Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Blood Bank System Using Database Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072

Blood Bank System using Database Security


Reema Agarwal1, Sonali Singh2, Chanchal Atal3, Dr. Danie Kingsley *

*Communicating author – Dr. Danie Kingsley, Asst. Prof. Sr, SBST, VIT, Vellore –
1, 2, 3Vellore Institute of Technology, Vellore, Tamil Nadu, India 632014

--------------------------------------------------------------------***-----------------------------------------------------------------------
Abstract

Despite the immense technological advancement, blood bank systems are either manual or valuable data is easily retrievable.
Consequently, one of the major issues in blood bank systems, as talked about in many research papers and articles, is the lack
of data security. People always doubt whether their personal information and medical records are safely stored and secured.
Therefore, our project aims to develop an online blood donation system applying the concepts of database security and
encryption.

The following is what our project aims to achieve: Any person who is willing to donate blood will have to register first, even if
the user is a new donor, or the user can directly login if he/she has an account already. Whenever they want to donate blood, a
form will have to be filled. In the user account, the user will be able to view all the details and records of all earlier donations
as well as information about upcoming blood donation events. There will be a link provided to find blood donors in the region
of the users’ choice. All this is related to the blood bank system. Apart from this, we will be using concepts of database
encryption to make sure that the users’ information is kept secure and confidential. This will help us keep their donation
records protected from any threats from individuals with potentially malicious intentions, or any unforeseen hazards to the
security of the data.

Keywords: Blood banks; Management Systems; Data Encryption; Healthcare; Data Security;

1. Introduction So, the need of automated and computerized blood bank


management systems with the added benefit of database
With blood being a universal requirement, it has security is a major requirement. Adoption of big data in
become increasingly necessary for hospitals, clinics, and healthcare significantly increases security and patient
healthcare centers to have accessible measures aiding in privacy concerns. At the outset, patient information is
the finding and acquiring of donors for recipients in stored in data centers with varying levels of security.
urgent need of specific blood types. There is a lengthy Traditional security solutions cannot be directly applied
process to accept blood from a potential donor and once to large and inherently diverse data sets [11]. Therefore,
the donor has been accepted, numerous personal details a new hypothesis for database encryption is proposed in
and information in regards to the donor are required. which database encryption can be provided as a service
This information is generally stored in large databases to applications with unified access to encrypted
that are often under-secured and easily hack-able, databases. Using such an encrypted data management
making it relatively simple to change, update, steal and model, applications can concentrate on their core
misuse personal information of others. Moreover, in businesses and protect data privacy against both
emergencies of blood requirements, the previous malicious outsiders and the untrusted database service
systems of accessing the database of donors is not users without need to know encryption details [12].
efficient. Current manual mechanisms and vital sign
documentations also have a number of inherent flaws, Hence to provide safe and secure storage of
such as failure to document all appropriate observations, personal information of the donor and even the users,
activities and inaccurate entry of data. It is time- we came up with an innovative idea to create a website
consuming and costly. Accordingly, it would be beneficial (Blood Bank Management System using Database
if there was an automated system and method to remove Encryption). Blood Bank Information Management
all these imperfections [16]. In the last 10 years, the System is an information system which helps to manage
number of voluntary donors has been increased the records of donors and patient at a blood bank. It is
compared to non-remunerated donors. Though, there is mainly designed to store, process, retrieve and analyze
an increased voluntary blood donor, because of the lack information concerned with the administrative and
of information relating to bold donation, many people inventory management within a blood bank. Such kind
become disentitle to donating blood [17]. To organize of systems will allow the authorized blood bank officer
blood donation campaigns, organizers need to go to the to login using a secret password and easily manage the
nearest blood bank to inform and get the necessary records of the blood donors and the patients in need of
requirements to organize blood donation campaigns. It is blood [18].
more time consuming and difficult. Emergency patients,
who need blood immediately, request blood through
advertising on televisions or social media [19].

© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1284
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072

Fig. 1. Modular design of the proposed management model

© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1285
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072

2. Materials and Methods database and the objects inside it [12].The need to
protect confidentiality and avoid unauthorized
In our application we aim to achieve high levels disclosure is relatively well understood in healthcare,
of data security using encryption algorithms and and is driven by the desire to avoid breaches of sensitive
database management, therefore providing a secure information. In healthcare, the confidentiality of
alternative. This study focus on designing a new system sensitive information must be protected end-to-end
to maintain donation process by providing computerized while the data is stored, used, and exchanged [35].
system that saves donor information and blood tests
details, using a programming language PHP which is a In the healthcare industry, the importance of
server-side scripting language, and My SQL database data security spreads across a wide use from securing
which is a program that can store large amounts of access to interfaces and computer systems that store
information in an organized format that’s easily private data such as medical records to ongoing research
accessible through scripting languages like PHP. developments and confidential hospital information. The
extensive digitization of information in the healthcare
Fig. 1 describes how all the web pages are linked sector has improved healthcare services by making them
to each other on the web-application portal in fast and efficient, but it has also allowed real risks
accordance with all the services provided to the user. A involving data being accessed by the wrong people.
user who doesn’t have an existing account has to first Given the sensitivity of data in healthcare, it is necessary
create an account through the sign up option on Main to have robust and reliable information security systems
page and then can login to access other facilities. The and services in place at all times. Two-factor
user is then directed to the Homepage where they get authentication and One-Time passwords are widely used
access to other options such as: a donor can go to the across several other industries and are now
Donate page, or can visit the Events page to know about implemented in healthcare forums. The data collected
any upcoming events and, a patient can find a donor in from data providers may contain individuals’ sensitive
case of emergency. If they have any queries related to information. Directly releasing the data to the data miner
our website or other processes, they can also contact us will violate data providers’ privacy, hence data
modification is required. On the other hand, the data
2.1. Data Security should still be useful after modification, otherwise
collecting the data will be meaningless [33].
The healthcare industry is innovating and
adopting new technologies to keep up with the Data Encryption is a method that involves
exponential growth in the global acceptance of storing data in an unreadable and illegible manner,
automation and digitization. The Information keeping it confidential so that unauthorized individuals
Technology sector is being widely accepted, often used cannot access or use the information, even if they are
to assist both doctors and patients to improve healthcare able to find the information in a database or network.
services. One of the most important sections of a hospital Healthcare organizations are constantly receiving,
information system today, is the Electronic Health managing and distributing large amounts of medical and
Record, where personal patient information is stored. personal information which must be kept confidential to
There are countless number of applications used by outsiders. Encrypting data before sending or storing it
hospitals, healthcare industries where patients use can reduce security breaches to a minimum.
various health monitoring applications and devices to
monitor their vitals and communicate with doctors 2.2. Algorithms and proposed system
through mobile and wireless technologies. As computers
have become an essential part of our daily lives, it has In our project, a person who is willing to donate
become increasingly important for data security. Attacks blood will have to register first, or the user can directly
over the Internet are becoming more and more complex login if they already have an existing account. When they
and sophisticated. How to detect security threats and enter their password, it will be encrypted by the hashing
measure the security of the Internet arises a significant method. Whenever they want to donate blood, a form
research topic. For detecting the Internet attacks and will have to be filled. The details entered by the user will
measuring its security, collecting different categories of also be encrypted using their username as a key, then
data and employing methods of data analytics are storing it in the database. The user can view the
essential [32]. Protecting the confidential/sensitive data information about upcoming blood donation events and
stored in a repository is actually the database security. It also contact the admin if they have any queries. There
deals with making database secure from any form of will be a link provided to find blood donors in the region
illegal access or threat at any level. Database security of the users’ choice. Apart from this, we will be using
demands permitting or prohibiting user actions on the concepts of database encryption to make sure that the

© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1286
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072

users’ information is kept secure and confidential. We need. This matter has been partially solved in the
have designed our own algorithm for the same. This will existing system “A Novel Technique for Online Blood
help us keep their donation records protected from any Bank Management” [2]. There is also a system in which
threats or breaches from individuals with potentially to remove the communication barrier direct call routing
malicious intentions, or any unforeseen hazards to the technique using Asterisk hardware is applied which also
security of the data. tackles fake callers, fake donors, follow up
communication with the donor. However, privacy
We will be using Application Level Encryption to regarding the personal information of the donor or the
encrypt the database. In the application-level encryption, user is not secured [13].
the process of encrypting data is completed by the
application that has been used to generate or modify the We compared our approach with other systems
data that is to be encrypted. Essentially this means that that have developed unique solutions to problems such
data is encrypted before it is written to the database. as overcoming the communication barrier between the
This unique approach of encryption allows for the needy and the donors, by directly forwarding the call to a
encryption process to be tailored to each user based on suitable donor or reaching the willing donors through
the information (such as entitlements or roles) that the SMS, using automatic call routing [3], interconnecting
application knows about its users. blood banks, hospitals and donors into a single network
and storing various data and information of blood and
If encryption and decryption is done within the health records of individuals to find nearby hospitals
application, sensitive data (including the key) is never online instantly by tracing its location using GPS [5].The
revealed outside of the application server. An individual proposed system ensures that the blood donor can find
would have to compromise both the web server and out the nearest blood banks available according to his or
database server to access all of the data stored. Given her current location based on the GPRS feature used in
that the data is encrypted before it is written to the the system, and also tries solving the issue of blood
server, a hacker would need to have access to the wastage; however other important issues like donor
database contents as well as the applications that were information security and encryption, and spreading
used to encrypt and decrypt the contents of the database awareness about the need to donate blood have not been
in order to decrypt sensitive data. One of the most given importance they require [4]. Aiming to design
important advantages of application-level encryption is systems such that hospitals have availability of blood
the fact that application-level encryption has the bags anytime, supports fast searching and manage
potential to simplify the encryption process as a information about the donor however not considering
secondary encryption tool will not need to be integrated blood donors, patients/recipients as users and even the
into the system. system excluded the consideration of system security
measures [6].
2.3. Comparisons with other methods
We came across an android based project [8],
There are several issues that can be seen in where the Apriori algorithm was used, which is an
already existing blood bank databases and systems. algorithm that is useful in mining frequent item sets and
Issues in applicability of the system to various health relevant association rules. It mainly focused on web
centers and hospitals, as one solution is given, keeping in applications for blood donation management, managing
mind the obstacles faced in the blood bank environment blood donations and controlling blood transfusion
of particular infirmaries [1]. A major concern is that of processes [14]. A research proposed in [43], researchers
donor information security and encryption. This is an developed a framework for centralized data that stored
issue, as willing people hesitate in donating blood due to the data collected from several sensing units. This
a feeling of insecurity. Accessibility to blood resources research aims to ensure the privacy and confidentially of
from the required location is an unresolved problem the system. They used two cryptographic methods. The
which needs an appropriate solution, as the lives of attribute based and the functional encryption methods,
millions depend on whether or not the required type and where they were combined together. Authors proposed
the quantity of blood is available at the right times. One an authentication schema for securing healthcare
problem that remains to be addressed is the spreading of systems. It is basically two security protocols that have
awareness about the time, venue and need for various been proposed [42].
blood donation events that take place.
Virtual blood banks are the computer-
As we all understand the rising importance of controlled, electronically linked information
sustainable resources, systems that address the issue of management systems that allow online ordering and
shortage and wastage of blood units are in demand and real-time, remote delivery of blood for transfusion. Thus,

© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1287
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072

the virtual blood bank can help ensure that the right digitized systems. Another reasons of implementation is
patient receives the right amount of the right blood in order to provide authentic and authorized features to
component at the right time [15]. current systems where private and confidential data can
only be viewed by authorized users. To propose a one
Another already existing system helps control a web-based application where blood donors can register
blood transfusion service and create a database to hold themselves to donate therefore eliminating the
data on stocks of blood in each area as data of donors in drawbacks of the existing system problem i.e. database
each city [9]. Although the systems mentioned above insecurity.
stores information about blood transfusion services in a
database, it does not specify any information about 3.1. Business Model Canvas
security of donor details and other data. The project
aims to provide all the functionality related to blood The key features of the proposed application system are
stock. Blood stocks will be managed by an administrator highlighted below in Fig.2.
and the user will be able to see the blood stocks [10].
3.1.1. Key Partners
Several existing blood banks have been
extensively compared [7] and have stated that the Our main partners and suppliers are healthcare
automation and digitization of things have become a facilities such as hospitals and clinics, organizations that
normal and if most information, products and services help in acquiring volunteers for blood donations such as
are available with the click of a few buttons and keys, Red Cross and individual volunteers. Another main
then it is only appropriate that healthcare services be partner includes those in need of blood (patients).
among those offered. The digitalization of things has
become a need-base for the functioning of man-kind and 3.1.2. Key Activities
with that comes several aspects of sensitivity to
information and privacy. The requirement of security Our website helps organizations or individuals find
across all fields of medicine is rising globally as more the required blood in an appropriate amount of time and
industries take their businesses online and increase their any individual that wishes to donate his/her blood can
susceptibility to malicious threats and security easily make use of our website. Data is encrypted and
violations. stored resulting in the security of ones’ personal
information. Moreover, it also notifies users about any
3. Objectives and Motivations upcoming or ongoing blood camps across the nation.

The main purpose of a secure online blood bank 3.1.3. Key Resources
system is to simplify and automate the process of
searching for blood in case of emergency and maintain Website management is a key resource of our blood
the records of blood donors, recipients, blood donation bank management system so as to ensure servers are
programs and blood stocks in the bank in a safe, secure working properly and individuals or other hospitals /
manner. pharmacies are able to get the required information on
time with no issues related to accessing data. Teams
To assist in the management of blood donor organizing blood donation camps act as a key resource
records, plan and share information in a more as well because they should provide their information to
confidential, secure and convenient way using database the website manager prior to conducting the event so
security. To allow a quick and timely access to donor that it can be mentioned and available to every citizen.
records. The benefit of easy registration and
participation in any upcoming events aims to encourage 3.1.4. Value Propositions
more volunteers to take part in such activities. The
current donation camp locations will be available to Our website provides numerous services to the
users in different areas. citizens and organizations such as storing their data into
the database in a secure, encrypted form to prevent any
There are several reasons behind hacks and finding the required blood in any required
implementation of project; manual systems being used location in a sufficient quantity. It is easy to use and can
in blood bank management systems are time consuming be accessed anywhere anytime provided that one has
and are prone to mistakes, the lack of data security i.e. no registered and signed up before using. The website is
centralized database used to keep donors’ records makes made keeping in mind the level of every citizen so it is
it an unsafe way of storing private information and the easy to maintain and is simple to understand.
percentage of accuracy is less in manual systems than

© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1288
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072

3.1.5. Customer Relationships benefits of this system with ease so that these people can
also get help and help others in need.
Customers can call us or contact us via the website’s
Contact page when in need of any help. Their personal
3.1.8. Cost Structure
information is encrypted and saved in the database
keeping in mind that their information is valuable and
The website bears the cost of buying server space,
privacy is of the utmost importance.
domain space and renewal values. Even blood donation
camps being organized requires the fund to conduct
3.1.6. Channels
successful events. Promotions and referrals’ fee is also
required for the website to work efficiently and to make
There are several channels we are and would like to be
accessible to everyone. Moreover, anyone using it
linked to such as hospitals, pharmacies and other places
requires the use of internet therefore they have to make
which provide any medical or healthcare services. We
sure they have required data or Wi-Fi to use. So, cost for
would also like to have channels with many other
internet and phone is also required.
websites related to similar work such as NGO’s so that
people around the entire country can make use of it from
3.1.9. Revenue Stream
anywhere.
We have several revenue streams such as online
3.1.7. Customer Segments
advertisements on apps and websites. There is a usage
fee for kiosks placed in hospitals and public places and a
All the members of society across India can be a part
customer acquisition fee from stores and medical labs
of this. However, our initial target is to cover the urban
too.
and semi urban areas of population and slowly extend it
to rural areas as well. The reason behind mainly
targeting the urban area is that the density of population
in a city is much higher and people are more associated
with the use of internet as compared to rural areas. We
will make sure that people in rural areas also reap the

Fig. 2. Business Model Canvas of the system

© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1289
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072

4. Literature Review attribute revocation into m-healthcare cloud computing


system, which can flexibly achieve the target that we
There is some research on automation of blood donor want to [36]. Health-related information is very critical
database. Because for efficient blood donor recruitment to patients’ lives; a good advice from a well-behaved
different factors are to be considered and different doctor may be used to improve a patient’s health
researchers used different factors in the recruitment condition significantly, while following an inappropriate
process. AlRashdi et al. (2018) assessed some factors instruction from a misunderstood person may put the
that influence the levels of recruitment for blood lives of patients in danger [37]. The patients can receive
donations in Saudi Arabia and few people intend to give fast and accurate healthcare services from senior
voluntary blood transfer and most of the past donors doctors, and meanwhile doctors are able to timely check
had to donate in unavoidable situations [21]. Angeline R the feedbacks from their patients [38]. He proposed a
expects to make a web application known as GPS based framework for electronic health record sharing that
online blood Bank Management system using DMS. This provides patients with the fine-grained control on the
app has the client's area that can be followed utilizing private information. The framework also uses the
GPS framework [27].Finck et al. (2016) did a study on attribute-based techniques to improve the
the factors of motivation and deterrents of blood communication efficiency [39]. Since the applications of
donation among high school blood donors [24]. Online Social Networks (OSNs) currently dominate the
Ferguson (2015) used MOA approach in the case of internet users, it is unsurprisingly that the security and
recruitment of blood donor, suggesting financial privacy preservation of these applications has been paid
incentives in forms of gifts and movie tickets are efficient a great attention so even we are trying to make an
in blood donation [22]. Alfouzan (2014) did a research to application like that [40]. As personal health information
measure the level of knowledge on blood donation, to is digitized, transmitted and mined for effective care
identify positive and negative attitudes, find the provision, new forms of threat to patients privacy are
obstacles, and suggest some motivational factors more becoming evident. In view of these emerging threats and
over some education hprogram arrangement to increase the overarching goal of providing cost effective
awareness of the range of people [23]. Bani et al. (2014) healthcare services to all citizens, several important
accessed the reasons of gender gap sampling donors federal regulations have been enacted including privacy
who stopped donation at least two years before the
study and also analyzed frequency of donation [26]. Arif
et al. (2012) used last date of blood donation, BMI and
last date of contact between donor and receivers in an
asterisk technology based automated blood donation
system as recruitment factors in their work [25]. P. Priya
and V. Saranya have proposed an efficient and reliable
blood donor information and management system based
on GIS integrated in android mobile application [28]. The
paper by Vikas Kulshrestha describes about the benefits
of management information system in blood bank. The
paper is basically focused on the blood bank
management information system. It discusses about the
beneficiaries of the blood bank management information [41]. Healthcare applications are very critical
system [29]. In the paper they have bought a new applications and medical data are very critical and
solution blood bank management which is called the complex to be secure than other type of data and
Centralized Blood Bank Repository (CBBR). This new applications because it needs to be highly secured. There
system will be a website hosted on an apache web are many types of threats that may affect healthcare
server. The overall architecture is centralized. Here, the applications which differ in their causes and differ in
system is deployed in a central server while being their solutions [44]. Human error or failure can be
accessed and collecting data from browsers on different prevented with appropriate security education, training
devices in distributed areas [30]. An interesting and awareness programs. Therefore, this study has
approach by Jeroen Benien and Hein Force (2012) is that proven useful in identifying critical threats to human
of supply chain management for blood and blood mankind, and could be useful especially for information
products terming the process as irregular and the security officers or policy maker to get clear
demand for blood stochastic. This is of great implications understanding in order to design and implement
if the management of blood banks were to become effective security systems and policies [45].
effective [31]. We bring attribute-based encryption with
non-monotonic access structures and fine grained

© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1290
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072

5. Results
healthcare industries can make a user more comfortable
After conducting a small survey, we were able to with using online portals safely, increasing the number
conclude that there are several people who are willing to of volunteers donating their blood. The results of the
donate their blood. However, the sensitivity and privacy survey are shown. We have also provided pictures taken
of their personal information makes them wary of from the actual website.
donating. We’ve proposed the idea of making a system
which will ensure data protection with the mechanism of
database encryption. Providing such systems to

Website Screenshots

Fig. 3. Website Main page

© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1291
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072

Fig. 4. Homepage

Fig. 5. Find a Donor page

© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1292
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072

Fig. 6. Donate page

Fig. 7. Contact page

© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1293
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072

Fig. 8. Events page

Fig. 9. Encrypted Donor Table

© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1294
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072

Fig. 10. Encrypted Login Table using Hashing

Fig. 11. Blood Bank Table

Fig. 12. Recipients’ Table

© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1295
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072

Fig. 3 is the display of the website’s main page. Here, the 49].Therefore, the use of Big Data Analytics (BDA) and
users can either login in or sign up in case they are using database encryption in healthcare can be very
it for the first time and then can get access to other web productive. BDA involve the methods of analyzing the
pages by logging in. wide amount of electronic data related to patient
healthcare and well-being. BDA. It also leads to better
Fig. 4 is the Homepage where the user can navigate to all
diagnosis for personalized healthcare, automated
the other available web pages such as: Find a Donor,
decision algorithms, data transparency, and protecting
Contact, and Events and can also go to the Donate
privacy and so on [47]. In this paper they identified the
webpage to donate their blood if he/she wishes to.
relationships among big data analytics capabilities, IT-
Fig. 5 is the Find a Donor page where the user, in case of enabled transformation practices and benefits, using the
emergencies, can search for the required blood units and healthcare sector as their case study [48]. Moreover,
blood groups in the system and it will display the encryption at the database level provides more flexibility
available units, name of hospital and the cost to the user. in terms of granularity of encryption. Data can be
encrypted at the table level, row level or column level.
Fig. 6 shows the Donate page where the user can
This type of encryption affects the indexes and need
volunteer to donate their blood by filling out the form.
special retrieving queries using indexes that can work
The details of the donor will be encrypted and saved so
with such encrypted data [50]. In the whole security
that their details are safe.
system database encryption is the last line of defense
Fig. 7 shows that the user can contact the admin in case and also is reliable for the information security, but also
of any queries. They also can drop a message through it is a dynamic safety means that the safety degree can be
subject box and submit or send a mail if they have any estimated. So, it is a necessary safety method for
issues. information security, also is the final solution [51]. Many
recent study has observed that the existing workflow of
Fig. 8 shows that the user can view and know the details
blood banks needs to be strengthened, both in terms of
regarding the events being organized in the future. They
planning and monitoring. Also, there are many gaps in
can also visit and participate in these events as
the management of blood supply. The need for
volunteers.
automating blood banks have been there for a long time
Fig. 9 shows that the data entered by the donor is [52]. The manual system of blood collection and
encrypted and stored in the database. The encryption requisitions has long waiting time in queues, which in
technique used is symmetric key encryption. The turn leads to delay in issue of blood. Similarly,
algorithm uses the username of the user as the key and maintenance of records during non-peak hours and
then computes to get the encrypted value. notifying about blood donation camps to registered
donors is a major challenge & time consuming. Keeping
Fig. 10 describes the login table where the passwords everything in mind we came up with the solution of an
have been saved using hashing so that user can feel free automated blood bank management system with
to provide their information database encryption.
Fig. 11 is the table storing data which includes cost,
quantity, city and hospital in which we can find the 7. Conclusion
required blood group.
After going through multiple research papers we
Fig. 12 shows the table which contains the data and
analyzed that there is no such system through which
information regarding the recipients in hospitals.
people can donate their blood and can feel safe with
6. Discussions regards to their information which they have provided
during any registration. There is no database security
Implementation of IT technologies in the provided for donors. So we created a website which
healthcare facilities has raised protection and security involves the login and signup option and people can
fears. Privacy and security risks are a concern due to donate their blood through the same website freely as
hackers, identity theft, illegal access and modification of we have symmetric encryption which secures the
patient data. Security practices include management database of the individual. Therefore the main aim of our
processes for detecting and mitigating information risks project was to create a website involving the database
as well as the implementation of technical safeguards. which is encrypted after insertion of the values thereby
Many healthcare organizations follow a responsive path protecting one’s information.
of implementing technical stopgaps because information
security has been considered to be largely a technical
issue Data without encryption mechanism may provide
direct access to data with its original content [46,

© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1296
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072

8. References Big data security and privacy issues in healthcare


Authors: Harsh Kupwade Patil and Ravi Seshadri
[1] http://www.sciencedirect.com.egateway.vit.ac.in/sc Nanthealth
ience/article/pii/S187 7042815036940 Published on: 2014 IEEE International Congress on
Development of a Blood Bank Management System Big Data
Authors: SumazlySulaiman, Abdul Aziz K.Abdul
Hamid, Nurul Ain NajihahYusri
Volume 195, 3 July 2015, Pages 2008-2013 [12] https://research.ijcaonline.org/volume47/num
[2] http://www.sciencedirect.com.egateway.vit.ac.in/sci ber12/pxc3880218.pdf Database Security and
ence/article/pii/S187 7050915006468 Encryption: A Survey Study
A Novel Technique for Online Blood Authors: Iqra Basharat, Farooque Azam, Abdul
BankManagement
Authors: K.Selvamani, Ashok Kumar Rai Wahab Muzaffar
Volume 48, 2015, Pages 568-57 Published on: Volume 47– No.12, June 2012
[3] http://www.sciencedirect.com.egateway.vit.ac.in/sci
ence/article/pii/S092 5527317300336 [13] https://sci-
Revolutionizing blood bank inventory hub.tw/10.1109/INDCON.2012.6420581
management using the TOC thinking process: An
Indian case study Automated online blood bank database
Authors: HarshalLowalekar, R. Raghavendra Authors: muhammadarifiSreev, Nafseer K.3, Rahul
Ravi R.4
Volume 186, April 2017, Pages 89-122 Published on: 2012
[4] http://www.iraj.in/journal/journal_file/journal_pdf/
3-299147711892527-31.pdf
Blood bank management system [14] https://www.ijraset.com/fileserve.php?FID=23
Authors: Prathamesh Raut, Prachi parab, Yogesh 394
Suthar,SanjayPandey,SumeetNarwani Blood Bank Management System
Volume 4, Issue-9, Sep-2016 Authors: Miss. Pooja D.Dighe1, Miss. Nikita
[5] http://ijisset.org/wp- V.Gorde2, Miss. Aaysha A.Inamdar3 Miss.
content/uploads/2016/02/IJISSET-020217.pdf
Online Blood Bank Management System using DipaliD.Kulal4, Mr. S.K.Korde5
Android Published on: Volume 7 Issue VI, Jun2019
Authors: [15] http://www.jpathinformatics.org/temp/JPathol
AshitaJain,AmitNirmal,NitishSapre,PorfShubhad Inform216-2251841_061518.pdf
aMone Virtual blood bank
Volume- 2, Issue -2, February 2016
[6] https://www.researchgate.net/publication/3283058 Authors: Kit Fai Wong
22_Blood_Bank_System Published on: 24 January 11
Enhancing Blood Transfusion Safety Through
the Use of Online Blood Bank Management [16] https://patentimages.storage.googleapis.com/c
System in Oman 5/9f/10/a2e6624bbc6036/US8204694.pdf
Authors: Nawaf Hamed Al-Washsahi, Alsafa
Ahmed Aal-Abdulsalam, AfrahSulaiman Al- System and method for automatically notifying a
Mamari blood bank database of blood product
October 2018 administration and transfusion
[7] Blood Bank Management Information System in Authors: Arthur J. Hauck, Kansas City, MO (US); Lori
India N. Cross, Kansas City, MO (US); Jeffrey D. Fry,
Authors:VikasKulshreshtha, Dr. Sharad
Maheshwari Lansing, KS (US)
Singhania University, Jhunjhunu, Rajasthan, Published on: 2012
India
[8] Android Blood Bank [17] http://www.uwu.ac.lk/wp-
Authors: Prof. Snigdha1, Varsha Anabhavane, content/uploads/Pro-CST.pdf#page=8
Pratikshalokhande, Siddhi Kasar, Pranita More
Atharva College of Engineering, Mumbai, India Blood bank management system
[9] MBB: A Life Saving Application Authors: E. M. S. S. Ekanayaka and C. Wimaladharma
Authors: Narendra Gupta, Ramakant Gawande, Published on: January 29-30,2015
Nikhil Thengadi
CSE Dept., JDIET, Yavatmal, India [18] 2015 https://sci-
[10] https://www.freeprojectz.com/paid-
projects/blood-bank-management-system hub.tw/10.1109/ICCCEEE.2018.8515789
Java and JSP project on Blood bank management Computerized Central Blood Bank Management
system System (CCBBMS)
Authors: Mohammed Y. Esmail, Yousra Sayed
[11] https://www.mendeley.com/catalogue/88983b Hammad Osman
7e-7226-329d-bdeb-b6be10f47460/

© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1297
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072

Published in: 2018 International Conference on A GPS Based Online Blood Bank Management using
Computer, Control, Electrical, and Electronics Database Management System Authors: Angeline R,
Engineering (ICCCEEE) Rudra Dev Mishra, Lingaraj Gopalakrishnan,
Saravanan B Published on: Volume-9 Issue-1,
[19] https://www.academia.edu/download/574702 November 2019
05/blood_donation.pdf Blood donation system
Authors: R. Raghavendra Ravi, Vikas Kulshreshtha, [28] The Optimization of Blood Donor Information
and Management System Authors: P. Priya1, V.
[20] http://iraj.in/journal/journal_file/journal_pdf/ Saranya2, S. Shabana3, Kavitha Subramani
3-299-147711892527-31.pdf
Blood bank management system [29] Blood Bank Management Information System in
Authors: Prathameshraut, Prachi paraab, Yogesh India Authors: Vikas Kulshreshtha, Dr. Sharad
Suthar, sanjaypandey, Sumeet narwani Maheshwari
Published on: Volume-4, Issue-9, Sep.-2016
[30] https://www.ftms.edu.my/journals/pdf/IJISE/A
[21] Factors Influencing the Levels of Recruitment pr2015/85-97.pdf Authors: Ibrahim FawzeAkar,
for Blood Donations in Saudi Arabia. Tukur Anas Mohammad, Mohamed Ismail Z
Authors: Al-Rashdi, Y. D. A., Alharbi, S. H., Alateeq, F. Published on: International Journal of Information
A., Ahmed, I. B., Alsogair, A. R. A. A., Aldugieman, T. System and Engineering, Vol 3 (No.1), April, 2015
Z., Ahmed, H. G., Published on: International Journal
of Medical Research & Health Sciences, vol. 7, no. 7, [31] Blood bank information management system
pp. 72-79, 2018. Authors: Jeroen Benien and Hein Force Published
on: 2012
[22] Mechanism of altruism approach to blood donor
recruitment and retention: a review and future [32] https://sci-
directions. Authors: Ferguson, E Published on: hub.tw/10.1109/COMST.2018.2863942
Transfusion Medicine, vol. 25, no. 4, pp. 211-226, Security Data Collection and Data Analytics in the
2015. Internet
Authors: Xuyang Jing, Zheng Yan, Senior Member,
[23] Knowledge, attitudes, and motivations towards IEEE, and Witold Pedrycz, Fellow, IEEE
blood donation among King Abdulaziz Medical City
[33] https://sci-
Population. Authors: Alfouzan, N Published on:
hub.tw/10.1109/ACCESS.2014.2362522
International journal of family medicine, vol. 2014,
Information Security in Big Data: Privacy and Data
2014.
Mining
Authors: LEI XU, CHUNXIAO JIANG, JIAN WANG,
[24] Motivating factors and potential deterrents to
JIAN YUAN, AND YONG REN
blood donation in high school aged blood donors,
Published on: 2014
Authors: Finck, R., Ziman, A., Hoffman, M., Phan-
Tang, M., & Yuan, S., Published on: Journal of blood
[34] https://link.springer.com/article/10.1186/s405
transfusion, vol. 2016, 8 pages, 2016.
37-017-0110-7 Big healthcare data: Preserving
security and privacy Authors: Karim
[25] Automated online Blood bank database,
Abouelmehdi, Abderrahim Beni-
Proceedings of the India Conference (INDICON),
Hessane & HayatKhaloufi Published on: 2018
India, Authors: Arif, M., Nafseer S., K., Rahul, R.,
Published on: 2012
[35] https://www.ehealthnews.eu/images/stories/p
df/successful_strategies_for_healthcare_security_pri
[26] Gender differences and frequency of whole
vacy.pdf Health Information at Risk: Successful
blood donation in Italian donors: Even though I
Strategies for Healthcare Security and Privacy
want to, I cannot? Transfusion and Apheresis
Authors: David Houlding, MSc, CISSP. Health
Science, Authors: Bani, M., Strepparava, M., &
Information at Risk: Successful Strategies for
Giussani, B., Published on: vol. 50, no. 1, pp. 81-86,
Healthcare Security and Privacy. Healthcare IT
2014
Program Of Intel Corporation, White Paper, 2011
[27] https://www.ijitee.org/wp-
[36] http://ijns.jalaxy.com.tw/contents/ijns-v19-
content/uploads/papers/v9i1/A4183119119.pdf
n6/ijns-2017-v19-n6-p1044-1052.pdf

© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1298
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072

Attribute-based Encryption with Non-Monotonic uploaded by Ganthan Narayana Samy on 29 May


Access Structures Supporting Fine-grained Attribute 2014.
Revocation in M-healthcare
(Received July 21, 2016; revised and accepted Jan. [46] https://sci-
15, 2017) hub.tw/10.1109/RTEICT.2017.8256677
Comparative Study on Attribute-Based Encryption
[37] http://bbcr.uwaterloo.ca/~xshen/paper/2012/ for Health Records in Cloud Storage 2017 2nd IEEE
hasapp.pdf International Conference on Recent Trends in
HealthShare: Achieving secure and privacy- Electronics Information & Communication
preserving health information sharing through Technology (RTEICT), May 19-20, 2017, India
health social networks Siddhesh Mhatre, Anant V, Sudhir N. Dhage
X. Liang et al. / Computer Communications xxx
(2012) xxx–xxx [47] https://sci-
hub.tw/10.1016/j.ijinfomgt.2019.05.003
Big data analytics in health sector: Theoretical
[38] https://patientdestiny.typepad.com/OPOR%20 framework, techniques and prospects Panagiota
Report%20-%20Ottawa.pdf Galetsia, Korina Katsaliakia, Sameer Kumarb
K.J. Leonard, One patient, one record: Report on International Journal of Information Management,
one-day symposium to promote patient ehealth, 50, 206–216 (2020)
Technique reports, 2010.
[48] Wang, Y., Kung, L., Wang, W. Y. C., & Cegielski, C.
G. (2018). An integrated big data analytics-enabled
[39] A. Mohan, D. Bauer, D.M. Blough, M. Ahamad, B. transformation model: Application to health care.
Bamba, R. Krishnan, L. Liu, D. Mashima, B. Information & Management, 55(1), 64–79
Palanisamy, A patient-centric, attribute-based,
source-verifiable framework for health record [49] https://sci-hub.tw/10.1136/amiajnl-2012-
sharing, Technique reports, 2009 000906 Kwon, J., & Johnson, M. E. (2012). Security
practices and regulatory compliance in the
[40] X. Li, R. Lu, X. Liang, J. Chen, X. Lin, X. Shen, healthcare industry. Journal of the American
Smart community: an internet of things application, Medical Informatics Association, 20(1), 44–51.
IEEE Communications Magazine – Feature Topic on
The Internet of Things 49 (11) (2011) 68–75. [50] https://sci-hub.tw/10.1109/CSCS.2017.50
Boicea, A., Radulescu, F., Truica, C.-O., & Costea, C.
[41] https://www.researchgate.net/publication/220 (2017). Database Encryption Using Asymmetric
438779 Keys: A Case Study. 2017 21st International
Information_Security_and_Privacy_in_Healthcare_Cu Conference on Control Systems and Computer
rrent_State_of_Research1 Science (CSCS).
International Journal of Internet and Enterprise
Management · January 2010 [51] https://sci-
hub.tw/10.1109/ICCSN.2011.6014819
[42] https://www.researchgate.net/publication/318 Pan, Y. (2011). Research on network database
055080 The_Effects_of_Cyber- encryption technology. 2011 IEEE 3rd International
Security_on_Healthcare_Industry uploaded by Wael Conference on Communication Software and
Elmedany on 01 July 2017. Networks.

[43] J.-L. Hou and K.-H. Yeh, "Novel authentication [52] https://sci-
schemes for IoT based healthcare systems," hub.tw/10.1109/CCCS.2015.7374145
International Journal of Distributed Sensor Cheema, A. S., Srivastava, S., Srivastava, P. K., &
Networks, 2015. Murthy, B. K. (2015). A standard compliant Blood
Bank Management System with enforcing
[44] A. Burns, M. E. Johnson, and P. Honeyman, "A mechanism. 2015 International Conference on
brief chronology of medical device security," Computing, Communication and Security (ICCCS).
Communications of the ACM, vol. 59, pp. 66-72,
2016.

[45] https://www.researchgate.net/publication/220
793586 Threats_to_Health_Information_Security

© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1299

You might also like