Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Sumaiya Siddique, Shashank K N, Mahadevaprasad C M, Pragathi D, Gaganashree A
DOI Link: https://doi.org/10.22214/ijraset.2022.45780
Certificate: View Certificate
The interchange of electronic health data across healthcare facilities is made possible via the health information exchange program. There is a potential for data manipulation in this. This article primarily focuses on using \"Blockchain,\" i.e. one of the greatest technologies, to secure medical health data. Blockchain has demonstrated its outstanding qualities in the field of cryptocurrencies like bitcoin and Ethereum. This study employs the Secure Hash Algorithm (SHA), Simple Mail Transfer Protocol (SMTP), and AES Rijndael Algorithm (SMTP). Additionally, using the Naïve Bayes method, we forecast many heart illnesses related to this work.
I. INTRODUCTION
For medical institutions all around the world, the massive global aging population and the sharp rise in the number of people with chronic illnesses like diabetes have been and continue to be a serious challenge. Healthcare information exchange (HIE) between health authorities is a major improvement factor for the healthcare industry. Several technological solutions have been proposed and deployed to improve the overall delivery of healthcare services to lessen the burden of chronic diseases. HIE can help researchers better understand clinical trials for particular patients, but it can also help advance scientific knowledge by enabling them to combine data from various trials for analysis. This could help researchers find new understandings and treatments that go beyond what can be inferred from a single study.
There are three different types of Health Information Exchange:
Heart attack, Angina, and Chest pain are the signs and symptoms of coronary heart disease, one of the cardiac diseases that accounted for around one-fourth of all fatalities in India. There may be 30 million Cardiac disease sufferers in India, 14 million of whom live in cities and 16 million in rural regions. Smoking, lack of exercise, high blood pressure, high cholesterol, an unbalanced diet, elevated sugar levels, etc. all raise the risk of a heart attack. Heart disease can be stopped from becoming worse with early identification and treatment. Medical data mining has been utilized extensively over the past several decades to uncover hidden patterns that may be applied to the clinical diagnosis of any illness dataset. One data mining strategy is classification, which categorizes patients as having a normal or cardiac disease. However, the classification uses all qualities, whether they are significant or not, which may hinder classification performance. One of the dimensionality reduction strategies used to increase accuracy is feature subset selection.
We forecast 16 different heart illnesses in this paper. Age, Sex, Height, Weight, QRS Duration, PR Interval, QT Interval, T Interval, P Interval, QRS, T, P, QRST, J, HR, DI Q Wave, DI R Wave, DI S Wave, DI R' Wave, and DI S' Wave are the 20 parameters that we are using (refer to input attributes mentioned at page 5). Additionally, a prescription will be supplied based on the anticipated outcome.
The scenarios listed below may help to understand the existing HIEs barriers: A patient relocated from Bangalore to Mumbai between the years 2010 and 2020, where he/she currently resides. He/she has a history of alcohol dependence and congestive heart failure dating back to 2012. (in continuous remission since 2012). He/she is admitted to the hospital in an emergency due to shortness of breath while in Chennai. The doctors at the hospital in Chennai must have access to the patient's past medical records from Bangalore and Mumbai. Due to privacy concerns about provider bias, and recent assurances from his current primary-care physician that his distant history of alcohol dependency has no current relevance for the management of his congestive heart failure, the patient chose to share only cardiology data but did not want other healthcare providers to know his/her history of substance abuse. As of right now, the usual HIE procedure will begin with a request to the central repository, followed by a connection to the repository from Bangalore and Mumbai via Regional Gateway Connections. To retrieve EHR data two major obstacles must be overcome for this information exchange to take place: (1) the longer time required for timely access to data from the central repository; and (2) the vulnerability of the patient's history of substance abuse being accessible to the provider against the patient's will. Health information exchange across institutions is hampered by three issues: (1) security and privacy concerns; (2) data breaches brought on by unauthorized access; and (3) data discrepancy between the recipient's data and that of the remote provider's EHR. The prompt and routine exchange of medical information can improve treatment decisions and enable the professionals to. 1) Enhanced diagnosis, 2) Eliminate redundant tests, 3) Avoid using unneeded drugs, and 4) limit readmissions
II. LITERATURE SURVEY
