International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-11,Issue-12  ( Dec, 2023 )
  2. Volume-11,Issue-11  ( Nov, 2023 )
  3. Volume-11,Issue-10  ( Oct, 2023 )
  4. Volume-11,Issue-9  ( Sep, 2023 )
  5. Volume-11,Issue-8  ( Aug, 2023 )
  6. Volume-11,Issue-7  ( Jul, 2023 )
  7. Volume-11,Issue-6  ( Jun, 2023 )
  8. Volume-11,Issue-5  ( May, 2023 )
  9. Volume-11,Issue-4  ( Apr, 2023 )
  10. Volume-11,Issue-3  ( Mar, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 133
Paper Published : 1552
No. of Authors : 4025
  Journal Paper


Paper Title :
AES Encryption for Secure Storage and Transfer of Patient Health Records Using Block Chain Technology

Author :Farheen Hasan, Amarsinh Vidhate, Dhananjay Dakhane

Article Citation :Farheen Hasan ,Amarsinh Vidhate ,Dhananjay Dakhane , (2023 ) " AES Encryption for Secure Storage and Transfer of Patient Health Records Using Block Chain Technology " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 9-31, Volume-11,Issue-9

Abstract : Due to the quick pace of technological development, internet communication has established itself as the main method of intercontinental contact. A wireless channel is used for such communication, which is seen as being commonplace in nature. Private messages can be transmitted between groups of individuals using this wireless channel. Protecting this data usually becomes a top priority in such a situation. Here is when the idea of cryptography comes into play. AES and DES are used by the network‟s terminals to store patient health records securely. Later, patients add new health assets and recover old ones from the network using the provided special key. The network is made up of multiple decentralised machines that will record a cryptographic public ledger of all transactions involving sensitive health data using block Chain technology. Largescale data generation provides considerable opportunities to improve both individual care and healthcare de- livery. Data transformations must be traceable in order to guarantee that patient data is accurate. Without the traceability process, patients and healthcare professionals lack the trust necessary to exchange this information, which further prevents the discovery of novel treatments for diseases. So it appears to be a disruptive idea to use block Chain technology to improve those systems. The primary objective of this thesis, however, is to create a block Chain-based system for securely storing and exchanging essential health assets. The suggested model describes a possible combination of an AES/DES encryption key pair with a block Chain network. As a result, the writers of this thesis describe the features of encryption techniques, as well as their advantages and disadvantages, as well as some of the applications in the actual world. They also think of creating a functional block Chain ledger to keep track of every transaction. In contrast, the server website encrypts and decrypts data between the user and the client using the DES and AES algorithms. A communication session is established between the server and the client throughout the key creation process using AES and DES. In the later stages, a block Chain ledger is used to further secure the communication that has already been established between the server webpage and the client side. The model‟s implementation of AES and DES is the only criteria used to compare it to other systems. The final model is put into use in the cloud, and measures like time complexity and phase complexity are used to assess its performance. Keywords - KNN, Block Chain, DES, Cryptography I. INTRODUCTION A technique known as an “internet key exchange” is in charge of producing secret keys connected to data security procedures taking place in a communication network. The most important communication between a client and a server occurs during this exchange. The term”providing an additional layer of security to facilitate the flow of sensitive data across unreliable private networks” is IKE, which stands for ”internet key exchange.” This thesis gives a full overview of the relevant methods and approaches utilised to protect the data they are linked to. IKE, on the other hand, is commonly viewed as a hybrid protocol that manages all key generation and management activities that happen within a private network. It is typically explained as a method for exchanging keys during the encryption and decryption process on an unsafe network, such as the InternetIKE aims to provide a secure encryption technology and to process it in a way that enables its use in vulnerable environments. It is believed that IKEs were developed in the late 1990s with the sole purpose of securely exchanging the

Type : Research paper

Published : Volume-11,Issue-9


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-20141   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 28
| Published on 2023-12-04
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY