INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )

E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 10 NO. 3 2024
DOI: 10.56201/ijcsmt.v10.no3.2024.pg95.104


Enhancing the Security of Patients’ Records for Privacy and Integrity

Ononiwu Chamberlyn C., Mgbeafulike Ike J.


Abstract


Data management and data protection is a burning issue across the globe. Security and authenticity of information are the major fears that keep organizations away from cloud computing as they are scared of losing information to unauthorized persons. In healthcare system, the amount of patient oriented data is constantly growing and the existing medical systems are faced with security challenges including vulnerabilities in access control, data breaches or unauthorized disclosure, inadequate authentication and authorization. In this work, an Enhanced Security Model for securing and protecting Electronic Health Records was developed using National Identity Number (NIN) serving as identity management in the cloud, One Time Password (OTP) served as means of authentication and Advanced Encryption Standard (AES) was used to encrypt the records for security and privacy. Object Oriented Analysis and Design Methodology (OOADM) were adopted in the design of the system. The New System enhanced the security of patients’ records using NIN to serve as identity management in the cloud, the OTP served as means of authentication while AES ensured protection and privacy. The system was programmed using HTML, CSS, Php and JavaScript while the database was implemented with MySQL server. The results from the performance evaluation analysis based on the evaluation metrics of security, user friendliness, encryption time, reliability and privacy demonstrates that the new system is secured, reliable and user-friendly when compared with the existing system.


keywords:

EHR, NIN, OTP, AES, Cloud Computing, OOADM, CSS


References:


[1]. Acar Tolga, Mira Belenkiy & Alptekin Kupcu (2013). Single password authentication.
International Journal of Computer and Telecommunications Networking, 57(13), 2013/167.
[2]. Shevtekar Sumit, Gangurde Yadhnesh & Bulbule Ayush (2023). Ensuring data security in
transit and rest in cloud environments. International Journal of Current Science Research and
Review, 13(4), 2250 – 1770.
[3]. Bali A. (2017). Management of Medical Records: Facts and Figures for Surgeons. Journal of
Maxillofacial Oral Surgery, 10(3), 199–202
[4]. Bitrus J., Wadzani A. G., Ngubdo M. A. & Agu, E. O. (2020). Design and Implementation of
a Secured Web based Medical Record Management System: A Case Study of Federal University
Wukari (FUW) Clinic. International Journal of Computer Applications 177(41), 27 – 33.
[5]. Farlex Partner Medical Dictionary (2012).
https://medicaldictionary.thefreedictionary.com/DuBois+formular
[6].R&G Editorial Staff (2022). Component of a medical record. Retrieved from
https://www.rngmedcons.com/components-of-a-medical-record/
[7]. Khalid A. & Shahbaz, M. (2013) Cloud computing technology: Service and Opportunities.
Pakistan journal of Science, 65(3), 343 - 351
[8]. Madhura J., Dinithi N., Daswin S., Damminda A., Brian D. & Kate E .W. (2020). A data
integration platform for patient-centered e-healthcare and clinical decision support. Research
Center for Data Analytics and Cognition, La Trobe University, Victoria, Australia b School of
Allied Health, La Trobe University. Victoria, Australia
[9]. Omotosho A., Emuoyibofarhe J. & Meinel, C. (2022). Ensuring patients’ privacy in a
cryptographic-based-electronic health records using bio-cryptography. International Journal of
Electronic Healthcare, 9(4), pp. 227
[10]. Rose R. (2019). The differences among records and what’s legally required to be in
them.Retrieved from https://www.phyicianspractice.com/
[11]. Muhammed F. M, Urooj A., Irfan k. & Sundas k. (2017) Cloud computing environment and
security challenges: A review; International Journal of Advanced Computer Science and
Applications, 8(10), 183-195.


DOWNLOAD PDF

Back