Yan Zhuang, Zon-Yin Shae [1]. In this paper, the author provides a feasible solution to challenges by utilizing the unique features of blockchain. The data of the patient will be kept secured. and cannot be modified by other hackers. The blockchain adapter extracts metadata and hashes the EHR reports in JSON format, then stores this information in a smart contract, and stores the EHR data in the secure database. The methodology used in this paper was Environmental setup, Linkage module, and Request Module. Environmental Setup: To join the blockchain system, each healthcare facility is required to provide at least one node, which can be any computer or a mobile phone; Linkage Module: The healthcare facility’s adapter will hash the entire visit record in a JSON file and store the hashing value in the smart contract along with the touchpoint before the EHR data is stored in the secure database. Request Module: The healthcare facility will be assigned with an umbrella account in the blockchain that links to all clinicians involved in the care. All the clinicians could access the patient’s records with one-time authentication from the patient. The access history will be recorded to the blockchain and the auditing of individual clinicians’ access to the patient’s record will be managed by the local access control within the healthcare facility. Advantages are 1) only authorized users were able to access data, 2) Data Consistency, and 3) Patients can control their data. The limitations are 1) each Healthcare facility is required to give at least one node and 2) Scalability Constraints.
Eman m. Abou-Nassar, Abdullah m. Iliyasu [2]. In this paper the author proposed a Blockchain Decentralised Interoperable Trust framework (DIT) for IoT zones where a smart contract guarantees authentication of budgets and an Indirect Trust Inference System (ITIS) reduces semantic gaps and enhances Trustworthy Factor (TF) estimation via the network nodes and edges. DIT Internet of Healthcare Things (IoHT) makes use of a private Blockchain ripple chain to establish trustworthy communication by validating nodes based on their inter-operable structure so that controlled communication required to solve fusion and integration issues are facilitated via different zones of the IoHT infrastructure. The methodology used in this paper was IoT layers and their Components, Cryptographic Algorithms that are used in BlockChain. IoT layers and their Components: The general architecture shows the different layers of our proposed DIT Blockchain IoHT framework. The first layer is dedicated to collecting and processing the information as well as making necessary changes to such data. The second layer comprises gateways and network paths required to transmit the IoT data. The third layer of our framework, also called middleware, consists of interposed sub-layers found between the technology and application levels. Lastly, at the lower end of the architecture, there is an application layer where all the system’s functionalities are exported to the end-users. DITrust blockchain for IoHT Model: In this section, they presented the rudiments of the proposed DIT Blockchain framework for healthcare IoHT systems. It is designed to generate reliable cooperative IoT eco-systems (zones) with reliable mutual information integration between its members. In addition, the DIT IoHT framework is capable of decentralized, autonomous, transparent storage of interoperable trustworthy transactions. The Advantage of using this method was Evaluates Security Issues and Interoperability issues.
Yilong Yang, Xiaoshan Li, Nafees Qamar, et al [3]. This paper mainly deals with enabling healthcare professionals to appropriately access and securely share a patient’s medical information using a Methodology like MedShare that allows the healthcare providers and administrators to maintain control of their patient data, which is always the primary concern in building a trustworthy environment for exchanging patient information. MedShare’s approach to data security begins with storing indices of all patient data in the trusted public cloud of a public healthcare provider. The actual data is stored in the private clouds of the hospitals. The proposed approach includes a two-way authorization process to protect data from cyber-security attacks. EHR sharing request is only permitted and initiated by a doctor internally, and the request must be authorized by the patient and the data provider. The authentication process for doctors is implemented using the Role-based Access Control (RBAC) in the private cloud. The authorization mechanism is achieved by scanning the patient’s ID card, which is then authenticated by the public cloud of the Resident Identification Authority (RIA). The advantage of using MedShare preserves patient privacy through a two-way authorization process that collects patient consent before making the data available through the public and private clouds. Limitations are, 1) That its reliability highly depends on the public cloud as EHRs can only be located through the public cloud. 2) The extra costs are needed to implement data transformers from a specific EHR format of a hospital to a unified data format.
