Sign In to Follow Application
View All Documents & Correspondence

System/Method For Secure Transaction Of Electronic Health Records Using Block Chain Technology Sha Algorithm

Abstract: The adoption of healthcare systems by healthcare providers, including hospitals and general practitioners, is not an exception. A patient's electronic health record (EHR) contains information about the patient's medical history, including diagnoses, treatments, and diagnostic tests, as well as demographic data like age, gender, weight, and insurance coverage. Sharing medical data securely, without resulting in leakage of patient data, is one of the largest issues in healthcare systems because such data are often sensitive and have to be protected from unauthorised access. The proposed method makes use of electronic health records (EHRs) to facilitate the exchange of sensitive medical information, such as Chest X-ray MedPix pictures. The suggested SHA256 cryptographic hashing algorithm improves patient data security by making it impossible for an attacker to revert the hashing process. The reason for this is that SHA256 employs a verifiable key that may check the new password against the authentication that has been received. When compared to other popular encryption methods like Searchable Encryption, Ethereum's Distributed Ledger for Smart Contracts, Decentralised Security Architecture based on Software-Defined Networking (SDN), and Elliptic Curve Cryptosystems (ECC), the proposed SHA256 Verifiable Key (SHA256-VK) executed more quickly and required less average block time. 3 Claims & 2 Figures

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
30 September 2023
Publication Number
42/2023
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

MLR Institute of Technology
Laxman Reddy Avenue, Dundigal-500043

Inventors

1. Mrs. Shruti Patil
Department of Information Technology, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043
2. Dr. Venkata Nagaraju Thatha
Department of Information Technology, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043
3. Mr. B. VeeraSekharreddy
Department of Information Technology, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043
4. Dr. Nagireddy Venkata Rajasekhar Reddy
Department of Information Technology, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043

