0% found this document useful (0 votes)
13 views

Project 1

This document discusses a project that aims to hide sensitive medical data by using hashing performed by a third party auditor. The project involves using hashing techniques to modify shared medical data in order to hide sensitive relationships and ensure privacy while still allowing for data analysis.

Uploaded by

fijeda4756
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Project 1

This document discusses a project that aims to hide sensitive medical data by using hashing performed by a third party auditor. The project involves using hashing techniques to modify shared medical data in order to hide sensitive relationships and ensure privacy while still allowing for data analysis.

Uploaded by

fijeda4756
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

HIDING SENSITIVE MEDICAL DATA USING

HASING BY THIRD PARTY AUDITOR


PROJECT REPORT

Submitted by
MEGANATHAN J (201171023)
NAVEEN S (201171027)
NITHYASEELAN M (201171030)
SANJAIY A (201171037)

in partial fulfillment for the award of the degree of

BACHELOR OF ENGINEERING
IN
CYBER SECURITY

Department of Cyber Security

MAHENDRA ENGINEERING COLLEGE


(Autonomous)

Mahendhirapuri, Mallasamudram, Namakkal Dt -637 503

APRIL -2024
MAHENDRA ENGINEERING COLLEGE
(Autonomous)

Mahendhirapuri, Mallasamudram, Namakkal Dt -637 503

Department of Cyber Security

BONAFIDE CERTIFICATE

Certified that this Project report “HIDING SENSITIVE MEDICAL


DATA USING HASING BY THIRD PARTY AUDITOR” is the bonafide
work of MEGANATHAN J (201171023), NAVEEN S (201171027),
NITHYSEELAN M (201171030), SANJAIY A (200272037) carried out
the Project work under my supervision.

SIGNATURE SIGNATURE

Dr.A.NEELA MADHESWARI., Ph.D., KS. ARUN., M.Tech.,

Head of the Department, Project Guide,


Cyber Security, Assistant Professor,
Mahendra Engineering College. Cyber Security,
Mahendra Engineering College.
MAHENDRA ENGINEERING COLLEGE
(Autonomous)

Mahendhirapuri, Mallasamudram, Namakkal Dt -637 503

DEPARTMENT OF CYBER SECURITY

CERTIFICATE OF PROJECT APPROVAL

This is to certify that the Project report titled “HIDING SENSITIVE MEDICAL

DATA USING HASING BY THIRD PARTY AUDITOR” is the approved record

of work done by MEGANATHAN J (201171023), NAVEEN S (201171027),

NITHYSEELAN M (201171030), SANJAIY A (200272037) in partial fulfilment for

the award of the Degree of B.E. Cyber Security during the academic year 2020- 2024.

SUPERVISOR HEAD OF THE DEPARTMENT

Date:

Submitted for the End semester viva voce examination held on __________

INTERNAL EXAMINER EXTERNAL EXAMINER


ACKNOWLEDGEMENT

We wish our heartful thanks to our respected Chairman Shri. M.G.Bharath


Kumar, M.A., B.Ed., for the blessing and constant support over our final year project
period.

We wish to express our sincere thanks to our respected Principal


Dr.R.V.Mahendra Gowda, M.Tech., Ph.D. (IITD)., Mahendra Engineering College,
for all the blessings and help provided during the period of final year project work.

We wish to express our sincere thanks to Dr.A.NEELA MADHESWARI., Ph.D.,


Professor and Head, Department of Cyber Security, for the continuous work and
excellent support over the period of final year project work.

We are indebted to our internal guide KS. ARUN., M.Tech., Designation Assistant
Professor, for his constant help and creative ideas over the period of final year project
work.

We are immensely indebted to our Project coordinators Dr.B.Kalaiselvi,


Associate Professor and A.Rajamurugan, Assistant Professor for their valuable
guidance, support and motivation during the entire course of the project, their timely
assistance and reviews went a long way towards the successful completion of this
project.
MAHENDRA ENGINEERING COLLEGE

(AUTONOMOUS)

DEPARTMENT OF CYBER SECURITY

VISION

 To provide cutting-edge cybersecurity tool designed to track down hackers with


precision.

MISSION

• To provide quality education in cyber security with specialized knowledge of


emerging trends

• To provide standards of cyber safety expertise using professional cyber security


culture

• To encourage research activities with skills to face cyber space challenges globally

• To enable students imbibe cyber ethics and enterprising quality to become socially
responsible technocrats
PROGRAM OUTCOMES (POs)

At the time of graduation, students from the Cyber Security program will possess:

Engineering Graduates will be able to

1. Engineering knowledge: Apply the knowledge of mathematics, science,


engineering fundamentals, and an engineering specialization to the solution of
complex engineering problems.
2. Problem analysis: Identify, formulate, review research literature, and analyse
complex engineering problems reaching substantiated conclusions using first
principles of mathematics, natural sciences, and engineering sciences.
3. Design/development of solutions: Design solutions for complex engineering
problems and design system components or processes that meet the specified needs
with appropriate consideration for the public health and safety, and the cultural,
societal, and environmental considerations.
4. Conduct investigations of complex problems: Use research-based knowledge and
research methods including design of experiments, analysis and interpretation of
data, and synthesis of the information to provide valid conclusions.
5. Modern tool usage: Create, select, and apply appropriate techniques, resources,
and modern engineering and IT tools including prediction and modelling to
complex engineering activities with an understanding of the limitations.
6. The engineer and society: Apply reasoning inform informed by the contextual
knowledge to assess societal, health, safety, legal and cultural issues and the
consequent responsibilities relevant to the professional engineering practice.
7. Environment and sustainability: Understand the impact of the professional
engineering solution societal and environmental contexts, and demonstrate the
knowledge of, and need for sustainable development.
8. Ethics: Apply ethical principles and commit to professional ethics and
responsibilities and norms of the engineering practice.
9. Individual and team work: Function effectively as an individual, and as a member
or leader in diverse teams, and in multidisciplinary settings.

10. Communication: Communicate effectively on complex engineering activities with


the engineering community and with society at large, such as, being able to
comprehend and write effective reports and design documentation, make effective
presentations, and give and receive clear instructions.
11. Project management and finance: Demonstrate knowledge and understanding of
the engineering and management principles and apply these to one’s own work, as a
member and leader in a team, to manage projects and in multidisciplinary
environments.
12. Life-long learning: Recognize the need for, and have the preparation and ability to
engage in independent and life-long learning in the broadest context of
technological change.

PROGRAM EDUCATIONAL OBJECTIVES (PEOs)

The graduates of Cyber Security will be able to,


PEO1 - Good communication, leadership and entrepreneurship skills

PEO2 - Expertise on advanced computer technologies to become competitive

PEO3 - The habit of learning and nurture the research attitude

PEO4 - The ability to work in a team with professional ethics

PROGRAM SPECIFIC OUTCOMES (PSOs)

Engineering Graduates will be able to

1. Ability to understand the basic concepts and methodologies of computing


techniques.

2. Ability to apply engineering knowledge to design and develop computerized


solutions by selecting appropriate technology to solve the problems.

3. Ability to use engineering practices and standard strategies in various domains


by providing different approaches towards career success.

ABSTRACT

Advances in data collection, storage, and processing in e-Health systems have


recently increased the importance and popularity of data mining in the health care field.
However, the high sensitivity of the handled and shared data, brings a high risk of
information disclosure and exposure. It is therefore important to hide sensitive
relationships by modifying the shared data. This major information security threat has,
therefore, mandated the requirement of hiding/securing sensitive relationships of shared
data. As a large number of data mining activities that attempt to identify interesting
patterns from databases depend on locating frequent item sets, further investigation of
frequent item sets requires privacy-preserving techniques. To solve many difficult
combinatorial problems, such as data distribution problem, exact and heuristic
algorithms have been used. Exact algorithms are studied and considered optimal for
such problems, however they suffer scalability bottleneck, as they are limited to
medium-sized instances only. Data hashing is the process of converting input data into
a fixed-size string of characters using a cryptographic hash function, resulting in a
unique hash value. Hash functions generate these values efficiently and make it
computationally infeasible to reverse-engineer the original data, ensuring "onewayness"
or "pre-image resistance." Hashing is widely used for data integrity, where generated
hash values help verify data integrity during storage or transmission, detecting
tampering or corruption. It's also crucial in password storage, where hashed passwords
are stored instead of plaintext ones, enhancing security by making it difficult for
attackers to retrieve original passwords. Common cryptographic hash functions like
SHA-256, MD5, and SHA-1 serve these purposes, though older ones like MD5 and
SHA-1 are now considered insecure for certain applications due to vulnerabilities and
collision attacks. In this system the patient medical records are secured using the
cryptography technique. Using this TPA access can be reduced and the patient medical.
The data integrity is maintained with corrective measures. Complete medical record
will be encrypted and stored in the database. We explore the challenge of preserving
patients’ privacy in electronic health record systems.
PO ATTAINMENT

Relevance of POs and PSOs towards project


KEY PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
WORD

Internet of
things

Smart
Devices

Network
monitoring

Router

Firewall
LIST OF FIGURES

FIGURE NO. TITLE PAGE NO.

4.1 Architecture Of proposed System 27

6.1 Hiding Sensitive Information Home Page 33

6.2 Admin Login 34

6.3 Admin Add Doctor 34

6.4 TPA Register 35

6.5 TPA Register Success 35

6.6 Doctor Login 36

6.7 Doctor Home 36

6.8 Doctor Adds Patient Details 37

6.9 TPA Login 38

6.10 TPA Login Success 38

6.11 TPA Access Status 39


6.12 Request Status 40

6.13 User Details 40

6.14 TPA Access System 41

6.15 User Access 42

6.16 Patient View All The Data 43


TABLE OF CONTENTS

CHAPTER NO TITLE PAGE NO


DEPARTMENT VISION & i
MISSION

POs, PEOs & PSOs ii

ABSTRACT iii

PO ATTAINMENT iv

LIST OF FIGURES v

LIST OF TABLES vi

1 INTRODUCTION

2 SYSTEM ANALYSIS

2.1 Problem analysis

2.2 Feasibility Study

2.3 Existing System

2.4 Proposed System

3 SYSTEM REQUIREMENT

3.1 Hardware Requirement

3.2 Software Requirement

3.3 Descriptions
4 SYSTEM DESIGN
4.1 System Architecture

4.2 Methodology

4.3 Modules Description

5 SYSTEM TESTING

5.1 Types of Testing

6 EXPERIMENTAL RESULT &


SCREENSHOTS

6.1 Screenshots

7 CONCLUSION AND FUTER


ENHANCEMENT

7.1 Conclusion

7.2 Future Enhancement

8 REFERENCE

9 PUBLICATION DETAILS

You might also like