IEEE | Blockchain for Giving Patients Control Over Their Medical Records | DHS Informatics
Summary
TLDRيتناول الفيديو مشروعًا جديدًا يعتمد على تقنية البلوك تشين لإعطاء المرضى السيطرة على سجلاتهم الطبية. يشرح الاختلاف بين البلوك تشين والتخزين السحابي، مشيرًا إلى أن البلوك تشين يوفر أمانًا أعلى حيث يمكن التحقق من البيانات ومنع التلاعب بها. المشروع يركز على السجلات الصحية الإلكترونية (EHR) ويستخدم تشفيرًا متماثلًا وغير متماثل. يوضح الفيديو أيضًا كيف يمكن للمرضى التحكم في من يمكنه الوصول إلى سجلاتهم من الأطباء أو وكلاء التأمين. يتميز النظام المقترح بالأمان العالي وسهولة الوصول إلى المعلومات.
Takeaways
- 🛡️ يركز المشروع على استخدام البلوكشين لإعطاء المرضى التحكم في سجلاتهم الطبية.
- 🖥️ الفرق بين البلوكشين والحوسبة السحابية هو أن البلوكشين يضمن عدم العبث بالمعلومات بواسطة تتبع التحولات من خلال بصمة رقمية (hash).
- 🔐 البلوكشين يوفر أمانًا أكبر لأنه يسمح بالتحقق من الأصالة ويكشف أي تغييرات غير مصرح بها في السجلات.
- 📝 المشروع يتناول السجلات الصحية الإلكترونية (EHR) والرقابة التي يمكن للمرضى ممارستها على الوصول إلى بياناتهم.
- ⚙️ تم بناء المشروع باستخدام Java (J2EE) وتقنيات مثل Servlet وJSP، مع قاعدة بيانات MySQL وخادم Tomcat.
- 🔑 يمكن استخدام طرق تشفير متماثل أو غير متماثل لضمان أمان السجلات الطبية المخزنة في النظام.
- 💾 يتم تخزين البيانات الصحية في شكل مشفر في النظام، ويمكن للمرضى تحديد من يمكنه الوصول إلى هذه البيانات باستخدام نظام تحكم بالوصول.
- 📊 النظام الحالي يعاني من تحكم محدود في الوصول، بينما النظام المقترح يعتمد على البلوكشين للتحكم الأفضل.
- 🌐 المشروع يستخدم شبكة بلوكشين مخصصة ولا يعتمد على Ethereum أو Hyperledger لأغراض تعليمية وأكاديمية.
- 🔄 المشروع يوفر وصولًا سريعًا وآمنًا للسجلات الطبية، مع إمكانية تحكم كاملة للمريض في من يمكنه الاطلاع على بياناته.
Q & A
ما هو المشروع الذي يناقشه النص؟
- المشروع يناقش استخدام تقنية blockchain لمنح المرضى التحكم في سجلات طبيتهم الإلكترونية.
متى تم إطلاق هذا الموضوع IEEE؟
-تم إطلاق هذا الموضوع IEEE في نوفمبر عام 2020.
ما الفرق بين blockchain و cloud storage؟
-يوفر cloud storage一个地方来加密 وتخزين البيانات، لكن blockchain يوفر طريقة لمعرفة ما إذا تم نقل البيانات وتحديد الأصل.
كيف يمكن لتكنولوجيا blockchain أن تساعد في حماية سجلات المرضى؟
-تتضمن كل سجل blockchain رمزًا مشفر للسجل السابق، مما يساعد على التحقق مما إذا تم تعديل أي سجل.
ما هي التكنولوجيا المستخدمة في هذا المشروع؟
-تستخدم التكنولوجيا في المشروع blockchain، hybrid cloud،Servlet،JSP،Java،MySQL،Tomcat،对称加密技术,以及SHA 256GB hashing technique.
لماذا لم يتم استخدام Ethereum أو Hyperledger في هذا المشروع؟
-لأن المشروع هو مشروع أكاديمي، يطلب المدرسين مشاهدة الكود المصدري والتقنيات الأمنية والتشفيرية المستخدمة، مما يصعب عرضه إذا تم استخدام Ethereum أو Hyperledger.
ما هو الهدف من تخزين سجلات الصحة الإلكترونية؟
-يخزن سجل الصحة الإلكترونية المعلومات الطبية للأشخاص بشكل رقمي، مما يسمح لهم بالحصول عليها في أي وقت.
ما هي الأنواع الأساسية من التشفير المستخدمة في هذا المشروع؟
-يتضمن المشروع تشفير متناغم حيث يستخدم نفس المفتاح لتشفير وفك التشفير، وتشفير غير متناغم حيث يستخدم كل من الشخص والشخص الآخر مفاتيح مختلفة.
ما هو نظام التحكم في الوصول في هذا المشروع؟
-يسمح نظام التحكم في الوصول بشخص بتحديد السجل الذي يمكن لشخص آخر الوصول إليه.
كيف يبدو النظام الحالي للتخزين الإلكتروني للسجلات الطبية؟
-يعتمد النظام الحالي على التخزين السحابي و对称加密对称解密، لكنه لا يتضمن blockchain أو نظام التحكم في الوصول.
كيف يعمل النموذج المقترح في هذا المشروع؟
-يتضمن النموذج المقترح 15 خطوات، تبدأ من تسجيل الأطباء والمراكز الطبية من قبل الإدارة، وارسال السجل السري للمريض، ثم تخزين السجل في blockchain من قبل المريض، وطلب الأطباء للوصول إلى السجل، ومنح الموافقة، وارسال مفتاح الإعادة التشفير، والحصول على البيانات من IPFS.
Outlines
💡 Blockchain for Medical Records Control
The speaker introduces an IEEE project on blockchain technology aimed at giving patients control over their medical records. The project, released in November 2020, discusses the security issues with cloud storage where hackers can decrypt and alter data. Blockchain is presented as a solution to verify data integrity and authenticity. The project uses blockchain to ensure that electronic health records (EHR) and patient health records (PHR) are secure and under patient control. The speaker also explains the technical aspects, including the creation of a cryptographic hash for each block, which acts as a fingerprint to detect tampering. The technology stack includes Java, MySQL, Tomcat, and cryptographic techniques like AES and SHA-256. The project avoids using Ethereum and Hyperledger to facilitate transparency and educational value, focusing on a user-defined blockchain.
🔐 Access Control and Digital Health Records
The second paragraph delves into the concept of electronic health records (EHR) and the importance of digital storage for easy access. It contrasts symmetric and asymmetric encryption methods, explaining how they apply to record storage and access. The paragraph introduces access control in cryptographic systems, allowing patients to dictate who can access specific records. The existing system's limitations are highlighted, including a lack of blockchain integration and access control, leading to less secure patient data. The proposed system, called the Inflammatory File System, allows patients to store records on a blockchain and control access. A detailed 15-step process is outlined, from registration by a regulatory agency to the doctor requesting and receiving patient records. The system promises enhanced security, quick access, and user-friendliness, storing all information electronically for reliability.
Mindmap
Keywords
💡Blockchain
💡IEEE
💡Medical Records
💡Encryption
💡Hybrid Cloud
💡EHR
💡IPFS
💡Cryptography
💡Access Control
💡Symmetric Cryptography
💡Asymmetric Cryptography
Highlights
Introduction to IEEE 2020 project on blockchain for medical records
Explaining the difference between blockchain and cloud storage
The issue of data security in cloud computing
Advantages of blockchain in data integrity and verification
Importance of blockchain in patient control over medical records
Definition of Electronic Health Record (EHR) and Patient Health Record (PHR)
Invitation to subscribe to the channel for updates
Description of blockchain structure and function
Role of cryptographic hash in blockchain security
Technology stack used in the project: J2EE, MySQL, Tomcat
Use of cryptography techniques: AES, RSA, and SHA-256
Decision to use a user-defined blockchain for academic transparency
Importance of privacy in electronic health records
Types of encryption used: symmetric and asymmetric
Concept of access control in cryptographic systems
Comparison with existing systems lacking blockchain and access control
Proposed system: Inflammatory File System for patient-controlled records
Process flow involving admin, hospital, patient, and doctor interactions
Advantages of the proposed system: security, quick access, user-friendly
Call to action for likes, shares, and subscriptions
Contact information provided for further queries
Transcripts
dear all
welcome to dhs informatics in this
lesson
i am going to cover you latest ieee
project on blockchain
the title of the project is blockchain
for giving
patients control over their medical
records
it is a very latest topic it is an ieee
2020
topic november month release
actually what is the difference between
blockchain and
cloud we can able to
encrypt and store the data into cloud
storage
that is only safe but nowadays hackers
are there
they are very very brilliant they are
decrypting the data in the cloud and
change the content
again encrypt and store it back so that
we only doesn't know
whether the content is changed or not
that is a big headache with the
cryptograph crypto data in cloud
computing
so that in blockchain we can able to
understand whether our data is
transferred or not
and we can able to identify which is the
original
that's also possible in blockchain so
that only blockchain is nowadays it is
having a more importance
we are going to see how this blockchain
going to
be useful in patient control
medical records that is we can simply
call ehr
ehr means electronic health record our
phr
patient health record all our comes
under same topic only
before entering into the main subject
you are not subscribed our channel
i am requesting you to subscribe our
channel by pressing the
subscribe button below this video and
press the bell icon so that you will get
the next
updates quickly and one more request
share this video
video in your whatsapp to other groups
thank you this project comes under the
domain blockchain
i already told you what is a different
between cloud computing and blockchain
here the blockchain is a growing list of
records
called blocks that are linked together
using cryptography
each block contains a cryptographic ash
of the previous
block a timestamp and a transaction data
for example
we are uploading here one file which is
called a transaction data that file will
be encrypted
before encryption we'll create that hash
code the dash code will be stored in the
header part of the block in the header
part
we are having the hash code we call it
as a row dash timestamp and one more
thing now
we'll store now this is a one random
number and apart from this thing we are
we are getting the previous block root
act
and we are storing in the current
blocker that is called previous block
ash code
so that this will help us to identify
whether the
block is tampered or not so that it is
called blockchain
the content of the one block will be
stored in the another block
in the form of hash code that is called
fingerprint of the block
so that the hackers are corrupting in
one block also
with the help of the fingerprint in
other block we can able to verify and
check whether this block is corrupted or
not that is a
big advantage in the blockchain
the technology used in these projects
are blockchain
hybrid cloud hybrid cloud means uh we
are using the private
private servers and the public server
the technology
used to build this project is a j2e that
is a java 2 enterprise edition
where we are using servlet jsp
coding language you say java and backend
is mysql
and we are using tomcat web server
definitely we have to use the
cryptography technique any cryptography
technique we can able to use
mostly symmetric cryptography aes
algorithm bas algorithm
or rc4 algorithm anything hashing
technique we are using sha 256gb which
is the
latest stacking technique that is used
under user defined blockchain user
defined blockchain in the sensor
we are not using ethereum and
hyperledger we are only creating the
our own blockchain why we are doing like
that means since
it is an academic project most of the
colleges the lecturers are asking
where the blocks are stored what
encryption technique you are using
what acting technique you are using like
that they will ask them to show the
coding
we are going with an ethereum and
hyperledger it is not possible
to show that part so that only we are
using user defined blockchain it is a
more beneficial to the students and the
introduction introduction i told you it
is a electronic health recorder
nowadays privacy is very important uh
suppose i am asking your own patient uh
where is your uh
record five years before you did a ct
scan
give me that record means he is not
having because it is in a paper he
misplaced here and there
but those are stored in a cloud storage
or in a centralized server he can able
to fetch it whenever he need it no
so that the concept of storing the
health record
in in digital form it is called the
electronic health record come into the
picture okay
so that in in this type we are having a
two types of encryption also allowed
symmetric and asymmetrical symmetric in
the sense
the pattern only storing the record he
only taking the record back means he can
use the symmetric encryption that is a
encryption decryption with the same key
whereas the patient is storing the
record in a cloud storage
and he is giving the access to the other
people means he will encrypt with one
key
and he give the decryption key to the
other doctor
insurance agent like that that is called
asymmetric encryption
then next to one concept is coming it is
called access control based uh
uh a cryptograph system what is in the
access control basically he can a person
can able to control
which record can able to taken by which
person
this doctor can able to take these four
files my
this insurance agent can able to take
this uh uh seven files like that he can
able to control
the things it is called access control
based the file system
that only we are going to show we are
going to see in this
project the existing system are
they are having the encryption
decryption asymmetric things only
and they are storing in a cloud only
there is no concept of blockchain they
are used
there is no access control that is the
existing system so that it is having a
less security
patient access permission to ehs are
limited and the patient not able to
control most of the projects
doctors fully controlling for the
patient no projects
exist patients are controlling the
records like that so that only it is a
new idea
they come up with the proposed system
they are calling it as an
inflammatory file system in planetary
file system means implanted means
one kind of world in that world the
patient can able to store their file in
a blockchain format
and they can able to give the access
control to
whoever they want that thing can be
showed clearly in the next
in this diagram you can see now i will
tell that there are
15 steps are there i am going to say one
by one
first well i am going to say here the
regulatory agency that is admin
admin can able to register the doctor
and
he will register the pay center and he
can able to give the
registration details to the patient okay
the hospital is sending the records to
the patient
the patient use a patient for is sending
the records to the patient
five person can able to upload the
record into blockchain that is called
ipfs uh inflammatory file system
there they will store the things up once
the files are stored into the blockchain
doctor six request for for the recorder
doctor may request the patient i need
your record like that
then what will happen the patient will
give the
accept request that is the thing okay i
am allowing you to access
this record like that so that doctor
what you can able to do
after the thing he sends the
re-encryption key the patient has to
give the if key
to decrypt the data to for to give the
doctor to the server
the server will send a request to the
ipfs
and get the data 10th evil it will get
the encrypted data
and decrypt and it will send it to the
doctor doctor can able to decrypt again
to read the data clearly this is the
process going to happen in this system
it is clearly we have done these things
in our project
and the advantage of the proposed system
providing the accurate uh
security and uh we are enabling the
quick access of the passenger car
we are giving the security as well as it
is a quick
uh more secure and user friendly and uh
electronic information all the things
are stored in the electronic
way so that it is safer and more
reliable
if you like this video i am requesting
you to
press the like button and share this
video in your whatsapp group to other
friends
who are need this project and you have
any
any query for this project type it in an
um
comment with your email id i can able to
send the details to you
you are not subscribed this channel
please subscribe visit our website www
feel free to call us on 988 92401
or 98451.6723
thank you for listening this video
5.0 / 5 (0 votes)