Sei sulla pagina 1di 48

I Smart

ntr Healthcare
od System
uct
io
n

Chapter 1

Introduction

1
I Smart
ntr Healthcare
od Chapter 1 System
uct
io Introduction
n

This chapter will introduce the reader with Efficient Method of Preserving Medical
Data based on Cloud Computing and IoT. It will highlight the topics like the description of the
project and the former formulation of the problem behind it as well as what motivated the
makers to take a decision to make this project and its related problem solutions and thus
covering up the scope of the project.

About:

In the healthcare industry, NFC can make a significant difference by providing


faster retrieval of the patient’s medical data. Additionally, it provides access to medical
history along with emergency medical details. NFC card is used to fetch the patient's data
from cloud storage (Amazon Web Service) which can be directly accessible to the doctor for
further assessment. The major concern of any medical hospital or clinic integrating with this
system is the security of their sensitive data. Hence, one of the main contributions of our
paper is providing security to medical data. In order to double the degree of security, we are
making use of AES 256 algorithm twice, firstly to hide the identity of the medical data and
secondly the default AES 256 encryption provided by the AWS. AES generates a 256-bit
long cryptographic ciphertext using the block cipher algorithm which has 1.1*10^77 possible
combinations which makes it nearly impossible to hack. In this paper, we also emphasize on
providing an android application which encapsulates a number of medical services which is
required in case of an emergency and also includes secure access of medical information
enabling a renewed focus on patient-centered care.

2
I Smart
ntr
1.1 Description Healthcare
od System
uct
Healthcare iois a sector which has been gaining immense scrutiny nowadays. Various ongoing
advancements
n made in computing and network technologies have been stemming the domain of
medicine to grow from hospital centered towards wellbeing centered. The purpose of this project is to
present a detailed description of the product’s perspective giving information about the context and
interface constraints. The product functions section outlines major functionality application will
perform. The user characteristics section explains the expectations application has about the user. The
constraints section contains detailed descriptions of constraints and safety critical properties.

The application is part of a larger system consisting of a Medical Record repository


with three actors: Mobile phone User, User, and Healthcare Provider. The User interacts with
the Medical Record Repository through the application on the Phone over the Internet. The
User and Healthcare Provider both interact with the Medical Record Repository through a
Interface over the Internet.

Amalgamation of cloud computing and IoT is referred as CoT which aims to unfold
Things as services via applications. Most of the proposed cloud based iot heath care
monitoring framework includes three components i.e. data acquisition which uses sensors
and actuators, sending the captured data in real time which is due to the data transmission,
the data captured is sent to the data center of heath care organization in a more secured way
and the cloud processing is for visualization, analytics and storage. Our proposed system is a
suite of software which keeps track of patient’s health records delivering a low cost and
quality focused and time efficient treatment by speeding up the process of diagnosis.

3
I Smart
ntr Healthcare
od System
uct
1.2 Problem Formulation
io
n
The soul purpose of our project is to move from hospital centered to patient’s well
being centered care .Our aim is to address various problems faced in medical field by the
users and to make all the services accessible via their Smartphone in less time and in a cost
efficient manner.

1.3 Motivation

The amplifying issues regarding indispensable services, medical extremity and lack
of emergency services inspired us to develop an application in medical field which will
provide services and ease to users further simplifying doctors work to an extent. In addition
to bring the usability of wide range of services, one push of a button is provided especially in
the hour of need. Delivering healthcare services in a more efficient, smarter, quality focused
and patient centered as all the information of patient is available on the application into
operational working model has made us to think to develop this project so as to simplify the
process of updation of documents peripheral to make the efficient application for the end
user. Our proposed system is a suite of software which keeps track of patient’s health records
delivering a low cost and quality focused and time efficient treatment by speeding up the
process of diagnosis.

4
I Smart
ntr Healthcare
od
1.4 Proposed Solution System
uct
io
In this system we make use IOT to provide unique identification and fetch information
n
by using NFC. Efficient Method of Preserving Medical Data Based on Cloud Computing, in
which the database will be maintained accordingly and no human efforts will be wasted for
the same. And Android/iOS Platform to build user friendly application capable for several
lifesaving and monitoring tasks.
Cloud Computing to store, secure and access a large amount of data on cloud and
Also, the smart card will be provided to patients so they do not have to carry all the medical
documents. They only have to carry smart card through which a doctor access the medical
documents stored at cloud. Application will provide different access level and admin rights.
In case of an emergency (accident) nearby access of ambulance/hospitals will be easily
available to patient. Certain issues like sustaining medical documents, requisite information,
indispensable services & medical extremity will be eradicated by speeding up the
process of diagnosis, and limiting unnecessary doctor and hospital visits to cut down on
taxing resources.

1.5 Scope of the project

This Personal Medical Record application, is used to capture personal medical


history. This application will be designed to provide a simple and reliable way to store and
convey one’s medical history. Upon the event of an emergency, medical information would
have to be acquired from the patient’s current doctor or family for any informed, safe
procedure. Application would alleviate the need to track down this medical history because
it would be readily available. Doctors or the updation by Pathology lab of information would
be easily done to the patient’s account at any time, including an appointment, with the
patient’s consent.

5
I Smart
ntr Healthcare
od More specifically, will contain extensive documentation of the patient’s medical
System
records,
uct which can be accessed by the owner or the owner’s healthcare provider(s). This
includes
io diagnoses, treatments, medications, allergies, and medical procedures. Application
would
n allow for uniform communication of information between the patient and their
respective doctor(s). The software would label and organize information authored by health
care providers separately from information authored by the patient to maintain authenticity.

6
R Smart
eview of Healthcare
Literature System

Chapter 2

Review of
Literature

7
R Smart
eview of Healthcare
Literature Chapter 2 System

Review of Literature
Here we will elaborate the aspects like the literature survey of the project and what
all projects are existing and been actually used in the market which the makers of this project
took the inspiration from and thus decided to go ahead with the project covering with the
problem statement.

2.1 Literature Survey

The work by Renyou MEI and Xiaoli QIU have emphasized on introducing the
concept of cloud computing into the medical information system[1], by designing a concept
which applies the generic medical data management structure in order to improve the
effectiveness and medical service. Their proposed system drew lessons on distributed storage
and efficient processing of general medical data by provides data management services for
users.
In paper[2] the author proposes that for accumulating the therapeutic data
history, which may inculcate huge intermedia big data such as radiology images, blood
reports etc to be store on cloud. Their organization allows the connection to the electronic
medical records (ERM) and provides confidentiality of the information in the cloud. Pairing
based cryptography is an algorithm that generates a session key amongst the participants and
it introduces an authenticated key exchange protocol which is a one round tri party repo
process, and allows the communication securely.

In paper[3] Functional design of healthcare which is a nfc based system has


proposed the improve access to patients medical documents and history which is updated
automatically, and in our record the knowledge is been added.
In paper[4] a scheme is implemented that is the efficient sharing of medical data.
To overcome the user’s privacy issues and the limitation of computing power of smart
terminals attribute based encryption is utilized to enable data sharing in this system. By this
the security and the performance analysis of the IOT is improved as it securely enables the
data processing and sharing.

8
R Smart
eview of Healthcare
Literature In paper[5]the author emphasizes the need to preserve theSystem
patients privacy during
the collection of data. Identity based encryption [IBE] which is similar to the Boneh-Franklin
cryptosystem in terms of security algorithm and has the root on bilinear maps of elliptic
curves is the model used for encryption which allows sharing of data on big data platform
efficiently by providing data for research and future references maintaining the privacy of
patient.
In paper[6] for the transaction of the payment through mobile, the author have
developed a security solution over NFC radio interface. NFC doesn’t have any specification
related to the communication security. Therefore the devices which have limited memory and
CPU resources, the author uses symmetric cryptographic fundamentals as the solution, which
leads to the security of Near Field Communications and also proves that the solution is
simple, cost effective, scalable and also minimizes the refinement of computational
overheads.
In paper[7] authors have developed a technology of NFC which is a clarification
,that prevents medication errors such as false medication, wrong patient, miscalculated time,
erroneous dose and misguided routes. During the administration stage of medication ,error
occurs which would lead to series issues in the medication process related to a patient,
deteriorating the condition of the person.In such case the application alarms the staff or the
nurse prior to carry out the aid to the patient and also provides an alternative to nurse which
allows him/her to alarm the physician who has prescribed the aid.
.

9
R Smart
eview of Healthcare
2.2 Problem Statement:
Literature System

Never before in history have health care systems had access to such an enormous
armamentarium of diagnostic procedures, treatment options, and resources to improve the
health care of individual patients and the health of populations. At the same time, health care
providers find themselves faced with an ever-growing loss of autonomy. In parallel,
throughout the world, the systems of health care delivery and financing are increasingly
subject to resource constraints.
Thus a need has arisen to find a balance between the evolving opportunities for
improved care and the current and future constraints – in particular, as there are strong reasons
to believe that the explosive growth of health care opportunities has not been matched by a
corresponding growth in rational resource allocation. From the scarcity of resources available
in social health care systems follows an ethical imperative that decision-makers will choose
wisely, consider the opportunity costs of these choices, and accept accountability for
reasonableness of their actions.
Designing a smart healthcare system by implementing NFC and AWS to
authenticate patient’s identity and store their data securely. The legitimate users will have
access to their medical documents which is stored in an encrypted form in S3 which avoids
unauthorized access.

1
0
R Smart
eview of Healthcare
Literature System

1
1
S Smart
ystem Healthcare
Analys System
is

Chapter 3

System Analysis

1
2
S Smart
ystem Healthcare
Analys Chapter 3 System
is
System Analysis
System Analysis will cover the topics like the Functional, Non-Functional and the
specific requirements of the project and touching all the software and the hardware
requirements as well.

3.1 Requirements

This section contains all of the functional and quality requirements of the system.
It gives a detailed description of the system and all its features.

3.1.1 Functionality

This section includes the requirements that specify all the fundamental
actions of the software system.

Extract Patient Record from the CLOUD

3.1.1.1 Introduction:

Many features make sense to include at the venue. In this phase, the dataset that we
stored record were extracted from the cloud. These data contain records about the patient.
The input for this step would be ID of the Patient that we extracted from the NFC card.

3.1.1.2 Processing

We would use custom SQL queries to get the data or features which are relevant
and required for predicting the outcome. This step will remove all the unwanted data and
reduce overhead. This will also help remove missing values and redundancy
Output:

The output would be a new table in which the columns are the different features
that are necessary to predict the patients record.

1
3
S Smart
ystem . Healthcare
Analys System
is
3.1.2 Usability

3.1.2.1 Graphical User Interface

The system shall provide a uniform data and look between all the
services of the application. The system shall provide a digital image for each
photo of the patient in the profile. The system shall provide use of icons and
toolbars.

1
4
S Smart
ystem Healthcare
Analys System
is
3.1.3 Reliability & Availability

3.1.3.1 Back-end Internal Computers

The system shall provide storage of all databases on redundant


computers with automatic switchover.

The system shall provide for replication of databases to off-site storage


locations.

3.1.3.2 Internet Service Provider

The system shall provide a contractual agreement with an internet service


provider who can provide 99.999% availability through their network facilities onto
the internet.

3.1.4 Performance

The product shall be based on application.The product shall take initial load
time depending on internet connection strength which also depends on the media from
which the profile it runs.The performance shall depend upon hardware components
of the patient.

3.1.5 Security

3.1.5.1 Data Transfer

The system shall confirm all read/updation of data with patient’s application
or ID.

1
5
S Smart
ystem Healthcare
Analys System
3.1.5.2 Data Storage
is

The system’s back-end database will be stored in the cloud and all the data
will be retrieved by the patient. The system’s back-end servers shall only be
accessible to authenticated administrators.

1
6
S Smart
ystem Healthcare
Analys
3.1.6 Interfaces System
is
There are many types of interfaces as such supported by application system
namely; User Interface, Software Interface and Hardware Interface.

3.1.6.1 User Interfaces

A. User interface includes various forms and updation of profile. The product will exist
on a web system. The Interface will be a simple graphical user interface in java. There
would be input fields to enter the personal information such as medical history,
procedures, and medications and also to store the most recent copy of information in
its application data folder.