Pravin Pawar, Neeraj Parolia, et al [4]. In this paper, they propose eHealthChain a blockchain-based Public Health Information Management System (PHIMS) for managing health data originating from medical IoT devices and connected applications using Methodology like OAuth 2.0 protocol It works by delegating user authentication to the service that hosts a user account and authorizing third-party applications to access that user account. Hyperledger Fabric platform is an open-source blockchain framework hosted by the Linux Foundation. It has an active and growing community of developers. IoT Medical Devices, The IoT enables healthcare providers to extend their reach outside of the traditional clinical setting. This type of patient care leverages connected devices with IoT sensors to offer providers a continuous stream of real-time health data such as heart rate, blood pressure, and glucose monitoring. The advantage is that compared to others it has less complicity for the users. Limitations Sharing personal health data with the external EHR system.
Repaka, A. N., Ravikanti, S. D. [5]. According to this paper predicting heart disease with the help of numerous attributes/symptoms is quite complicated. The present research utilizes the Naive Bayesian - data mining classification technique for effectively enabling heart disease diagnosis and thereby offering appropriate treatment. Supervising different medical factors and the post-operation period stands very crucial. AES encrypts the patients’ records/data and saves it in the database. The results reveal that the diagnostic system built successfully predicts the risk level associated with heart disease. This paper provides a cost-effective hold of storing patient heart test results secured by the algorithm and then predicting the type of heart disease using the Naive Bayes algorithm.
III. BACKGROUND
A. BlockChain
Blockchain is a distributed ledger where data may be safely kept, making it impossible for the data to be changed. In other terms, we may characterize it as a platform for decentralized computing and information exchange that enables several authoritative domains to collaborate on logical decision-making. The terms "decentralized" and "distributed" here refer to the fact that each node has an equal priority and distributes its resources among itself. The term "blockchain" itself implies that data (i.e., transactions) will be kept as blocks of data. Each node can view the block, but they are unable to alter it. The hash value linked to a tampered block value changes and the modified block is removed from the network. Every node in the blockchain network receives the most recent blockchain in an average of 12.6 seconds. The Blockchain Network is the underlying technology of bitcoins.
The elements of a Blockchain network are listed below. –
The following are the hash function's properties:
In this study, a private blockchain is used, and for physicians to access a patient's EHR, they must request permission from the respective patient.
B. AES Rijndael Algorithm
The AES algorithm sometimes referred to as the Rijndael algorithm, is a symmetrical block cipher that transforms plain text into cipher text utilizing keys with lengths of 128, 192, and 256 bits. The AES algorithm is accepted as a global standard because it provides better security compared to other.
To create cipher text, the AES algorithm employs a substitution-permutation, or SP, network with many rounds. Depending on the key size being utilized, the number of rounds will vary. There are 10 rounds for 128-bit key sizes, 12 rounds for 192-bit key sizes, and 14 rounds for 256-bit key sizes. Every one of these rounds needs a round key, but since the method only accepts one key, this key must be extended to obtain keys for every round, including round 0.
C. SHA Algorithm
The National Security Agency developed SHA-2 (Secure Hash Algorithm 2) in 2001 as a replacement for SHA-1. The SHA-256 algorithm is one variant of SHA-2. A 256-bit value is produced using the patented cryptographic hash algorithm SHA-256.
