MediSheild: Revolutionizing Health Data Privacy and Smart Record Retrieval

Abstract

In medical management, more and more information technologies are applied to improve work efficiency. For example, the hospital information management system is used to carry out a patient’s basic information and medical management, the wrist one-dimensional QR Code is employed to quickly read or input a patient’s identity (ID) and so on. Information technology brings convenience while at the same time there are certain secure drawbacks in several typical scenarios because of immature technology or management vulnerability, such as, the reports transparency leaks user privacy, access to view the medical privacy record is not strictly controlled, infusion confirmation is without technical authentication, patient wrist ID is easy to be forged, payment is not convenient and so on. The security issues are further analyzed as follows. Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical networks (WMNs). Current WMN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. The main contribution of this paper is to distribute patient’s data securely in data servers and performing the cryptosystems to perform statistical analysis on the patient data without compromising the patient’s privacy.

Country : India

1 Om Suryawanshi2 Adnan Tamboli3 Ganesh Kute4 Prof. Diksha Yedke5 Prof. Prachi Patil

  1. Student, Department of Information Technology, G. H. Raisoni College of Engineering and Management, Pune, Maharashtra, India
  2. Student, Department of Information Technology, G. H. Raisoni College of Engineering and Management, Pune, Maharashtra, India
  3. Student, Department of Information Technology, G. H. Raisoni College of Engineering and Management, Pune, Maharashtra, India
  4. Asst. Professor, Department of Information Technology, G. H. Raisoni College of Engineering and Management, Pune, Maharashtra, India
  5. Asst. Professor, Department of Information Technology, G. H. Raisoni College of Engineering and Management, Pune, Maharashtra, India

IRJIET, Volume 9, Issue 4, April 2025 pp. 302-306

doi.org/10.47001/IRJIET/2025.904042

References

  1. A.Sawand, S. Djahel, Z. Zhang, and F. Naït-Abdesselam, “Toward Energy-Efficient and Trustworthy eHealth Monitoring System,” China Commun., vol.12, no. 1, pp. 46-65, Jan. 2015.
  2. M. S. Shin, H. S. Jeon, Y. W. Ju, B. J. Lee, and S. P. Jeong, “Constructing RBAC Based Security Model in u-Healthcare Service Platform,” The Scientific World J., vol. 2015, Article ID 937914, 13 pages, http://dx.doi.org/10.1155/2015/937914, 2015.
  3. Wang, B. Zhang, K. Ren, J. M. Roveda, C. W. Chen, and Z. Xu. “A Privacy-aware Cloud-assisted Healthcare Monitoring System via Compressive Sensing,” in Proc. of 33rd IEEE INFOCOM, 2014, pp. 2130-2138.
  4. M. Rushanan, A. D. Rubin, D. F. Kune, and C. M. Swanson, “SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks,” in Proc. of 35th IEEE Symp. on Security and Privacy, 2014, pp. 524-539.
  5. C. Bekara and M. Laurent-Maknavicius, “A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks,” in Proc. of 3rd IEEE Int. Conf. on Wireless and Mobile Computing, Networking and Communications (WiMOB 2007), 2007, pp. 59-59.
  6. P. T. Sivasankar and M. Ramakrishnan, “Active key management scheme to avoid clone attack in wireless sensor network,” in Proc. of 4th Int. Conf. on Computing, Communications and Networking Technologies (ICCCNT'13), 2013, pp. 1-4.
  7. A.Marcos, J. Simplicio, H. I. Leonardo, M. B. Bruno, C. M. B. C. Tereza, and M. N¨aslund, “Secour Health: A Delay-Tolerant Security Framework for Mobile Health Data Collection,” IEEE J. Biomedical and Health Informatics (IEEE Trans. INF TECHNOL B), vol. 19, no. 2, pp. 761-772, Mar. 2015.
  8. R. X. Lu, X. D. Lin, and X. M. (Sherman) Shen, “SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency,” IEEE Trans. Parall. distr., vol. 24, no. 3, pp. 614-624, Mar. 2013.
  9. A.Amirbekyan and V. Estivill-Castro, “A New Efficient Privacy-Preserving Scalar Product Protocol,” in Proc. of Sixth Australasian Conf. Data Mining and Analytics (AusDM ’07), 2007, pp. 209-214.
  10. A.C.F. Chan, "Symmetric-Key Homomorphic Encryption for Encrypted Data Processing," in Proc. of 2009 IEEE International Conference on Communications (ICC '09), 2009, pp.1-5.
  11. C. C. Zhao, Y. T. Yang, and Z. C. Li, "The Homomorphic Properties of McEliece Public-Key Cryptosystem," in Proc. of 2012 Fourth International Conference on Multimedia Information Networking and Security (MINES'12), 2012, pp.39-42.
  12. J. Reid, I. Cheong, M. Henrickson, and J. Smith, “A novel use of RBAC to protect privacy in distributed health care information systems,” in Proc. of 8th Australasian Conf. on Information Security and Privacy, 2014, pp. 403-415.
  13. J. Mirkovic, H. Bryhni, and C. Ruland, “Secure solution for mobile access to patient’s health care record,” in Proc. 13th IEEE Int. Conf. e-Health Netw. Appl. Serv., 2011, pp. 296-303.