Block Chain Technology Based Medical Healthcare System with Privacy Issues Using Blowfish Algorithm

Authors

  • A. George Klington  Professor, St. Mother Theresa Engineering College, Tuticorin, Tamil Nadu, India
  • S. Anantha Babu  Professor, St. Mother Theresa Engineering College, Tuticorin, Tamil Nadu, India
  • S. Uma Devi  UG Scholar, St. Mother Theresa Engineering College, Tuticorin, Tamil Nadu, India
  • R. Muthu Esakki  UG Scholar, St. Mother Theresa Engineering College, Tuticorin, Tamil Nadu, India

Keywords:

AES, DES, Blowfish, Block Chain, Key generation

Abstract

In the recent years the Block chain is fastest growing technology through various applications in a secure manner. The health care services industry is always showing signs of change and supporting new advancements and advances. In today’s health care systems is to protect the patient's medical report against potential attackers. Hence, it is basic to have secure information that can just approve people can get to the patient's medical report. So in our proposed system have proposed Block chain technology as a disbursed approach to grant security in accessing the medical report of a patient. It’s composed of three phases 1. Authentication, 2. Encryption and 3. Data Retrieval using Block Chain technology. For authentication Quantum Cryptography, for Encryption – BLOWFISH and for Data Retrieval – SHA algorithms are used to resist the frequent attacks. Finally our result shows the proposed method ensures the protection of the patients and moreover keeps up the security and trustworthiness of the health care system.

References

  1. M. Puppala, T. He, X. Yu, S. Chen, R. Ogunti, and S. T. C. Wong, “Data security and privacy management in healthcare applications and clinical data warehouse environment,” in2016 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), Feb 2016, pp. 5– 8.
  2. K. Abouelmehdi, A. Beni-Hssane, H. Khaloufi, and M. Saadi, “Big data security and privacy in healthcare: A review,” Procedia Computer Science, vol. 113, pp. 73 – 80, 2017, the 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017) / The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2017) / Affiliated Workshops.
  3. N. Kahani, K. Elgazzar, and J. R. Cordy, “Authentication and access control in e-health systems in the cloud,” in 2016 IEEE 2nd International Conference on Big Data Security on Cloud (Big Data Security), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security ril 2016, pp. 13–23.
  4. Christo MS, Meenakshi S. Enhancing security properties of Rumor Riding protocol under various attacks scenario in P2P network. In2016 International Conference on Communication and Signal Processing (ICCSP) 2016 Apr 6 (pp. 1130-1135).
  5. Christo, M.S. and Meenakshi, S., 2018. Enhancing Rumor Riding protocol in P2P network with Cryptographic puzzle through challenge question method. Computers & Electrical Engineering, 65, pp.122-138.
  6. Christo, M.S. and Rathinam, J.J., 2018, April. Enhancing Authenticated Intermediate Node in Rumor Riding Protocol. In 2018 International Conference on Communication and Signal Processing (ICCSP) (pp. 0023-0027). IEEE..
  7. F. Jabeen, Z. Hamid, A. Akhunzada, W. Abdul, and S. Ghouzali, “Trust C. Esposito, A. D. Santis, G. Tortora, H. Chang, and K. K. R. Choo, “Blockchain: A panacea for healthcare cloud-based data security and privacy?” IEEE Cloud Computing, vol. 5, no. 1, pp. 31–37, Jan 2018. S. P. Bingulac, “On the compatibility of adaptive controllers (Published Conference Proceedings style),” in Proc. 4th Annu. Allerton Conf.Circuits and Systems Theory, New York, 1994, pp. 8–16.
  8. P. Zhang, M. A. Walker, J. White, D. C. Schmidt, and G. Lenz, “Metrics for assessing blockchain-based healthcare decentralizedapps,” in 2017 IEEE 19th International Conference one-Health Networking, Applications and Services (Healthcom),Oct 2017, pp. 1–4..
  9. M. Mettler, “Blockchain technology in healthcare: The revolution starts here,” in 2016 IEEE 18th International Conferenceon e-Health Networking, Applications and Services (Healthcom),Sept 2016, pp. 1–3.G. W. Juette and L. E. Zeffanella, “Radio noise currents n short sections on bundle conductors (Presented Conference Paper style),” presented at the IEEE Summer power Meeting, Dallas, TX, June 22–27, 1990, Paper 90 SM 690-0 PWRS.
  10. W. Liu, S. Zhu, T. Mundie, and U. Krieger, “Advanced blockchain architecture for e-health systems,” in e-Health Networking,Applications and Services (Healthcom), 2017 IEEE 19thInternational Conference on. IEEE, 2017, pp. 1–6..
  11. A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, “Medrec: Using blockchain for medical data access and permission management,” in 2016 2nd International Conference on Open and Big Data (OBD), Aug 2016, pp. 25–30. deleted from the biography.

Downloads

Published

2021-04-10

Issue

Section

Research Articles

How to Cite

[1]
A. George Klington, S. Anantha Babu, S. Uma Devi, R. Muthu Esakki, " Block Chain Technology Based Medical Healthcare System with Privacy Issues Using Blowfish Algorithm, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 9, Issue 1, pp.397-405, March-April-2021.