Data is changed into a safe format during encryption so that it cannot be read unless the receiver possesses a key. The data may be as big as you like when it's encrypted, and it's frequently the same size as unencrypted data. Contrarily, with hashing, data of any size is converted to data of a specific size. For instance, SHA-256 hashing would reduce a 512-bit string of data to a 256-bit string.
Fig 2: One iteration in an SHA-2 family compression function. The blue components perform the following operations: The bitwise rotation uses different constants for SHA-512. The given numbers are for SHA-256. The red is an addition modulo 232 for SHA-256 or 264 for SHA-512.
D. Naïve Bayes Algorithm
The Naive Bayes algorithm is a supervised learning method for classification issues that is based on the Bayes theorem. It is mostly employed in text categorization with a large training set. The Naive Bayes Classifier is one of the most straightforward and efficient classification algorithms available today. It aids in the development of rapid machine learning models capable of making accurate predictions. Being a probabilistic classifier, it makes predictions based on the likelihood that an object will occur. Spam filtration, Sentimental analysis, and article classification are a few examples of Naive Bayes algorithms that are often used.
The Bayes theorem, commonly referred to as Bayes Rule, is used to calculate the likelihood of a hypothesis given certain previous information. The conditional probability determines this.
The Bayes theorem's formula is as follows:
P (A | B) =(P(B|A) * P(A)) / P(B)
In the above formula:
Input attribute used in the paper
E. Amazon Web Server(AWS)
The Entire data that is collected will be stored using the AWS server so that the framework can be run parallelly over different systems at the same time. In this paper, the different users such as system managers, hospital staff, clinicians, and patients can use the application at the same time over the different systems.
IV. METHODOLOGY
A. Health Information Exchange.
The HIE module contains three modules they are: 1) Environmental setup 2) Linkage Module 3) Request Module
To join the blockchain system, each healthcare facility is required to provide at least one node, which can be any computer; These nodes need to take the following steps to build a “blockchain adapter” to communicate with the system:
a. Deploy the appropriate "Genesis block" (the blockchain's first block).
b. Build an RPC server (Remote Procedure Call) that can connect to servers outside the adapter and secure EHR databases inside the healthcare firewall facility.
c. Create an external receiving database to house information gathered from all other healthcare facilities' blockchain adapters.
The working of the aforementioned technique is illustrated in Fig. 2 below.
2. Linkage Module: When the EHR data is prepared for a patient's visit, the healthcare facility's adapter will hash the whole visit record and store the hashing value in the smart contract along with the touchpoint before the EHR data is stored in the safety database. The data decryption phase will employ the hashing value to check for data consistency. After final decryption, any alteration of the data—initiated by the healthcare facility adapter intentionally or unintentionally will result in mismatched hashes and security alerts. This, rather than the smart contract code or the data held inside the smart contract, is available by all users after the smart contract is placed onto the blockchain. The blockchain also returns a smart-contract address and an application binary interface (ABI). The touchpoints may be kept safe, unchangeable, anonymous, and simple to search by patients and authenticated professionals by using the smart contract to store them.
3. Request Module: In some circumstances, such as an emergency room visit where numerous physicians are involved in the patient's treatment, it is unrealistic for patients to authorize each of the professionals once they have been admitted to a healthcare institution. The hospital will be given an overarching account in the blockchain that connects to all of the clinicians working on the case. With the patient's one-time authentication, all providers could access the patient's records. The access history will be stored on the blockchain, and local access control within the healthcare institution will be in charge of managing the auditing of each clinician's access to the patient's information. Through biometric authentication or a web-based Graphical User Interface (GUI), the patient can add the facility's umbrella ID to the "allowed list." The clinician's proxy ID should be automatically populated into the GUI after the patient and the clinician provides biometric information to authenticate the system. Through the clinicians' GUI, only the clinicians covered by this umbrella ID can view the patient's data.
