technique For Large Spatial Data Using Polygon App...
 
A0330103
A0330103A0330103
A0330103
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  NetworksSecure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks
 
A Comprehensive Overview of Clustering Algorithms in Pattern Recognition
A Comprehensive Overview of Clustering Algorithms in Pattern  RecognitionA Comprehensive Overview of Clustering Algorithms in Pattern  Recognition
A Comprehensive Overview of Clustering Algorithms in Pattern Recognition
 
F0943236
F0943236F0943236
F0943236
 
I0614550
I0614550I0614550
I0614550
 
J0956064
J0956064J0956064
J0956064
 
C01041922
C01041922C01041922
C01041922
 
Simulation Based Performance Evaluation of Queueing Disciplines for Multi-Cl...
Simulation Based Performance Evaluation of Queueing  Disciplines for Multi-Cl...Simulation Based Performance Evaluation of Queueing  Disciplines for Multi-Cl...
Simulation Based Performance Evaluation of Queueing Disciplines for Multi-Cl...
 
I0545760
I0545760I0545760
I0545760
 
K0466974
K0466974K0466974
K0466974
 
Efficient Design of Reversible Sequential Circuit
Efficient Design of Reversible Sequential CircuitEfficient Design of Reversible Sequential Circuit
Efficient Design of Reversible Sequential Circuit
 
B0950814
B0950814B0950814
B0950814
 
L0565965
L0565965L0565965
L0565965
 
C0541925
C0541925C0541925
C0541925
 
G0533441
G0533441G0533441
G0533441
 
J0525460
J0525460J0525460
J0525460
 

Similar to Secure E- Health Care Model

Medical image encryption techniques: a technical survey and potential challen...
Medical image encryption techniques: a technical survey and potential challen...Medical image encryption techniques: a technical survey and potential challen...
Medical image encryption techniques: a technical survey and potential challen...IJECEIAES
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET Journal
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 
Information Security using Cryptography and Image Processing
Information Security using Cryptography and Image ProcessingInformation Security using Cryptography and Image Processing
Information Security using Cryptography and Image Processingijsrd.com
 
Medical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdfMedical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdfVishalSoni95234
 
Embedding and Extraction Techniques for Medical Images-Issues and Challenges
Embedding and Extraction Techniques for Medical Images-Issues and Challenges Embedding and Extraction Techniques for Medical Images-Issues and Challenges
Embedding and Extraction Techniques for Medical Images-Issues and Challenges csandit
 
Patient Privacy Control for Health Care in Cloud Computing System
Patient Privacy Control for Health Care in Cloud Computing  SystemPatient Privacy Control for Health Care in Cloud Computing  System
Patient Privacy Control for Health Care in Cloud Computing SystemIRJET Journal
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
 
Private & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptxPrivate & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptxKomal526846
 
A Review on Biometric-based Systems for Patient Health Record Authentication
A Review on Biometric-based Systems for Patient Health Record AuthenticationA Review on Biometric-based Systems for Patient Health Record Authentication
A Review on Biometric-based Systems for Patient Health Record AuthenticationIRJET Journal
 
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...suherashaik2003
 
Intelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIntelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIRJET Journal
 
IRJET- Result on the Application for Multiple Disease Prediction from Symptom...
IRJET- Result on the Application for Multiple Disease Prediction from Symptom...IRJET- Result on the Application for Multiple Disease Prediction from Symptom...
IRJET- Result on the Application for Multiple Disease Prediction from Symptom...IRJET Journal
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET Journal
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUIRJET Journal
 
Security and privacy preserving challenges of e-health solutions in cloud com...
Security and privacy preserving challenges of e-health solutions in cloud com...Security and privacy preserving challenges of e-health solutions in cloud com...
Security and privacy preserving challenges of e-health solutions in cloud com...Venkat Projects
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING Akshay Mittal
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud SolutionIRJET Journal
 
Health Care Application using Machine Learning and Deep Learning
Health Care Application using Machine Learning and Deep LearningHealth Care Application using Machine Learning and Deep Learning
Health Care Application using Machine Learning and Deep LearningIRJET Journal
 

Similar to Secure E- Health Care Model (20)

Medical image encryption techniques: a technical survey and potential challen...
Medical image encryption techniques: a technical survey and potential challen...Medical image encryption techniques: a technical survey and potential challen...
Medical image encryption techniques: a technical survey and potential challen...
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
Information Security using Cryptography and Image Processing
Information Security using Cryptography and Image ProcessingInformation Security using Cryptography and Image Processing
Information Security using Cryptography and Image Processing
 
Medical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdfMedical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdf
 
Embedding and Extraction Techniques for Medical Images-Issues and Challenges
Embedding and Extraction Techniques for Medical Images-Issues and Challenges Embedding and Extraction Techniques for Medical Images-Issues and Challenges
Embedding and Extraction Techniques for Medical Images-Issues and Challenges
 
Patient Privacy Control for Health Care in Cloud Computing System
Patient Privacy Control for Health Care in Cloud Computing  SystemPatient Privacy Control for Health Care in Cloud Computing  System
Patient Privacy Control for Health Care in Cloud Computing System
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
 
Private & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptxPrivate & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptx
 
A Review on Biometric-based Systems for Patient Health Record Authentication
A Review on Biometric-based Systems for Patient Health Record AuthenticationA Review on Biometric-based Systems for Patient Health Record Authentication
A Review on Biometric-based Systems for Patient Health Record Authentication
 
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
 
Medical
MedicalMedical
Medical
 
Intelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIntelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosis
 
IRJET- Result on the Application for Multiple Disease Prediction from Symptom...
IRJET- Result on the Application for Multiple Disease Prediction from Symptom...IRJET- Result on the Application for Multiple Disease Prediction from Symptom...
IRJET- Result on the Application for Multiple Disease Prediction from Symptom...
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using Encryption
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
Security and privacy preserving challenges of e-health solutions in cloud com...
Security and privacy preserving challenges of e-health solutions in cloud com...Security and privacy preserving challenges of e-health solutions in cloud com...
Security and privacy preserving challenges of e-health solutions in cloud com...
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
 
Health Care Application using Machine Learning and Deep Learning
Health Care Application using Machine Learning and Deep LearningHealth Care Application using Machine Learning and Deep Learning
Health Care Application using Machine Learning and Deep Learning
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Secure E- Health Care Model

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 5, Issue 6 (Sep-Oct. 2012), PP 21-24 www.iosrjournals.org www.iosrjournals.org 21 | Page Secure E- Health Care Model 1 A.B Rajesh Kumar, 2 Prof. M. Padmavathamma Department of computer science, S.V. University Tirupati, A.P. India ABSTRACT: With the development of information technology, Information is being exchanged several kinds of networks. Internet is playing an increasing important role in all walks of life. With the advent of Internet it has become technically possible to provide patient access through online. Health care is very important aspect in Human life. In this paper, we propose secure E- Health care system, which provides to the registered users to analyze their health position, To find disease details, about their diseases and treatment. Particularly, to take decision about the Hospital where they have to take treatment, from when they have to take treatment and the required treatment to their disease. Keywords: Image encryption, Biometric, Decryption, Patient privacy. I. Introduction Health care services that benefits both patients, Doctors and Hospitals, due to the advances in communication and information technology an increasing number of health services available. The development of computer network and the advances in digital technologies information is being exchanged several kinds of networks images with biometric information transfer on web for easy accessing and sharing and image with text data can be utilized by means of encryption. In recent years image encryption has been developed in several applications. Here, patients are used to register his personal information and divides information into two parts one is for photo with biometric information and another for name, address. Digital Health card is a portable data storage and data processing capabilities, and transfer of health data and provides data communications and it is used for secure and authenticated data communication between patients and web services.[8,6] In this paper, we propose secure E- Health care system, which provides to the registered users to analyze their health position, to find disease details, about their diseases and treatment particularly to take decision about the Hospital where they have to take treatment, from when they have to take treatment and the required treatment to their disease. II. Related Work 2.1 Digital Health Card System: To secure sensitive information electronic implementation of Digital Health Card and security interoperability like cryptography standards besides, to ensure authenticity of health card. Digital Health Card is used to maintain authentication it has data storage and processing capabilities. In a online based health care system individual data is kept in patient health card.[8] 2.2 Decision tree: ID3 is a decision tree induction algorithm that uses information gaining as the quality function for choosing attributes. Information gain is defined as the difference of entropy of data set T before and after it is splitted with attribute A.[4I Information gain (A) = E(T) – E(T A ) If there are categories C1_Cl. Tc is the set of records where Class = Ci; and (T) is cardinality of the set, then there entropy E(T) is defined as 1 | | | | ( ). log | | | | l ci ci i T T E T T T        To make classification make the leaf node with the class that has the highest number of instances. 2.3. Confidentiality and Integrity In a web service communication health care system is prove to unauthorized people. In this case patient, Doctor and Hospital data may be violated.
  • 2. Secure E- Health Care Model www.iosrjournals.org 22 | Page Cryptosystem: There are two kinds of cryptosystems symmetric and asymmetric. Symmetric cryptosystem use the some key to encrypt and decrypt a message and asymmetric cryptosystem use and key (public key) to encrypt a message and a differential key (private key) to decrypt it. Asymmetric cryptosystems are also called public key cryptosystems. More efficient and reliable solution is a public key cryptosystem such as RSA which is used in the popular security. Cryptography is practice of hiding information.  Cryptography is the art of science encompassing the principles and methods of transforming message (plain text) into one that is unintelligible (cipher text) and then retransforming that message back to its original form.  One of the famous cryptographic schemes in the RSA scheme. The idea of this scheme is the usage of the properties of Euler’s totient function  (n). The generalization function of the above function of the above function is the jordan’s Totient function J2(n). We can general the RSA scheme with the help of the properties of J2(n).[1] 2.4. Image encryption Image encryption process transforms plain – image information into cipher-image for involving the original image with one or more key. Technology that use the same secret key for encryption and decryption under private key techniques asymmetric key technique use two different keys, are public key for encryption and two private keys for decryption. Cryptosystem can be serve all types of attacks they try to violate the system such as, Plain test attack, cipher text attack.[7,8] Encryption image: 1. load the plain image (original image) 2. calculate the width and height of the input image. 3. lower horizontal number of blocks = integer (Image – Height/n) 4. lower vertical number of Blocks = integer (Image = width/n) No of blocks = horizontal number of blocks x vertical number of blocks Biometric authentication: Biometric authentication can be maintained by using finger printing. III. The Proposed Secure E- Health Care Model Phase 1: Registration Phase Fig 1: Proposed Secure E- Health care Registration Phase
  • 3. Secure E- Health Care Model www.iosrjournals.org 23 | Page Phase 2: Decision Making Phase Fig 2: Proposed Secure E- Health care Decision making Phase 3.1 Proposed E-Secure Health care model consists of the following parts and roles: The process starts with the access to registration phase, patient data consists of with two parts are is used for image with biometric information and the other for name, address, disease, through which encryption can be made in the security module the keys are divided into one for public key with two private keys one private key for patient access control and other private key for Doctor and Hospital control. To generate health card for a patient for allowing a symptoms to make diagnosis with feasible solutions. By using image encryption process can generate Health card. In this system of Digital card has to be connected to an encryption module at the Doctor’s practice where the patients has to enter his perusal information. In the Hospital module decision about doctor given by Hospitals authority because patient needs to get service. Necessary for specialized care for specialized areas in the payment module the process of payment can be made through web service. 3.2. Doctor Decision tree: Doctor wants to determine where patients in a disease prone or not, the attributes correspond roughly to temperature and stage of a patient by using decision tree > 37 >36 and < 37 >37 High Low Severe Normal Fig 3: Decision tree Case Temp Condition Disease Result 1. > 37 High Severe Yes 2. >= 36 and <=37 Mild Moderate Yes 3. >=38 High Severe Yes 4. <=37 Low Normal No Fig 4: Decision Table Patient symptoms a decision tree could be used to determining the patients diagnosis or treatment, forecasting whether patient will affect disease based on data from the repository. Patient Submit Health Card Web service Disease Analysis Doctor Decision making tool Hospital Decision making tool Data Base Temp condition Disease Y e s Y e s N o Y e s N o
  • 4. Secure E- Health Care Model www.iosrjournals.org 24 | Page 3.3 Hospital Decision Tree: Fig 5: Decision tree Related to Secure E-Health Care The flow of decision tree is starts from a patient sign in based on health card membership to access into web service. To check his optimum level conditional for choosing better treatment. IV. Conclusion In this paper, we have developed a novel approach development of a model architecture for image encryption in securing patient data and serves patient information through web service. References [1] “New variant M. J2 – RSA Cryptosystem” : E. Madhusudhan Reddy, B. H. Nagaraiasri, A. B. Rajesh kumar, M. Padmavathamma. [2] “Threshold Extended ID3 algorithm”, A.B. Rajesh Kumar, C. Pani Ramesh, E. Madhusudhan, M. Padmavathamma, ICDIP 2012 International Conference in Malasia. [3] Quinlan, J. R. 1986. introduction of decision trees. Machine learning vol. 1, 81-106. [4] “General criteria on building Decision trees for data classification”: Yo- Ping Haung, Vu Thi Thann Hoa [5] “Privacy preserving decision tree learning over multiple parties “: F. Emekci*. O.D. Sahin , D. Agarwal, A.EI Abbadi. [6] “A cryptographic key management solution for HIPAA privacy/ security regulations: Wei – Bin Lee, Member, IEEE, and Chien – Ding Lee, IEEE transaction on information technology in biomedicine, vol 12, No.1, January 2008. [7] Image encryption using block – based transformation algorithm:Mohammad Ali Bani Younes and Aman Jantan IAENG international journal of computer science, 35: 1, IJCS _35_1_03. [8] Design and implementation of a smart card based healthcare information system: Geylani Karda, E. Turhan Tunali* Computer methods and programs in biomedicine 8I(2006) 66-78. [9] A novel encryption method for image security: Mohammed Abbas Fadhil A1- Husainy, internation journal of security and its applications Vol. 6 No. 1 January, 2012.