AU2021106398A4 - Enhanced file security system with reduced cloud storage for personal health records - Google Patents

Enhanced file security system with reduced cloud storage for personal health records Download PDF

Info

Publication number
AU2021106398A4
AU2021106398A4 AU2021106398A AU2021106398A AU2021106398A4 AU 2021106398 A4 AU2021106398 A4 AU 2021106398A4 AU 2021106398 A AU2021106398 A AU 2021106398A AU 2021106398 A AU2021106398 A AU 2021106398A AU 2021106398 A4 AU2021106398 A4 AU 2021106398A4
Authority
AU
Australia
Prior art keywords
personal health
key
cloud
security system
cloud storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2021106398A
Inventor
G. Anitha
Gumpina Babu Rao
Sharath Kumar D. R. V. A.
Satyanarayana Goud
T. Gowri
Vanitha Kakollu
Maddila Suresh Kumar
Katakam Ranga Narayana
K. Renu
Karri Sumanjali
Durga Prasad Tumula
K. Yasudha
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anitha G Dr
Babu Rao Gumpina Dr
DRVA Sharath Kumar Dr
Goud Satyanarayana Dr
Gowri T Dr
Kakollu Vanitha Dr
Renu K Mrs
Sumanjali Karri Mrs
Tumula Durga Prasad Mr
Yasudha K Ms
Original Assignee
Anitha G Dr
Babu Rao Gumpina Dr
D R V A Sharath Kumar Dr
Goud Satyanarayana Dr
Gowri T Dr
Kakollu Vanitha Dr
Kumar Maddila Suresh Mr
Ranga Narayana Katakam Mr
Renu K Mrs
Sumanjali Karri Mrs
Tumula Durga Prasad Mr
Yasudha K Ms
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anitha G Dr, Babu Rao Gumpina Dr, D R V A Sharath Kumar Dr, Goud Satyanarayana Dr, Gowri T Dr, Kakollu Vanitha Dr, Kumar Maddila Suresh Mr, Ranga Narayana Katakam Mr, Renu K Mrs, Sumanjali Karri Mrs, Tumula Durga Prasad Mr, Yasudha K Ms filed Critical Anitha G Dr
Priority to AU2021106398A priority Critical patent/AU2021106398A4/en
Application granted granted Critical
Publication of AU2021106398A4 publication Critical patent/AU2021106398A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02ATECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
    • Y02A90/00Technologies having an indirect contribution to adaptation to climate change
    • Y02A90/10Information and communication technologies [ICT] supporting adaptation to climate change, e.g. for weather forecasting or climate simulation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Epidemiology (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

ENHANCED FILE SECURITY SYSTEM WITH REDUCED CLOUD STORAGE FOR PERSONAL HEALTH RECORDS ABSTRACT In the preservation of health information, security and privacy are two major considerations. Protecting the patient's medical privacy and personal health information is a major concern in healthcare systems. Successful application and software implementation in a cloud environment for electronic medical personal health record (EMPHR) security is complicated in the healthcare sector. There is a growing demand day by day related to health services in private Hospitals Sectors, and in government health related service sectors. In both the sectors, maintaining Personal Health Records (PHR) securely with Cloud is the present issue as it required enhanced security system to store health records in cloud, increased demand causes increased files storage in the cloud intern increases the cloud servers cost. The present invention disclosed herein is an Enhanced File Security System with Reduced Cloud Storage for Personal Health Records comprising of Personal Health Record (101), 2-Digit Hex ASCII (102), Binary Conversion (103), Rotation (104), Trusted Authority (105), Key Conversion (106), Key Bit Rotation (107), XOR Operator (108), Cipher Text (109), Compression (110), Cloud Storage (111), and Decryption (112); provides enhanced file security for personal health record files with reduced storage space in cloud. Public and private keys are generated based on the sharing policy, and personal health record files are encrypted using the private key, according to the present invention disclosed herein that provides secure access to all registered users based on the access policy. Public key will be distributed to users who will be able to generate private keys with the help of their access policies. The file can only be decrypted using the generated private key and the distributed public key if encrypted cipher text contains a shared user name. The Cipher Text is the encrypted personal health record file in the present invention, and Cipher Text compression reduces storage space to store the encrypted personal health record files in the cloud. The encrypted personal health record files are securely decrypted using reverse rotation, XOR, a generated private key, and a distributed public key. 1/3 ENHANCED FILE SECURITY SYSTEM WITH REDUCED CLOUD STORAGE FOR PERSONAL HEALTH RECORDS DRAWINGS 01 102 103 104 PERSONAL HEALTH LJ2-DIGIT HEX ASCII BINARY -i RECORD _-1/HCONVERSION ROTATION 105 106 107 108 TRUSTED KEY CONVERSION KEY-BIT ROTATION XOR OPERATOR AUTHORITY 112 111 110 109 DECRYPTION CLOUD STORAGE COMPRESSION CIPHER TEXT Figure 1: Enhanced File Security System with Reduced Cloud Storage for Personal Health Records

Description

1/3
ENHANCED FILE SECURITY SYSTEM WITH REDUCED CLOUD STORAGE FOR PERSONAL HEALTH RECORDS DRAWINGS
01 102 103 104
PERSONAL HEALTH RECORD LJ2-DIGIT HEX ASCII _-1/HCONVERSION BINARY -i ROTATION
105 106 107 108
TRUSTED KEY CONVERSION KEY-BIT ROTATION XOR OPERATOR AUTHORITY
112 111 110 109
DECRYPTION CLOUD STORAGE COMPRESSION CIPHER TEXT
Figure 1: Enhanced File Security System with Reduced Cloud Storage for Personal
Health Records
ENHANCED FILE SECURITY SYSTEM WITH REDUCED CLOUD STORAGE FOR PERSONAL HEALTH RECORDS FIELD OF INVENTION
[0001] The present invention relates to the technical field of Computer Science Engineering.
[0002] Particularly, the present invention is related to an Enhanced File Security System with Reduced Cloud Storage for Personal Health Records of the broader field of Cloud Computing in Computer Science Engineering.
[0003] More particularly, the present invention is relates to an Enhanced File Security System with Reduced Cloud Storage for Personal Health Records provides enhanced file security for personal health record files with reduced storage space in cloud. Public and private keys are generated based on the sharing policy and personal health record files are encrypted as Cipher Text for privacy and enhanced security, further compression is performed to reduce the storage required to store the record files in cloud.
BACKGROUND OF INVENTION
[0004] The inefficient utilization of resources available for comprehensive healthcare to prevent and treat diseases is a regular occurrence in the healthcare system. Around the world, statistics show large levels of diabetes, liver illness, and parasite ailments such as histosomiasis and malaria. Early detection could either prevent or exacerbate some health problems. This is due to a number of factors, including tactics, activities, and technological advancements. If we can overcome them, we will be able to make significant progress in healthcare. Furthermore, there is a scarcity of file security systems of hospitals in secure storage of sensitive health records. These systems support the technical and administrative activities of health care, guaranteeing that all activities and resources of the medical facility are under full control. The precise selection of storage devices and software has no bearing on the success of these advanced systems. Their acceptability by diverse healthcare users like doctor, nurse, lab technician which defines their success.
[0005] The former health system was deemed ineffective due to various issues, including insufficient store capacity, high operating and maintenance expenses, and system integration; it was replaced with cloud based systems. Because it relied on a more effective IT infrastructure and the various advantages of cloud computing, such as cost, scalability, flexibility, and other issues, the computerized health system was eventually replaced by cloud computing. Medical costs, maintenance, networking, and license fees are all reduced when cloud computing is used in electronic records. Concerns about privacy and information security have arisen as a result of the rapid move to the cloud and its applications in healthcare systems. The usage of the cloud in IT shifts medical professionals' focus away from infrastructure management and toward clinical and patient activities. The exchange of personal and health information via the Internet and on multiple servers outside of the protected environment of the health facility has raised a number of privacy, security, access, and compliance concerns.
[0006] In the protection of health information, security and privacy are two critical challenges. The goal is to protect the patient's medical privacy and personal information. Due to a combination of technical, organizational, and political challenges, the successful installation and application for personal health records Files (PHRF) proves to be a challenging process. The technological innovation of electronic medical records (EMRs) is thought to be a crucial contributor in easing the responsibilities of health care. As a result, the EMR is seen as a key technology-driven component of the reform process. However, due to a mix of technological and organizational challenges, the successful deployment and adoption of an electronic medical records system proved to be a tough undertaking.
[0007] Unauthorized use and hacker attacks must be avoided by the development of an electronic health information system. To protect privacy and security, authentication and cryptographic key management will become the tools of choice. Security and privacy are two significant factors in the preservation of health information. In healthcare systems, protecting a patient's medical privacy and personal health information is a crucial concern. Successful application and software implementation in a cloud environment for electronic medical personal health record (EMPHR) security is complicated in the healthcare sector. There is a growing demand day by day related to health services in private Hospitals Sectors, and in government health related service sectors. In both the sectors, maintaining Personal Health Records (PHR) securely with Cloud is the present issue as it required enhanced security system to store health records in cloud, increased demand causes increased files storage in the cloud intern increases the cloud servers cost.
SUMMARY OF INVENTION
[0008] Referring to Figure 1, illustrates the present invention and main embodiment of current disclosure that is Enhanced File Security System with Reduced Cloud Storage for Personal Health Records comprising of Personal Health Record (101), 2-Digit Hex ASCII (102), Binary Conversion (103), Rotation (104), Trusted Authority (105), Key Conversion (106), Key-Bit Rotation (107), XOR Operator (108), Cipher Text (109), Compression (110), Cloud Storage (111), and Decryption (112); provides enhanced file security for personal health record files with reduced storage space in cloud.
[0009] Secure encryption and storage of Personal Health Records on a cloud server allows health-care administrators to have quick access to all patients' records at any time, allowing them to treat patients on time. Storing personal health records on third party cloud servers raises security concerns about data tampering and unauthorized access. Various encryption techniques such as Advanced, Data Encryption Standard (AES, DES), Triple DES, and others have been introduced to provide security to cloud data. However, all of these techniques require a lot of computation to generate public and private keys for patient data encryption, and if patient data is shared with multiple users such as nurses, lab technicians, and physicians, multiple keys will be required. If the patient grants access or authorization to a wide range of users, individual keys will be generated and distributed to them.