Fig 2: System Architecture: 1. Check permission for Access A’s record. 2. Sends touchpoints to adapter 3. Select touchpoint through GUI. 4. Sends requests for selected records. 5. Sends a request to the remote healthcare facility. 6. Query request records. 7. Sends encrypted data stored into receiving database. 8. Sends decrypt keys.
B. Cardiac Disease Prediction
We are also forecasting the types of cardiac diseases. The Prediction Module will be integrated into the Doctor's Login using the Naive Bayes algorithm so that the user can use it for research. Following is how the NBA operates: Data for training and data for testing will be separated from the dataset. The algorithm will then receive training data, and the model will receive test data. The model then makes a disease prediction using the input parameters physicians will then propose a medication depending on the predicted illness.
V. WORKING
The system working is as follows.
The major goal of our work is to safeguard patient EHR data and put it in a blockchain ledger. The AES Rijndael Algorithm will be used to encrypt the stored data, while SHA256 is applied to provide hash values for the blockchain. The data is labeled as tampered with if there is any discrepancy in the hash values. The physicians can restore the data if it is flagged as tampered with by using the "record recover" option. By selecting "Record Recover," the system locates another blockchain model that contains identical encrypted information that has been saved in another database and copies that information to the original blockchain. This will enable record recovery and ensure the security of patient data.
A. System Manager
Options available on the system manager's dashboard include adding hospitals and departments. The department name and other details will be recorded when creating a department. Additionally, while adding a hospital, essential information such as the hospital's name, address, contact information, and email address should be provided. Following a successful registration, the hospital's credentials will be transmitted through SMTP protocol to the email address provided.
B. Doctor Dashboard
The doctor uses the patient ID to find the patient on the Patient Therapy page in the doctor's dashboard, and then prescribes a treatment based on a later-searchable Keyword. The "Patient Treatment and Prescription" Section's treatment data will be encrypted using the AES Rijndael Algorithm and kept in Blockchain as encrypted data.
Fig 6. describes the blockchain model, which will be kept in the database. The blockchain table contains information such as DoctorID (the doctor who administers the treatment), PatientID (the patient who received the treatment), Search Key (a keyword associated with the disease), Log Date (the date of the treatment), Previous and Current Hash Value (for determining the blockchain's data integrity), and Encrypted data (for storing encrypted treatment data).
In Query-Based Exchange, a doctor in a crisis can view patient information without getting in touch with the patient. The database is given in Fig. 7 below, and it contains a complete record of all accessible information. RRId stands for Record Request ID, ID for the doctor who submitted the request, SLNo for the blockchain whose data was requested, Access Key for the OTP that the system sent to the doctor for verification, and Status for the record's approval, rejection, or pending status
.
Clinicians ask patients for their EHR in directed exchange and patient-medicated exchange. The patient will get the access requests and may decide whether to accept or reject them depending on their interests. The doctor can access the record on the View Patient dashboard if the request is granted.
C. Patient Dashboard
The patient will log into their system and either approve or reject the request based on their interests. The request information includes details like the name of the doctor who requested the data, the date of the request sent by the doctor, and they can approve/reject button.
D. Cardiac Disease Prediction
A further module of the existing system, which predicts 16 different forms of heart illness, is dedicated to doing so. Age, Sex, Height, Weight, QRS Duration, PR Interval, QT Interval, T Interval, P Interval, QRS, T, P, QRST, J, HR, DI Q Wave, DI R Wave, DI S Wave, DI R' Wave, and DI S' Wave are the 20 characteristics that will be used to predict the outcome. And based on the outcome, a medication suggestion will be given. Users can input various ECG data to receive a forecast of heart illness.
With their consent, the patient's cardiac data will be gathered and saved as shown in fig 14. The information here will be utilized for more cardiac research. The gathered information will be utilized to train the machine learning model and forecast heart illness. The training data will be used to produce the testing data, and four different types of splits will be performed. The split is 90:10, 80:20, 70:30 and 60:40. And we are receiving 91% accuracy for 60:40 ratio. Each split's outcome will be forecasted. The accuracy of each sample will then be printed each time to demonstrate the accuracy of the machine learning model.
