Paper Title :AES Encryption for Secure Storage and Transfer of Patient Health Records Using Block Chain Technology
Author :Farheen Hasan, Amarsinh Vidhate, Dhananjay Dakhane
Article Citation :Farheen Hasan ,Amarsinh Vidhate ,Dhananjay Dakhane ,
(2023 ) " AES Encryption for Secure Storage and Transfer of Patient Health Records Using Block Chain Technology " ,
International Journal of Advance Computational Engineering and Networking (IJACEN) ,
pp. 9-31,
Volume-11,Issue-9
Abstract : Due to the quick pace of technological development, internet communication has established itself as the main
method of intercontinental contact. A wireless channel is used for such communication, which is seen as being commonplace
in nature. Private messages can be transmitted between groups of individuals using this wireless channel. Protecting this data
usually becomes a top priority in such a situation. Here is when the idea of cryptography comes into play. AES and DES are
used by the network‟s terminals to store patient health records securely. Later, patients add new health assets and recover old
ones from the network using the provided special key. The network is made up of multiple decentralised machines that will
record a cryptographic public ledger of all transactions involving sensitive health data using block Chain technology. Largescale
data generation provides considerable opportunities to improve both individual care and healthcare de- livery. Data
transformations must be traceable in order to guarantee that patient data is accurate. Without the traceability process, patients
and healthcare professionals lack the trust necessary to exchange this information, which further prevents the discovery of
novel treatments for diseases. So it appears to be a disruptive idea to use block Chain technology to improve those systems.
The primary objective of this thesis, however, is to create a block Chain-based system for securely storing and exchanging
essential health assets. The suggested model describes a possible combination of an AES/DES encryption key pair with a
block Chain network. As a result, the writers of this thesis describe the features of encryption techniques, as well as their
advantages and disadvantages, as well as some of the applications in the actual world. They also think of creating a
functional block Chain ledger to keep track of every transaction. In contrast, the server website encrypts and decrypts data
between the user and the client using the DES and AES algorithms. A communication session is established between the
server and the client throughout the key creation process using AES and DES. In the later stages, a block Chain ledger is
used to further secure the communication that has already been established between the server webpage and the client side.
The model‟s implementation of AES and DES is the only criteria used to compare it to other systems. The final model is put
into use in the cloud, and measures like time complexity and phase complexity are used to assess its performance.
Keywords - KNN, Block Chain, DES, Cryptography
I. INTRODUCTION
A technique known as an “internet key exchange” is
in charge of producing secret keys connected to data
security procedures taking place in a communication
network. The most important communication
between a client and a server occurs during this
exchange. The term”providing an additional layer of
security to facilitate the flow of sensitive data across
unreliable private networks” is IKE, which stands for
”internet key exchange.”
This thesis gives a full overview of the relevant
methods and approaches utilised to protect the data
they are linked to. IKE, on the other hand, is
commonly viewed as a hybrid protocol that manages
all key generation and management activities that
happen within a private network. It is typically
explained as a method for exchanging keys during the
encryption and decryption process on an unsafe
network, such as the InternetIKE aims to provide a
secure encryption technology and to process it in a
way that enables its use in vulnerable environments.
It is believed that IKEs were developed in the late
1990s with the sole purpose of securely exchanging
the
Type : Research paper
Published : Volume-11,Issue-9
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-20141
View Here
Copyright: © Institute of Research and Journals
|
|
| |
|
PDF |
| |
Viewed - 28 |
| |
Published on 2023-12-04 |
|