The interface will visualize the features and functionalities listed in this
document for these systems as included below but not limited to:

 Drop down menu for various option selection

 Selection list for filtering results

 Help button

The user interface for the software shall be compatible to any


browser such as Internet Explorer, Mozilla or Google Chrome by which user
can access to the system.

The user interface shall be implemented using any tool or software


package like PHP, etc.

3.1.6.2 Hardware Interfaces

 The absolute minimum requirements for PC is originally a Intel Pentium processor or


above, 2 GB of RAM, and 1 GB of storage.

1
7
S Smart
 Arduino + NFC 522 Module.
ystem Healthcare
Analys System
is

1
8
S Smart
ystem Healthcare
Analys Software Interfaces
3.1.6.3 System
is

The android application will need to interface with the cloud database to extract
the feature set from the huge amount of data.
Developing apps for Android includes the following requirements.

 The Android SDK

 Apache Ant (Another Neat Tool), an open-source tool that automates aspects of the
Android build process.
 Gradle (An advanced build toolkit that manages dependencies and allows to define
custom build logic.)
 Maven(It is a build automation tool, it addresses two aspects of building software:
first, it describes how software is built, and second, it describes its dependencies.

3.1.6.4 Communications Interfaces

The communication between the different parts of the system is important since
they depend on each other. However, in what way the communication is achieved is not
important for the system and is therefore handled by the underlying operating systems.
Application communicates with the database i.e. the cloud storage to gain the easy access of
information.

3.4 Use case diagram of the proposed system

A use case diagram is a graphic depiction of the interactions among the elements
of a system. A use case is a methodology used in system analysis to identify, clarify, and
organize system requirements. The use case is made up of a set of possible sequences of
interactions between systems and users in a particular environment and related to a particular
goal.

1
9
S Smart
ystem Healthcare
The actor one i.e. patient logs into the system to use or access services provided or
Analysthe medical documents by decrypting it which has been uploaded
view System by the doctor or
is
medical officials i.e. actor two in an encrypted format.

2
0
S Smart
ystem Healthcare
Analys System
is

Figure 3.4.1: Use Case diagram for Smart Healthcare

2
1
A Smart
nalysis Healthcare
Modelling System

Chapter 4

Analysis Modeling

1
5
A Smart
nalysis Healthcare
Chapter 4
Modelling System

Analysis Modeling

All the aspects of the proposed system will be covered in this chapter in the diagrammatic manner
and provides the detailed manner of the system.

4.1 Class Diagram

The class diagram is a static diagram. It represents the static view of an application. Class diagram is
not only used for visualizing, describing and documenting different aspects of a system but also for
constructing executable code of the software application. The class diagram shows a collection of classes,
interfaces, associations, collaborations and constraints. It is also known as a structural diagram.

The class diagram describes the attributes and operations of a class and also the constraints imposed
on the system. The class diagrams are widely used in the modelling of object-oriented systems because they
are the only UML diagrams which can be mapped directly with object-oriented languages.

So the purpose of the class diagram can be summarized as:

 Analysis and design of the static view of an application.

 Describe responsibilities of a system.

 Base for component and deployment diagrams.

 Forward and reverse engineering.

1
6
A Smart
nalysis Healthcare
Modelling System

Figure 4.1.1: Class diagram for Smart Healthcare System.

1
7
A Smart
nalysis Healthcare
Modelling System

4.2 Sequence Diagram

The Sequence Diagram models the collaboration of objects based on a time sequence. It shows how
the objects interact with others in a particular scenario of a usecase. With the advanced visual modelling
capability, you can create complex sequence diagram in few clicks. Besides, VP-UML can generate
sequence diagram from the flow of events which you have defined in the use case description.

Figure 4.2.1.2: Sequence diagram for SMART HEALTHCARE(at healthcare center)

1
8
A Smart
nalysis Healthcare
Modelling System

Sequence of Operation of the system(Fig.2)

1. Patient provides with all the information needed by the admin in order to issue the smart
health card (MIFARE).
2. The Admin of the System write the data i.e the patient's name and the unique key (UID)
provided to him/her on the smart health card
3. Using the AES algorithm, the Admin encrypts the UID provided by the patient as well
as writes it on a blank NFC card and initializes the document (PDF) on Amazon cloud. The PDF,
stored in a bucket on AWS will contain all the medical information and reports of a patient. The name
of the pdf will be set exactly the same as the UID of the patient.
4. The Admin will thereafter sanction the NFC smart health card to the respective patient.
5. The patient visits the healthcare center with the smart health card for diagnosis or regular
checkup.
6. The System installed in the healthcare center scans the smart health card and fetches the
UID of the patient.
7. The System compares the scanned UID with the data (name of the pdf) stored on AWS.
8. If the UID of the patient matches with the name of the pdf, the patient is authenticated
and the data is retrieved from the cloud.
9. The data retrieved from the cloud will be available on the concerned
authority's(doctor/nurse/hospital staff) device for a read operation.
10. Authorized authorities can also perform a write operation on the data if needed.

4.3 Component Diagram

In the Unified Modelling Language, a component diagram depicts how components are wired together to
form larger components and or software systems. They are used to illustrate the structure of arbitrarily
complex systems. Component diagram demonstrates the connection between various components.

1
9
A Smart
nalysis Healthcare
Modelling System

Figure 4.3.1: Component diagram for Smart Healthcare system.

2
0
A Smart
nalysis Healthcare
Modelling System

4.4 Deployment Diagram

Deployment diagrams are used to visualize the topology of the physical components of a system where
the software components are deployed. So deployment diagrams are used to describe the static deployment
view of a system. Deployment diagrams consist of nodes and their relationships.

The name Deployment itself describes the purpose of the diagram. Deployment diagrams are used for
describing the hardware components where software components are deployed. Component diagrams and
deployment diagrams are closely related.

Figure 4.4.1: Deployment diagram for Smart Healthcare System

2
1
A Smart
nalysis Healthcare
Modelling System

4.5 Data flow diagram of the system

A data flow diagram (DFD) is a graphical representation of the "flow" of data through an information
system, modelling its process aspects. A DFDis often used as a preliminary step to create an overview of the
system, which can later be elaborated.

A two-dimensional diagram that explains how data is processed and transferred in a system. The
graphical depiction identifies each source of data and how it interacts with other data sources to reach a
common output.

Individuals seeking to draft a data flow diagram must (1) identify external inputs and outputs, (2)
determine how the inputs and outputs relate to each other, and (3) explain with graphics how these connections
relate and what they result in. This type of diagram helps business development and design teams visualize
how data is processed and identify or improve certain aspect

2
2
A Smart
nalysis Healthcare
Modelling System

Figure 4.5.2: Data Flow diagram for SMART HEALTHCARE System

2
3
D Smart
e Healthcare
s System
i
g
n

Chapter 5

Design

2
3
D Smart
e Healthcare
s Chapter 5 System
i
g Design
n

Design will elaborate the step by step flow of based on user Benchmark thus giving up
the detailed information as to the basic flow of the system.

5.1 Flowchart

Flowcharts are used in designing and documenting complex processes or programs. Like
other types of diagrams, they help visualize what is going on and thereby help the people to
understand a process, and perhaps also find flaws, bottlenecks, and other less- obvious
features within it. There are many different types of flowcharts, and each type has its own
repertoire of boxes and notational conventions. The two most common types of boxes in a
flowchart are:

 a processing step, usually called activity, and denoted as a rectangular box

 a decision, usually denoted as a diamond.

A flowchart is described as "cross-functional" when the page is divided into


different swimlanes describing the control of different organizational units. A symbol
appearing in a particular "lane" is within the control of that organizational unit. This
technique allows the author to locate the responsibility for performing an action or making a
decision correctly, showing the responsibility of each organizational unit for different parts
of a single process.

2
4
D Smart
e Healthcare
s System
i
g
n

Figure 5.1.1: Flowchart for SMART HEALTHCARE System.