[0010] From the Personal Health Record (101) file, the text is extracted as characters and is converted by 2-Digit Hex ASCII (102). The 2-Digit Hex ASCII (102) converts the text of health record into 2-Digit Hexadecimal Code which is further converted into the binary digits by the Binary Conversion (103). Here each text character is converted into 8-bit form of binary. Now the binary form representation is Rotated (104) circularly over left by one bit. The Trusted Authority (105) is the personal health care administration authority or hospital management authority generates public key for encrypting the Personal Health Record (101) file securely, and distribute the public key to the patient user. Patients receive keys from The Trusted Authority (105) to encrypt data, and sharing users can obtain keys from The Trusted Authority (105) to decrypt data. The generated public key is converted into binary by Key Conversion (106), the binary conversion convert each key into of length 8-bits. The Key-Bit Rotation (107) is performed to rotate the key bits into right over one-bit position. The generated key by Trusted Authority (105) is converted into binary form and the Personal Health Record (101) file is converted into binary form on other end. The XOR Operator (108) performs XOR operation between the generated key and the health record file to produces Cipher Text (109). The Cipher Text (109) is the encrypted Personal Health Record (101) file. While encryption, the user access policy also included in the Personal Health Record (101) file regarding the access permissions provided to the sharing user. This encrypted Cipher Text (109) contains public key, Personal Health Record data, and access policy details. The Compression (110) is performed on the encrypted data to reduce storage space required for encrypted data to be stored in the cloud. The lossless data compression is performed with Zip file format. The compressed files are stored in the Cloud Storage (111) at cloud server securely. The securely stored files will be decrypted with Decryption (112) by the shared user. Sharing users will be given public keys, and they generate private keys using their access policies. If an encrypted cypher text file contains the shared user name, the file can decrypted using the generated private key and the distributed public key. Sharing users will be given public keys, and they will be able to generate private keys using their access policies. If an encrypted Cipher Text (109) file contains the shared user name, the file will only be decrypted using the generated private key and the distributed public key.
[0011] Accordingly, this Summary of the Invention, as well as its accompanying drawings and Detailed Description will be intended to provide a comprehensive overview. The inclusion or omission of components, sections or other things in this
Summary of the Invention is not intended to limit its scope. Please read the summary of the invention with a detailed description for a better understanding of this disclosure.
BRIEF DESCRIPTION OF DRAWINGS
[0012] This specification includes the accompanying drawings and they are used to gain a better understanding of the invention. The drawing illustrates the example of this disclosure and, in conjunction with the explanation, facilitates the understanding of its principles. The drawings are for illustrative purposes only and do not in any way limit the scope of the disclosure. The elements are identical, but not the same as the reference numerals used. In the definition of related components, different reference numerals may be used on the other hand. In some embodiments, such elements and/or components may not be present, while in others, they may be present.
[0013] Referring to Figure 1, illustrates the present invention and main embodiment of current disclosure that is Enhanced File Security System with Reduced Cloud Storage for Personal Health Records comprising of Personal Health Record (101), 2-Digit Hex ASCII (102), Binary Conversion (103), Rotation (104), Trusted Authority (105), Key Conversion (106), Key-Bit Rotation (107), XOR Operator (108), Cipher Text (109), Compression (110), Cloud Storage (111), and Decryption (112); provides enhanced file security for personal health record files with reduced storage space in cloud, in accordance with an exemplary embodiment of the present disclosure to understand the method and the system for providing enhanced file security for personal health record files with reduced storage space in cloud and is accompanied drawing. This illustration is intended to enable you in understanding the disclosure and should not be construed as limiting the disclosure's breadth, scope, or applicability. This illustration is provided to aid in understanding the disclosure and should not be construed as limiting the disclosure's breadth, scope, or applicability. Some elements and/or components, on the other hand, may be excluded from embodiments, while others may be used in ways other than those depicted in the drawings. Depending on the context, a single language can describe a plurality of components or elements, and vice versa.
[0014] Referring to Figure 2, illustrates Flow Chart of the present Invention comprising of Registration(201), Profile Creation (202), Access Policy (203), Cipher Text (204),
Compression (205), Cloud Storage (206), and Decryption (207), in accordance with another exemplary embodiment of the present disclosure and the invention is not limited to this drawing, and is used to understand the flow of the present invention in encrypting the personal health record and decrypting the health records, this illustration is intended to enhance understanding of the disclosure and should not be interpreted as restricting the disclosure's scope, nature, or applicability.
[0015] Referring to Figure 3, illustrates Normal and Compress Storage Chart, in accordance with another exemplary embodiment of the present disclosure to help understand the compress effects on the storage of cloud. The invention is not limited to this drawing, and this illustration is provided to aid comprehension of the disclosure and should not be construed as restricting the disclosure.
[0016] Referring to Figure 4, illustrates Profile Creation in File Security System, in accordance with another exemplary embodiment of the present disclosure, shows the creating profile by the Patient user in the present disclosure and uploading personal health records, the invention is not limited only to this drawing, and this illustration is provided to assist comprehension of the disclosure and should not be construed as restricting the depth, nature, or applicability of the disclosure.
[0017] Referring to Figure 5, illustrates Login Screen of File Security System, in accordance with another exemplary embodiment of the present disclosure shows the login access to the present disclosure, the invention is not limited only to this drawing, and this illustration is provided to assist comprehension of the disclosure and should not be construed as restricting the depth, nature, or applicability of the disclosure.
DETAIL DESCRIPTION OF INVENTION
[0018] The invention will become more well-known as a result of the following extensive description, and objects other than those listed below will become apparent. This description is based on the drawings that are attached. As a result of the following complete description, the invention will become more well-known, and objects other than those stated below will become apparent. This section describes the drawings that come with the innovation. It's also worth noting that additional or alternative precautions should be taken. When embodiments are provided, a skilled person in the art will be able to fully understand the current disclosure. In order to provide a thorough understanding of embodiments of the current disclosure, certain specifics relating to various components and processes are described. As those versed in the art will understand, the information provided in the embodiments should not be interpreted as limiting the scope of this disclosure. The order of stages revealed in this invention's process and technique should not be interpreted as implying that they must be performed in the order described or represented. Alternatives or extra steps should be considered as well.
[0019] Referring to Figure 1, illustrates the present invention and main embodiment of current disclosure that is Enhanced File Security System with Reduced Cloud Storage for Personal Health Records comprising of Personal Health Record (101), 2-Digit Hex ASCII (102), Binary Conversion (103), Rotation (104), Trusted Authority (105), Key Conversion (106), Key-Bit Rotation (107), XOR Operator (108), Cipher Text (109), Compression (110), Cloud Storage (111), and Decryption (112); provides enhanced file security for personal health record files with reduced storage space in cloud. The Personal Health Record files are sensitive files contains the sensitive data related the person or the patient. The medical problems, medical procedures done, health condition, and any medicine related information which is suitable or unsuitable is present in the personal health record files. In some health records there will be the information about the family health history, and habits. The present disclosure specifically taken personal health record files contains patient's age, patient gender, patient health problem description, doctor prescription, lab reports, and medicine usage details. Nowadays, all businesses use cloud services to store their data because cloud servers offer services at a lower cost and do not require any infrastructure setup. Secure encryption and storage of Personal Health Records on a cloud server allows health-care administrators to have quick access to all patients' records at any time, allowing them to treat patients on time. Storing personal health records on third-party cloud servers raises security concerns about data tampering and unauthorized access. Various encryption techniques such as Advanced, Data Encryption Standards (AES, DES), Triple DES, and others have been introduced to provide security to cloud data. However, all of these techniques require a lot of computation to generate public and private keys for patient data encryption, and if patient data is shared with multiple users such as nurses, lab technicians, and physicians, multiple keys will be required. If the patient grants access or authorization to a wide range of users, individual keys will be generated and distributed to them.
[0020] From the Personal Health Record (101) file, the text is extracted as characters and is converted by 2-Digit Hex ASCII (102). The 2-Digit Hex ASCII (102) converts the text of health record into 2-Digit Hexadecimal Code which is further converted into the binary digits by the Binary Conversion (103). With this module, the input Personal Health Record (101) file text extracted is converted into binary form, means represented into the binary. Here each text character is converted into 8-bit form of binary. Now the binary form representation is Rotated (104) circularly over left by one bit. The bits corresponding to all the character are rotated circularly over left by one bit position. The Trusted Authority (105) is the personal health care administration authority or hospital management authority generates public key for encrypting the Personal Health Record (101) file securely, and distribute the public key to the patient user. Patients receive keys from The Trusted Authority (105) to encrypt data, and sharing users can obtain keys from The Trusted Authority (105) to decrypt data. Following key generation, the patient can encrypt the data, which will be decrypted and accessed by shared users. The generated public key is converted into binary by Key Conversion (106), the binary conversion convert each key into of length 8-bits. The Key-Bit Rotation (107) is performed to rotate the key bits into right over one-bit position. The generated key by Trusted Authority (105) is converted into binary form and the Personal Health Record (101) file is converted into binary form on other end. The XOR Operator (108) performs XOR operation between the generated key and the health record file to produces Cipher Text (109). The Cipher Text (109) is the encrypted Personal Health Record (101) file. While encryption, the user access policy also included in the Personal Health Record (101) file regarding the access permissions provided to the sharing user. This encrypted Cipher Text (109) contains public key, Personal Health Record data, and access policy details. The Compression (110) is performed on the encrypted data to reduce storage space required for encrypted data to be stored in the cloud. The personal health care administration authority or hospital management authority will required large amount of memory in the cloud to store record files as the large number of healthcare services are provided by them is increasing every day. More number of files storage required more space, so the compression is used herein to reduce the size of the encrypted file. This compression will reduce the size in small amount only, even with this reduction huge cost is reduced. The lossless data compression is performed with Zip file format. The compressed files are stored in the Cloud Storage (111) at cloud server securely. The securely stored files will be decrypted with Decryption (112) by the shared user. Sharing users will be given public keys, and they will be able to generate private keys using their access policies. If an encrypted cypher text file contains the shared user name, with generated private key and the distributed public key files are decrypted. Sharing users will be given public keys, and they will be able to generate private keys using their access policies. If an encrypted Cipher Text (109) file contains the shared user name, generated private key and the distributed public key are used to decrypt the file. The present invention involves four separate users: a patient, a doctor, a nurse, and a lab technician. Patients must first register with the system, after which they will upload medical information and give authorization to the doctor, nurse, or lab technician. Doctors can register and log in to the system, giving them access to the data of patients who have agreed to share their information with them. After reviewing the patient's information, the doctor may prescribe medications, lab tests, or nurse monitoring. The Nurse can register and log in to the system to keep track of all of the patients who have been suggested by the doctors. If the patient grants permission, the nurse has access to all medical records. The Lab Technician can login and register in to the system, where they can view and exchange patient data as well as add lab results for patients who have been suggested by their doctor.
[0021] Referring to Figure 2, illustrates Flow Chart of the present Invention comprising of Registration(201), Profile Creation (202), Access Policy (203), Cipher Text (204), Compression (205), Cloud Storage (206), and Decryption (207); give the flow of implementation of the Enhanced File Security System. In the present invention all the users such as patient, doctor, nurse, and lab technician can register (201) with their names, age, and Gender. Once registered with the system, they should create their profiles (202) by providing the personal health information and access policy (203). While creating the profile, user has to mention their date of birth, and name properly. The Access Policy (203) should be mentioned while creating profile based on which only the shared user can access his files. By login personal health record file need to be uploaded into the system. Now the Enhanced File Security System will generates Cipher Text (204) which is the encrypted file contains personal health record file along with the public key. The Cipher Text (204) is compressed by the lossless compression file format that is Zip to save Cloud Storage (206) required, further decreases the cost of maintaining the cloud server. The Stored encrypted files are decrypted by Decryption (207) with private key generated by the shared users mentioned in the user access policy.
[0022] Referring to Figure 3, illustrates Normal and Compress Storage Chart, in accordance with another exemplary embodiment of the present disclosure to help understand the compress effects on the storage of cloud. The Normal and Compress Storage Chart shows the storage size required to store the cipher encrypted test before and after compression in KB. This drawing clearly illustrates that there is a small amount of storage saved because of the compression of the encrypted data. Sometimes small amount of storage space save large expenses against the cloud server maintenance.
[0023] Referring to Figure 4, illustrates Profile Creation in File Security System, in accordance with another exemplary embodiment of the present disclosure, shows the creating profile by the Patient user in the present disclosure and uploading personal health records. While creating the profile, user need to provide details such as Name, age, gender, Date of Birth, Health problem description, and access policy specifying the shared user. In the present invention the sensitive personal health record of the patient is uploaded, patient creates profile by providing the health problem description as stomach pain, and access to the health record is provided to a doctor, a nurse, and a lab technician. Any user can create profile by selecting new patient tab.
[0024] Referring to Figure 5, illustrates Login Screen of File Security System, in accordance with another exemplary embodiment of the present disclosure shows the login access to the present disclosure. By entering the user name and password which is created at the time of profile, user patient can login into the system. Once patient click on login, the system will show the view profile and view prescription. The view profile will show patient details and personal health record files uploaded. The view prescription provides the suggested prescription for the patient by the doctor.
Encryption and storage of Personal Health Records on a cloud server allows health-care administrators to have simple access to all patient records at any time, allowing them to give timely treatment to patients.
[0025] Several specific details are provided in the above exemplary description in order to provide a more detailed understanding of embodiments of the invention. In contrast, an ordinary skilled person may recognize that the existing innovation can be implemented without including any of the specific data presented here. There are several primary embodiments that are used to secure personal health records. The invention describes how the modules are organized and implementation of the encryption for security. The order of stages revealed in this invention's process and technique should not be interpreted as implying that they must be performed in the order described or represented. Alternatives or extra steps should be considered as well.

Claims (5)

ENHANCED FILE SECURITY SYSTEM WITH REDUCED CLOUD STORAGE FOR PERSONAL HEALTH RECORDS CLAIMS We claim:
1. Enhanced File Security System with Reduced Cloud Storage for Personal Health Records comprising of Personal Health Record (101), 2-Digit Hex ASCII (102), Binary Conversion (103), Rotation (104), Trusted Authority (105), Key Conversion (106), Key-Bit Rotation (107), XOR Operator (108), Cipher Text (109), Compression (110), Cloud Storage (111), and Decryption (112); provides enhanced file security for personal health record files with reduced storage space in cloud.
2. Enhanced File Security System with Reduced Cloud Storage for Personal Health Records as claimed in claim 1, wherein the text is extracted from the Personal Health Record (101) file as characters and is 2-Digit Hexadecimal Code which is further converted into the binary digits by the Binary Conversion. The binary form representation is Rotated (104) circularly over left by one bit. The bits corresponding to all the character are rotated circularly over left by one bit position.
3. Enhanced File Security System with Reduced Cloud Storage for Personal Health Records as claimed in claim 1, wherein Trusted Authority (105) generates public key for encrypting the Personal Health Record (101) file securely, and distribute the public key to the patient user to encrypt data, and sharing users can obtain keys from The Trusted Authority (105) to decrypt data. The generated public key is converted into binary by Key Conversion (106), the binary conversion convert each key into of length 8-bits. The Key-Bit Rotation (107) is performed to rotate the key bits into right over one-bit position.
4. Enhanced File Security System with Reduced Cloud Storage for Personal Health Records as claimed in claim 1, wherein XOR Operator (108) performs XOR operation between the generated key and the health record file to produces Cipher Text (109), it contains public key, Personal Health Record data, and access policy details.
5. Enhanced File Security System with Reduced Cloud Storage for Personal Health Records as claimed in claim 1, wherein the Compression (110) is performed on the encrypted data to reduce storage space required for encrypted data to be stored in the cloud; the lossless data compression is performed with Zip file format. The generated private key and the distributed public key are used to decrypt the file based on the access policy created at the time of profile creation.
AU2021106398A 2021-08-22 2021-08-22 Enhanced file security system with reduced cloud storage for personal health records Ceased AU2021106398A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021106398A AU2021106398A4 (en) 2021-08-22 2021-08-22 Enhanced file security system with reduced cloud storage for personal health records