The results for each subject whose data was gathered during the test are displayed above in fig. 15. And after the prediction of each splits the accuracy of correctly classified information will be displayed over the screen.
VI. FUTURE WORK
Work on adding a feature to the health information system so that in the future, patients themselves will be able to enter their symptoms and obtain a general idea of the ailment they have. Future functionality includes the ability to purchase medications from a reputable pharmacy, which will make the system easier to use and assist patients in finding high-quality medications. A credit-based system of grading the physicians that would raise their responsibilities to society as a whole and keep them in check It is suggested that this system be maintained open so that patients may choose their providers based on information.
A blockchain-based healthcare information exchange system guarantees reliable assessments of patients\' health, generates fresh ideas, and promotes the transition to value-based treatment. Blockchain technology can bring about significant improvements in proper safety, quality of vaccinations, medications, diagnostics, and treatment processes. These changes are made possible by increased transparency, security, and ease of access to information. Making use of this technology will have wide-ranging effects on healthcare ecosystem stakeholders. This research examined the present situation of medical information from many angles. A blockchain-based health information system has been created, and the data is saved on an Amazon AWS web server using the AES encryption technique before being decoded at the terminals. SHA256 is being used to generate a hash key for the blockchain and check the integrity of the data. In this framework, three types of exchange have also been achieved. Based on the needs of medical mining, the naive Bayes classification technique has been implemented, and its key aspects have been emphasized. We experimentally demonstrate its appropriateness to the challenges in the medical arena in comparison to other techniques based on the experimental results. The experimental result has received 91% accuracy for a 60:40 split where 60% of training data and 40% of testing data were used and shows that NB is better than the compared approaches on most of the used medical data sets. The system also gives the suggestion of prescription based on the result predicted during the emergency purpose. This project can be used by other doctors to read and validate the patient’s details and provide the suggestion as a prescription which will be predicted by the Naive Bayes algorithm
[1] Yan Zhuang, Zon-Yin Shae, Yin-Wu Chen, and Chi-Ren Shyu, “A Patient-Centric Health Information Exchange Framework Using BlockChain Technology” IEEE, pp- 2169 – 2176, 2019. [2] Eman m. Abou-Nassar, Abdullah m. Iliyasu, Passant m. El-kafrawy, oh-young song, Ali Kashif Bashir and Ahmed a. Abd el-Latif, “DITrust Chain: Towards Blockchain-Based Trust Models for Sustainable Healthcare IoT Systems” IEEE, pp- 11223 – 111238, 2020. [3] Yilong Yang, Xiaoshan Li, Nafees Qamar, Peng Liu, Wei Ke, Bingqing Shen and Zhiming Liu, “Mindshare: A novel hybrid cloud for medical resource sharing among autonomous healthcare providers.” IEEE, pp- 46949 – 46961,2018. [4] Pravin Pawar, Neeraj Parolia, Sameer Shinde, Thierry Oscar Edoh and Madhusudan Singh “eHealthChain—a blockchain-based personal health information management system” Springer, 2021. [5] Repaka, A. N., Ravikanti, S. D., & Franklin, R. G., “Design and Implementing Heart Disease Prediction Using Naive Bayesian”, ICONIC, 2019. [6] Kaled salah, m. Habib ur Rehman, Nishara Nizamuddin, and Ala al-fuqah, “Blockchain for AI: Review and Research Challenges” IEEE pp-10127 – 10149, 2018. [7] Emeka Chukwu and Lalit Garg “A Systematic Review of Blockchain in Healthcare: Frameworks Prototypes and Implementations”, IEEE, pp- 21196 – 21214,2020.
Copyright © 2022 Sumaiya Siddique, Shashank K N, Mahadevaprasad C M, Pragathi D, Gaganashree A. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET45780
Publish Date : 2022-07-19
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here