5.2 Health Application

Health Applications allow all the healthcare providers to connect with each and every
patient, dynamically and quickly, reaching out to them according to their convenience. The
application (Fig.4) is made easy for end users to use as they can store and access their information
and can be used for various systems like phones, tablets etc. The app will engage with the patients,
offering them ubiquitous access to the products and services which serve as a part of user experience.
The user can store their past health records and the staff of the hospital can directly upload the patient’s
current reports and data according to the profiles. Basically,

2
5
A Smart
nalysis Healthcare
Modelling System

all the health records would be maintained which can be accessed anywhere and anytime by the patients, doctors
or recommendations can be provided. The Data will be secured as it would be encrypted so there would be no
security issues. With one touch click on “EMERGENCY" icon on Home screen, Emergency SMS of your
approximate location can be sent to the nearby ambulance services and even the notifications would be sent to
nearby hospitals.

2
6
A Smart
nalysis Healthcare
Modelling System

Chapter 6

Implementation
Details

2
7
A Smart
nalysis Healthcare
Modelling Chapter 6 System

Implementation Details

This chapter will give all the Implementation details and methods used to
implement the Application in brief.

6.1 Implementation

We have designed following algorithm which would be followed throughout the


implementation phase of this system

1. Start
2. Store the registration details in database

3. Authentication

If (user == already registered)

Compare the ID from NFC to values in database


4. If (authentication==successful)
Load user’s medical information
Else

Go to Step 2

5. Further, the information will be passed onto doctors for further examination
6. The doctor performs read only operation on information
7. In case of updation, doctor will perform write operation on the previous documents

i.e. appending the latest reports to the previous version of the reports
2
8. End
8
A Smart
nalysis Healthcare
6.1.1 Connecting the Database to JAVA application. System
Modelling

We have developed a java program that uses JDBC which is a Java API to connect
and execute the query with the database. This program connects our application to the
database which holds all the records and makes available the database remotely.

JDBC helps you to write Java applications that manage these three programming
activities:

1. Connect to a data source, like a database

2. Send queries and update statements to the database

3. Retrieve and process the results received from the database in answer to your query

Following inbuilt library file were used for pattern matching during the
development of program.

1. java.sql.Connection

2. java.sql.DriverManager

3. java.sql.PreparedStatement

4. java.sql.ResultSet

5. java.sql.SQLException

6. java.sql.Statement

JAVA Program from Database connectivity.

2
9
A Smart
nalysis Healthcare
package
Modelling System
jserialcomm_example; import
java.sql.Connection; import
java.sql.DriverManager; import
java.sql.PreparedStatement; import
java.sql.ResultSet;
import java.sql.SQLException;
import java.sql.Statement;
import java.text.SimpleDateFormat;
import java.util.Date;

public class DATABASE_ {


private Connection
connect = null; public
DATABASE_() {
try {
Class.forName("com.mysql.jdbc.Driver");
connect = DriverManager.getConnection("jdbc:mysql://localhost/pro?" +
"user=root&password=");

} catch (Exception e) {

3
0
A Smart
nalysis Healthcare
Modelling System.out.println("dbC1: "+e); System
}
}
public boolean dbOk() {
try {
Connection conn;
Class.forName("com.mysql.jdbc.Driver");
conn = DriverManager.getConnection("jdbc:mysql://localhost/pro?" +
"user=root&password=");
conn.close();
return true;
} catch (Exception e) {
System.out.println("dbC2: "+e);
}
return false;
}
public ResultSet readDataBase(String id) {
ResultSet resultSet = null;
try {
Class.forName("com.mysql.jdb
c.Driver"); Statement statementr = null;
statementr = connect.createStatement();
resultSet = statementr.executeQuery("SELECT * FROM employee_info WHERE
login_id = '" + id.trim() + "'");
} catch (Exception e) {
System.out.println("dbC3: "+e);
} finally {
}
return resultSet;
}
public String login(String id) {
ResultSet resultSet = null;
try {

3
1
A Smart
nalysis Class.forName("com.mysql.jdb Healthcare
Modelling
c.Driver"); Statement statementr = null; System
statementr =
connect.createStatement(); Date now =
new Date();
String[] parts = (new SimpleDateFormat("dd/MM/yyyy HH:mm:ss
a")).format(now).split(" ", 3);
resultSet = statementr.executeQuery("SELECT * FROM employee_service_info
WHERE login_id = '" + id.trim() + "' AND service_date = '" + parts[0].trim() + "'");
if (resultSet.next()) {
return
resultSet.getString("service_date")+","+resultSet.getString("login_time");
}
else{
Statement statementw = null;
statementw = connect.createStatement();
statementw.executeUpdate("INSERT INTO
`employee_service_info`(`service_date`, `login_time`, `login_id`) VALUES ('" +
parts[0] + "','" + parts[1].trim() + " " + parts[2].trim() + "','" + id.trim() + "')");

3
2
A Smart
nalysis Healthcare
Modelling } System
} catch (Exception e) {
System.out.println("dbC4: "+e);
} finally {
}
return "--:--:--";
}
private void close() {
try {
if (resultSet != null) {
resultSet.close();
}
if (statement != null) {
statement.close();
}
if (connect != null) {
connect.close();
}
Output
} catch (Exception e) {
}
}
}

Figure 6.1.1: DATABASE connectivity Status

3
3
A Smart
nalysis Healthcare
6.1.2 Reading the ID from the NFC card.
Modelling System

To fetch the id from the nfc card we have programmed our reader module to get
the data serially in our java program. This program is along with the UI which makes use
of JAVA Swing.

We had used Fazecast/jSerialComm library which was developed by author “ Will


Hedgecock “ from github.com , an open source library to connect the nfc Module to your
java program.

Code Snippet for Retriving the ID from the card.

3
4
A Smart
nalysis Healthcare
Modellingpublic static class SerialReader implements Runnable { System

InputStream in;
Strin
g t = "";

public SerialReader(InputStream in) {


this.in = in;
}

public void run() {


try {
while (true) {
i
nt ch;
t = "";
StringBuilder sb = new StringBuilder();
while ((ch = in.read()) != 13) {
sb.append((char) ch);
}
t = sb.toString();
jLabel17.setText("Database Connection OK");
app.con("A0
087CA6"); t = "";
}
} catch (Exception e) {
e.printStackTrace();
}
serialPort.closePort();
}
}
private void
jL(String g) {
jLabel17.setText(g);
3
}
5
private void con(String t) {
A Smart
nalysis Healthcare
Modelling try { System
ResultSet ID = yo.readDataBase(t);
if (ID.next()) {
jLabel10.setText(ID.getString("login_id"));
jLabel11.setText(ID.getString("employee_firstname") + " " +
ID.getString("employee_lastname"));

String[] tm =
yo.login(t).split(",", 2);;
jLabel14.setText(tm[0]);
jLabel15.setText(tm[1]);
} else {
jLabel10.setText("no
record found"); jLabel11.setText("no
record found"); jLabel12.setText("no
record found"); jLabel14.setText("no
record found"); jLabel15.setText("no
record found");
}
} catch (Exception e) {
System.out.println(e);
}
}
public static void main(String[] args) {
Date now = new Date();
String[] parts = (new SimpleDateFormat("dd/MM/yyyy HH:mm:ss
a")).format(now).split(" ", 3);
serialPort.openPort();
serialPort.setComPortTimeouts(SerialPort.TIMEOUT_READ_SEMI_BLOCKING,
100, 0);
inn = serialPort.getInputStream();
java.awt.EventQueue.invokeLater(new Runnable() {
public void run() {
new JFXPanel();
3
app = new JSerialComm_example();
6
app.setVisible(true);
}
A Smart
nalysis Healthcare
Modelling System

Figure 6.1.2: FETCHING the ID From the

3
7
R Smart
e Healthcare
f System
e
r
e
n
c
e
s

Chapter 9

Conclusion

3
8
R Smart
e Healthcare
f Chapter 9 System
e
r Conclusions
e
n
c
9.1
e Conclusion
s

We have proposed a Cloud-based NFC Smart Health Card System with the aim of
providing quality-focused patient-centered care. Every NFC card (MIFARE) has a unique
identification number (UID) of individual which helps the system to keep data confidential
and by card simulation technique the data is available within milli-seconds, which is helpful
in the case of an emergency. We use AES 256 algorithm to encrypt the UID and the Name
provided by the patient. Moreover, by saving his/her data under the same name on the cloud
makes it easier to retrieve the data while raising the level of security by avoiding the Man-in-
the-Middle attack. Introduction of AWS cloud in our system helps to store a large amount of
medical data and provides security of the information as it protects it from unauthorized users
by using AES and SSL protocol. It also enables the patient to access the data anywhere and
anytime.

9.2 Future Scope

We can credit these apps for being time-savers, speeding up the process of
diagnosis, and limiting unnecessary doctor and hospital visits to cut down on taxing
resources. The Doctor-Patient Relationship will be more Cooperative. There will be
better responses from doctor and patients towards the app.

3
9
R Smart
e Healthcare
f System
e
r References
e
n
c
1. [1] eRenyou MEI, Xiaoli QIU, “General Medical Information Management System Design Based on Cloud Computing,”
International Conference on Network and Information Systems for Computers 2016.
s
2. Hadeal Abdulaziz Al Hamid, Sk Md Mizanur Rahman,M. Shamim Hossain, Ahmad Almogren, and Atif Alamri, “A Security
Model for Preserving the Privacy of Medical Big Data in a Healthcare.
3. lthcare Cloud Using a Fog Computing Facility with Pairing-Based Cryptography”2017
4. Danco Davcev, Goran Jakimovski, ”Ergonomics Design of Healthcare NFC-based System, Procedia Manufacturing”, Volume
3, 2015, Pages 5631-5638, ISSN 2351-9789.
5. Kissi Mireku Kingsford, Fengli Zhang, Mensah Dennis Nii Ayeh, Armah MaryMargaret,” A Mathematical Model for a Hybrid
System Framework for Privacy Preservation of Patient Health Records,”2017.
6. Mohamad Badra, Rouba Borghol Badra,”A Lightweight security protocol for NFC based mobile payments,” Procedia
Computer Science, Volume 83, 2016, Pages 705-711.
7. Maali Alabdulhafith, Srinivas Sampalli,”NFC based framework for check-ing the five rights of medication
administeration,”Procedia Computer Science, Volume 37, 2014, Pages 434-438.
8. Mukhtar M. E. Mahmoud, Joel J. P. C. Rodrigues, Syed H. Ahmed, Sayed C. Shah, Jalal Al-Muhtadi, Valery Korotaev, Victor
H. Albuquerque, “Enabling Technologies on Cloud of Things for Smart Healthcare,” 2018.
9. Abdel Fattah Awad, Mohammed Bakri Bashir, Tawheed Hassan Ahmed , Adil Yousif, “Distributed Medical Image Retrieval
10. Techniques: A Review”, Sudan Conference on Computer Science and Information Technology (SCCSIT) 2017.
11. Stephanie Baker, Wei Xiang, Senior Member, IEEE, and Ian Atkinson “Internet of Things for Smart Healthcare: Technologies,
Challenges, and Opportunities,” 2017.

12. Wenbing Zhao , Xiong Luo and Tie Qiu “Smart Healthcare” Appl. Sci. 2017
13. Java Card™ Platform Security,
http://www.oracle.com/technetwork/java/javacard/documentation/javacardsecuritywhitepaper-149957.pdf
14. A. Vasquez , M. Huerta , R. Clotet ,R. Gonzlez , D. Rivas and V. Bautista,”Using NFC Technology for Monitoring Patients and
Identifica-tion Health Services”, Conference Paper in IFMBE proceedings ,October 2014.
15. Utsav Jambusaria, Neerja Katwala, Dharmeshkumar Mistry,”Secure smartphone unlocking using NFC”,Procedia Computer
Science, Volume 45, 2015, Pages 465-469.
16. B. Asma Khatoon and Dr. Ataul Aziz Ikram,”Performance Evaluation of RSA Algorithm in Cloud Computing Security”,
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 12 No. 1 Nov. 2014, pp. 336-345.
17. NFC and working of it,
https://www.androidauthority.com/what-is-nfc-270730/
18. Amazon Cloud Computing [AWS]
https://aws.amazon.com/what-is-cloud-computing/
19. Working on Android Identifiers
https://developer.android.com/training/articles/user-data-ids
20. D. Sethia, D. Gupta, T. Mittal, U. Arora and H. Saran, ”NFC based secure mobile healthcare system,” 2014 Sixth
International Conference on Communication Systems and Networks, Bangalore, 2014, pp. 1-6

4
0

Potrebbero piacerti anche