In medical management, more and more information technology is applied to improve work efficiency. For example, the hospital information management system is used for basic information and medical management of patients, and the one-dimensional and two-dimensional codes on the wrist are used for quick reading or inputting patient identification (ID), etc. Although computerization is more convenient, due to immature technology or management flaws, there are certain security risks in various typical scenarios, such as disclosure of user privacy through reporting transparency, lack of strict control over the consultation of confidential medical records, the absence of technical verification for the confirmation of the infusion, etc. Identity is easy to fake, payment is inconvenient, etc.
Security issues are discussed in more detail below. Healthcare applications are considered a promising area for wireless sensor networks, where patients can be monitored using wireless medical networks (WMN).
Current trends in WMN healthcare research focus on reliable patient communication, patient mobility, and energy-efficient delivery.
Introduction
I. INTRODUCTION
The rapid technological convergence of the Internet of Things (IoT), Wireless Body Area Networks (WBAN) and cloud computing has made e-health (electronic health care) a promising industrial application. information-intensive occupying important areas Improving potential for quality of care.
Most of today's e-/m health systems require physicians (or system administrators) to be involved in processing medical information, which creates two problems: inefficiencies caused by manual operations and knowledge users by physicians. data.
A medical expert system that can automatically analyze the messy private data of users and reduce the involvement of doctors can solve these two problems, especially the application of a general physical examination
. A. Problem Definition
To overcome the problem of patients, we have implemented the system where a user/patient hides their information in QR code and the system will provide the patient with a unique ID to access when that patient/user is in the processing case. Doctors identify symptoms and assign treatment options to patients.
The pharmacist will scan the hat's QR code and administer the medicine to the patient/user. Finally, there is the insurance service. Develop specific plans based on the patient's perspective.
The proposed system's attention to the safety of the user's patient is an extreme requirement for healthcare applications and their insurance plans, especially in the case of patient privacy, if the patient is inconvenienced.
B. Model Architecture
In the proposed research work to design and implement a system which work with healthcare services. This research work aims to propose a unified trust computing scheme for giving most relevant, efficient and trustworthy healthcare service provider to the requesting patent.
Trustworthiness of the healthcare service/provider will be evaluated based on various attributes like QR Code, unique patient id to secure patients record in healthcare environment.
C. Algorithm Used
AES Algorithm
AES is an encryption algorithm which is a symmetric block cipher with a block size of 128 bits. It transforms these individual blocks using 128, 192 and 256 bit keys. Once it encrypts the blocks, it concatenates them to from the cipher text AES operates on bytes of data rather than bits. Since the block size is 128 bits the cipher processes 128 bit input data (or 16 bytes) at a time
2. MD5 (Message-Digest Algorithm)
MD5 (Message Digest Algorithm) The MD5 hash algorithm is a one-way cryptographic function that accepts an arbitrary length message as input and returns as output a fixed length digest value that authenticates the original message. Basically, MD5 is used to store passwords and one-way hashes of passwords, but is not among the recommended hashes for this purpose. The MD5hash function was originally designed for use as a secure cryptographic hash algorithm for authentication
3. Quick Response Code
QR is a two-dimensional barcode. It is commonly used to add web links to printed pages. When you scan such a QR barcode with your webcam or phone camera, the QR reader app will take you to a website or other web content. QR codes are an easy way send people to a website without entering a URL. It also provides different types of QR code symbols such as logo QR code, encrypted QR code, iQR code, etc. Users can choose between according to their needs. Nowadays, QR codes are applied in different streams of applications related to marketing, security, academics, etc.
II. OBJECTIVES
Health information on pregnancy procedures, diabetes, flu, etc. can be incorporated into the QR method. To learn more about these health issues, these QR cannons can be your access to medical information. Case can download necessary data or information from its infiltration to better understand and learn about health-specific content.
A. Scope of Study
The proposed system to provide better way to patients & doctor of each treatment task based on user time of attempt and paperless work. This system will overcome the traditional manual work of faculty to overcome a waiting time of treatment task in few amount of time.
We can use this system in medical healthcare applications.
We can use this system to reduces paper work and save time.
To make India digital for user friendly application for every user/patient.
Activity diagram can be defined as a flowchart to display the flow from one activity to another activity. These activities could be described as an operation of the system. The control flow usually is drawn from one operation of application to another. This can be branched or sequential, or concurrent also. Activity diagram scan deal with all or many type of flow control and used different elements such as join or fork.
III. ACKNOWLEDGEMENT
This document was supported by Alard College of Engineering & Management, Pune 411057. I would like to take this opportunity to thank my guide And Head of Computer Engineering Department Prof. Priyadarshani Doke for giving me all the help and guidance I needed. I am really grateful to them for their kind support. Their valuable suggestions were very helpful. In the end our special thanks to my parent’s member of the computer department of Alard College Of Engineering, Pune for their kind Cooperation and encouragement us in which helps us in the completion of this project. We should like to express our special gratitude and thanks to All other professors in the Department for giving us such attention and time for our project.
Conclusion
In this system we are going to implement In medical management, more and more information technologies are applied to improve work efficiency. In this proposed system, based on the analyses of the security shortcomings of medical management technology, we exploit the idea of applying Quick Response (QR) code to secure medical management and improve many medical management security through utilizing information security technology. Further theoretical analyses and more simulated experimental results will be our future work.
References
[1] Sawand, S. Djahel, Z. Zhang, and F. NaïtAbdesselam, “Toward Energy-Efficient and Trustworthy eHealth Monitoring System, ” China Commun., vol.12, no. 1, pp. 46-65, Jan. 2015.
[2] M. S. Shin, H. S. Jeon, Y. W. Ju, B. J. Lee, and S. P. Jeong, “Constructing RBAC Based Security Model in uHealthcare Service Platform,” The Scientific World J., vol. 2015, Article ID 937914, 13 pages, http://dx.doi.org/10.1155/2015/937914, 2015.
[3] C. Wang, B. Zhang, K. Ren, J. M. Roveda, C. W. Chen, and Z. Xu. “A Privacy-aware Cloud-assisted Healthcare Monitoring System via Compressive Sensing,” in Proc. of 33rd IEEE INFOCOM, 2014, pp. 2130-2138.
[4] M. Rushanan, A. D. Rubin, D. F. Kune, and C. M. Swanson, “SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks,” in Proc. of 35th IEEE Symp. on Security and Privacy, 2014, pp. 524-539.
[5] C. Bekara and M. Laurent-Maknavicius, “A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks,” in Proc. of 3rd IEEE Int. Conf. on Wireless and Mobile Computing, Networking and Communications (WiMOB 2007), 2007, pp. 59-59.
[6] P. T. Sivasankar and M. Ramakrishnan, “Active key management scheme to avoid clone attack in wireless sensor network,” in Proc. of 4th Int. Conf. on Computing, Communications and Networking Technologies (ICCCNT\'13), 2013, pp. 1-4.