Specification

Description:SYSTEM/METHOD FOR SECURE TRANSACTION OF ELECTRONIC HEALTH RECORDS USING BLOCK-CHAIN TECHNOLOGY - SHA ALGORITHM
Field of Invention
Recently, blockchain technology has become more popular for securely exchanging electronic health records (EHRs) among healthcare participants. The shared ledger is duplicated across all of the participating nodes, resulting in scalability concerns when additional nodes join the network and acquire a full copy of the ledger's current state of affairs. A delay in the verification of transactions is unacceptable in a sensitive setting such as the healthcare industry. Patients who have many caregivers must be able to efficiently exchange their medical history in order to get better treatment. People (patients and their physicians) and individuals and a stakeholder (patients to insurance companies/research institutions) are all significant stakeholders in the healthcare ecosystem, and it is critical that health information be shared across them. Sharing electronic health records (EHRs) is a crucial step in increasing the interoperability of healthcare providers and transforming the healthcare system into one that is smart and efficient
Background of the Invention
Ahead to the introduction of brilliant contacts on the blockchain, the majority of the contentions around Electronic Wellbeing Record (EHR) The board focused on whether to utilize cloud foundations, neighbourhood brought together frameworks for capacity and sharing EHRs, or a combination of both. To take utilization of these incorporated frameworks, every clinic and medical care organization would be needed to store information on premises in privately controlled constructions and data sets. Although centralised EHR management systems have several advantages, they also have some disadvantages, which are listed below: There is no patient control: The data does not belong to the patients, and they have no control over it. Patients should be the ones who own and manage their data. Records that are dispersed: As patients seek care in a variety of settings, the records get dispersed as well. As a result, the information gets jumbled (US20210279736A1). System interoperability is limited due to the fact that various hospitals and health institutions use different systems. As a result, there are integration and interoperability challenges to contend with. Inconvenient secure sharing: Regularly, the system of trading wellbeing information is convoluted and tedious, making it hard for patients to take part. An encoded move between a sender (for instance, an E.R. doctor) and a beneficiary is given through a solid email standard known as Immediate, which is used in the US.
A section of the literature on electronic health records management tackles these issues by suggesting centralised frameworks and mechanisms for exchanging electronic health records on cloud infrastructures, among other things. Despite the fact that these frameworks provided answers to many of the issues described above, they were still subject to constraints, particularly in terms of openness, data ownership, and personal data protection (US8856546B2). A further problem with the centralised model of EHR administration is that it fails in crisis and catastrophe situations since the reaction to an emergency is often uncoordinated and fragmented. Natural disasters, notwithstanding their rarity, provide particular challenges for the healthcare industry, which must be prepared and capable of reacting to a crisis in a timely manner. Flooding, tsunamis, and earthquakes, for example, have the potential to damage facilities and infrastructures, consequently restricting access to patient records and other patient-related information. When compared to centralised models, this is one of the explanations offered to explain how decentralising the administration of EHRs and duplicating and distributing the information will provide higher performance and availability in crisis situations.
Decentralized framework is an appropriated network where nobody element has unlimited authority over the information and exercises, yet in which decisions are settled on cooperatively through a consensus-based decision-production method. The gatherings that make up the organization are alluded to as hubs, and they connect with one another by means of message passing. To put it another way, by sharing and duplicating information, the organization guarantees accessibility and versatility, which is especially significant in case of far and wide disappointments. P2P frameworks, on the other hand, may even give information possession since the private information can be kept and gotten to only by the restrictive hub, which thus can be gotten to only by the exclusive hub. In spite of the fact that it has been inspected in the writing, building up arrangement while keeping up with anonymity, security, and exactness has shown to be a troublesome assignment. The rise of square chain Tech. makes it achievable to do this while keeping up with anonymity while additionally offering security and detectability
Summary of the Invention
Hospitals and general practitioners are no different when it comes to the healthcare methods they use. A patient's electronic health record (EHR) contains information about the patient's medical history, including diagnoses, treatments, and diagnostic tests, as well as demographic data like age, gender, weight, and insurance coverage. Sharing medical data securely, without resulting in leakage of patient data, is one of the largest issues in healthcare systems because such data are often sensitive and have to be protected from unauthorised access. The proposed study makes use of electronic health records (EHRs) to facilitate the exchange of sensitive medical information, such as Chest X-ray MedPix pictures. The proposed SHA256 cryptographic hashing algorithm improves data security by making it impossible for an adversary to recover data that has been hashed using the approach. The reason for this is that SHA256 employs a verifiable key that may check the new password against the authentication that has been received.
Brief Description of Drawings
Figure 1: Architecture of Blockchain
Figure 2: Block diagram of the Research Model
Detailed Description of the Invention
The blockchain design is isolated into six levels, which are displayed in Figure 1 as a various levelled structure. The information layer, the organization layer, the consensus layer, the contract layer, the assistance layer, and the application layer are the layers that make up the OSI model of the PC framework. The information layer and the organization layer are respected to be lower levels of abstraction that produce, confirm, and store information. The upper level of the design is at the actual top of the progressive system, and it incorporates the assistance and application stage . The consensus and contract layers give as a connection between the lower and more significant levels of a progressive construction. Evidence of Work (PoW), Confirmation of Stake (PoS), Assigned verification of stake (DpoS), and Verification of Byzantine Adaptation to internal failure (PoBFT) are the essential components of the consensus layer (PBFT). Wise contracts, consensus orders, and motivation instruments are all essential for the contract layer's functionality.
When it comes to receiving and storing raw data, the Data Layer comprises the Data Block, Chain Structure, Timestamps and the Merkle Tree. It also contains encryption and other security measures. The information block is a metadata structure that is utilized to chronicle intuitive information and information, in which the crude information should be additionally sifted to be put away in blocks. The information block doesn't unmistakably demonstrate the previous information and ensuing information in the information construction, and it only utilizes the intuitive public key and mark; accordingly, every interaction is autonomous of the others, and a binded relationship is shaped only at the coherent level of the information structure. It contains timestamps just as information about the data sources and results.
The organization layer is responsible for the administration of parcel tending to and directing between unmistakable actual switches. Making a distributed (P2P) network is refined when at least two PCs are connected and share assets without the requirement for a different server PC to be set up. The endpoints are interlaced to create a network that does not have a defined topology, and each node is capable of transmitting and validating information. Each node is equipped with a routing mechanism, which ensures that network data is distributed correctly.
A settlement on a solitary information esteem or a solitary condition of the organization among scattered cycles or multi-specialist frameworks is accomplished through the work of an issue lenient method known as a consensus system. The systems intended to guarantee the accuracy and consistency of information held by all hubs in a circulated record are known as dispersed record confirmation components. The more the dispersion of the decision framework, the lower the effectiveness of arriving at a consensus, however the more prominent the satisfaction and solidness of the decision framework.
The contract layer is included for the most part of various types of content code and calculations that are fundamental for the functioning of the blockchain framework, just as more confounded smart contracts, just as different components. In the blockchain framework, the contract layer is a rationale, calculation, or decide procedure that is set up at the lower part of the blockchain to consider adaptable programming and operational information operations to be performed.
In addition to offering types of assistance for upper-level particular application administrations, the help layer is a blend of low level information and computational instruments. The help stage is generally worked by firms on their own drive. Some IT organizations are beginning to concentrate their endeavours on the improvement of blockchain-based stage advancements. For instance, IBM's Sky blue BaaS14 and Linux's Hyperledger are both blockchain advances.
Coming up next are the essential working cycles of the blockchain: Someone demands a transaction by means of the utilization of a gadget known as a wallet. All taking an interest PCs in the specific blockchain network get notification of the transaction, which is communicated to them all. Everyone's PC in the organization looks at (approves) the transaction against a bunch of validation rules that have been set up by the organization's originators for that specific blockchain. Transactions that have been approved are set in a square and fixed with a lock (hash). When different PCs in the organization check that the lock on the square is exact, this square is added to the blockchain. Verification of Work and Confirmation Stake are two techniques for demonstrating your work. Since the transaction has been added to the blockchain, it can presently don't be changed in any way.
A protected hashing calculation (SHA) 256 is the hash function and mining technique utilized by the Bitcoin convention. It alludes to a cryptographic hash function that delivers a worth that is 256 pieces long and might be utilized to mine bitcoins. Other than being used for transaction verification, it likewise serves to control the foundation and administration of addresses. Bitcoin utilizes twofold SHA-256, which implies that the hash calculations are applied twice all the while. A variation of the SHA-2 (Secure Hash Calculation 2) calculation, which was made by the National Security Office, is utilized in the calculation (NSA). SSL, TLS, and SSH, just as open source working frameworks like Unix/Linux, utilize the SHA-256 hashing calculation. The hash strategy is staggeringly secure, and the subtleties of how it functions are not known to the overall population. It is utilized by the US government to shield delicate information in view of its ability to confirm the content of information without unveiling it inferable from the utilization of advanced marks. It is utilized by the public authority to ensure touchy information. Besides, it is utilized for secret phrase verification since it needn't bother with the putting away of explicit passwords in light of the fact that the hash esteems might be kept up with and contrasted with the client contribution to decide if it is legitimate or erroneous. Truly, it is essentially hard to decide the first information from a hash esteem alone. Besides, because of the gigantic measure of potential combinations, an animal power approach is incredibly probably not going to be effective for this situation. Moreover, it's entirely unrealistic that two information things (known as collisions) would have a similar hash esteem simultaneously.
System design for the proposed healthcare framework is shown in Figure 2, which calls for a web-based application with two ends: a front end that interacts with patients and a back end that facilitates internal communication via the use of blockchain Tech. The specific request serves as a connecting point between these two endpoints. By demonstrating web-based interactions between patients and suppliers, the suggested healthcare architecture becomes more intelligible to everyone. There are entities that are joined together as a system of nodes during the execution of the back end, where the block chain communication process takes place.
SHA-256, as other hash functions, acknowledges any info and makes a result (commonly alluded to as a hash) that has a set length (in this way the name). It has no effect in case the info is a solitary word, an entire sentence, a page from a book, or a whole book; the result of a hashing calculation, for example, SHA256 will consistently be a similar length regardless the information is. Specifically, it will be 256 pieces, which is 32 bytes, and will be introduced as 64 alphanumeric letters on the screen. In all cases, the results appear to be absolutely irregular and give no knowledge into the information that produced them
Its determinism (it will consistently make a similar outcome when given a similar information) and one-way nature are two additional critical properties of SHA-256 to consider. From the information on the outcome, there is no capacity to figure out a contribution to something different. At last, SHA-256 is computationally effective, permitting a conventional PC to execute the method handfuls, if not hundreds, of times each second on a solitary processor. The SHA-256 calculation is fundamental since it is utilized in the Bitcoin organization, just as numerous other Confirmation of Work blockchain networks, to mine digital money. Its importance is featured by the way that Bitcoin (BTC) was the world's first blockchain and is today the greatest virtual cash as far as all out-market capitalization. The SHA-256 hashing calculation was quick to be used for transaction verification on a blockchain network, which worked on a Proof of Work consensus system. Recollect that Bitcoin was not the principal Proof of Work framework, which is an urgent distinction to make.
3 Claims & 2 Figures , Claims:The scope of the invention is defined by the following claims:

Claim:
The System/Method for Secure Transaction of Electronic Health Records Using Block-Chain Technology -SHA Algorithm comprising the steps of:
a) Designed a technique that has to implement Sharing of Healthcare Records.
b) Adopted a method for Sharing Imaging in Healthcare.
c) Designed an algorithm that encrypts the images.
2. The Secure Transaction of Electronic Health Records Using Block-Chain Technology - SHA Algorithm as claimed in claim1, Picture Offer Organization (ISN) is used to determine the issues that have emerged in the RSNA organizations.
3. The Secure Transaction of Electronic Health Records Using Block-Chain Technology - SHA Algorithm as claimed in claim1, adopted Secure Hash Algorithm (SHA) to encrypt the images.

Documents

Application Documents

# Name Date
1 202341065923-REQUEST FOR EARLY PUBLICATION(FORM-9) [30-09-2023(online)].pdf 2023-09-30
2 202341065923-FORM-9 [30-09-2023(online)].pdf 2023-09-30
3 202341065923-FORM FOR STARTUP [30-09-2023(online)].pdf 2023-09-30
4 202341065923-FORM FOR SMALL ENTITY(FORM-28) [30-09-2023(online)].pdf 2023-09-30
5 202341065923-FORM 1 [30-09-2023(online)].pdf 2023-09-30
6 202341065923-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [30-09-2023(online)].pdf 2023-09-30
7 202341065923-EVIDENCE FOR REGISTRATION UNDER SSI [30-09-2023(online)].pdf 2023-09-30
8 202341065923-EDUCATIONAL INSTITUTION(S) [30-09-2023(online)].pdf 2023-09-30
9 202341065923-DRAWINGS [30-09-2023(online)].pdf 2023-09-30
10 202341065923-COMPLETE SPECIFICATION [30-09-2023(online)].pdf 2023-09-30