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021106398A AU2021106398A4 (en) 2021-08-22 2021-08-22 Enhanced file security system with reduced cloud storage for personal health records

Publications (1)

Publication Number Publication Date
AU2021106398A4 true AU2021106398A4 (en) 2021-11-25

Family

ID=78610560

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021106398A Ceased AU2021106398A4 (en) 2021-08-22 2021-08-22 Enhanced file security system with reduced cloud storage for personal health records

Country Status (1)

Country Link
AU (1) AU2021106398A4 (en)

Similar Documents

Publication Publication Date Title
Seol et al. Privacy-preserving attribute-based access control model for XML-based electronic health record system
Chen et al. Secure dynamic access control scheme of PHR in cloud computing
US8627107B1 (en) System and method of securing private health information
Sharma et al. RSA based encryption approach for preserving confidentiality of big data
Zala et al. PRMS: design and development of patients’ E-healthcare records management system for privacy preservation in third party cloud platforms
US20070180259A1 (en) Secure Personal Medical Process
Ganiga et al. Security framework for cloud based electronic health record (EHR) system
Thummavet et al. A novel personal health record system for handling emergency situations
KR101022213B1 (en) Method and apparatus for sharing and secondary use of medical data based on multi-proxy re-encryption
Satar et al. Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme
Ajagbe et al. Empirical evaluation of efficient asymmetric encryption algorithms for the protection of electronic medical records (EMR) on web application
Omotosho et al. A secure electronic prescription system using steganography with encryption key implementation
Korde et al. Securing personal health records in cloud using attribute based encryption
AU2021106398A4 (en) Enhanced file security system with reduced cloud storage for personal health records
Yadav et al. A Survey on Secure Cloud-Based E-Health Systems.
Rai et al. Patient controlled Pseudonym-based mechanism suitable for privacy and security of Electronic Health Record
Warren et al. Securing EHRs via CPMA attribute-based encryption on cloud systems
Boumezbeur et al. Improving privacy-preserving healthcare data sharing in a cloud environment using hybrid encryption
Shibu et al. Secure Storage and Retrieval of Electronic Health Records
Singh et al. Healthcare data privacy measures to cure & care cloud uncertainties
Vidya et al. Secured Personal Health Records transactions using homomorphic encryption in cloud computing
Chondamrongkul et al. Secure mobile cloud architecture for healthcare application
Fitri et al. Secure attribute-based encryption with access control to data medical records
Khandare et al. Enhancing privacy and security in medical information with AES and DES
Islam et al. A framework for providing security to Personal Healthcare Records

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry