Publication Date: 2024/11/08
Abstract: Medical record storage on paper is currently being phased out and replaced by more sophisticated Electronic Health Record (EHR) systems. However, the ease of access to data and the digitization of medical records also come with the potential of misuse of personally identifiable information and healthcare data breaches. How technology will protect patient privacy is one of the primary concerns about EHRs. Network connectivity is another major issue, therefore keeping private health information online may expose it to major information leaks to external parties. Around the world, data management and privacy are major concerns. The main concerns that prevent businesses from using cloud computing are security and information authenticity, as they fear that data may be lost to unauthorized parties. The quantity of patient-oriented data in the healthcare system is continuously increasing, and the current medical systems are confronted with security issues such as weak access control, data breaches or unauthorized disclosure, and insufficient authorization and authentication. An Enhanced Security Model was created in this study to secure and protect Electronic Health Records. The records were encrypted for security and privacy utilizing the Advanced Encryption Standard (AES), One Time Password (OTP), and National Identity Number (NIN). The system was designed using Object Oriented Analysis and Design Methodology (OOADM). The New System improved patient record security by utilizing NIN for cloud identity management, OTP for authentication, and AES for privacy and security. While the MySQL server was used to implement the database, HTML, CSS, PHP, and JavaScript were used to program the system. Comparing the new system to the old system, the results of the performance assessment analysis based on security, user-friendliness, dependability, and privacy show that the new system has very good performance efficiency and integrity.
Keywords: Electronic Health Records (EHR); NIN; OTP; AES; Cloud Computing.
DOI: https://doi.org/10.38124/ijisrt/IJISRT24OCT1787
PDF: https://ijirst.demo4.arinfotech.co/assets/upload/files/IJISRT24OCT1787.pdf
REFERENCES
[1]. Sheridan, P.T., Meyers, S., Pech, E. (2013). Prussia, PA:
Merion Matters: Advance for Health
InformationProfessionals.URL:http://healthinformatio
n.advanceweb.com/Features/Articles/EHR-andHIM-
Transitions-in-a- Time-of-Mergers-Part-1.aspx.
[2]. Pandey, V. (2017). Securing the Cloud Environment
Using OTP. International Journal of Scientific
Research in Computer Science and Engineering
[3]. Niharika, G., Rama, R. (2015) Implementing High
Grade Security in Cloud Application using Multifactor
Authentication and Cryptography. International
Journal of Web & Semantic Technology (IJWesT) Vol.6,
No.2,
[4]. Muijnck-Hughes, J.(2019) Data Protection in the Cloud,
12 Jan, 2019 [Online], Available: http://www.ru.nl/ds
[5]. Markus, J. & Faruque, A.S.M (2015) Mobile One Time
Passwords and RC4 Encryption for Cloud Computing.
School of Information Science, Computer and Electrical
Engineering Halmstad University
[6]. Jin-Mook, K. and Jeong-Kyung, M. (2014) Secure
Authentication System for Hybrid Cloud Service in
Mobile Communication Environments. Division of
Information Technology Education, Sun Moon
University, No.100 Galsan-ri,Tangjeong-myeon,
Chungnam.Asan-si336708,RepublicofKorea
[7]. Joseph, K., Liu, M., Xinyi, H., Rongxing, L., Jin, L.
(2020) Fine-grained Two-factor Access Control for
Web-based Cloud Computing Services
[8]. N Gwotham, K., and Praveen Kumar Rao (2014) Hash
Based Approach for Providing Privacy and
Integrity in Cloud Data Storage using Digital
Signatures: International Journal of Computer Science
and Information Technologies, Vol. 5(6), 2014, 8074 –
8078.
[9]. Ivana, Kostadinovska (2016) Cloud Security – An
approach with modern cryptographic solutions. A
Thesis Submitted to the Faculty of Computer Science
and Information Science in Partial Fulfillment of the
requirements for the Degree of Master of Science,
University of Ljubljana, Slovenia.