Secure Data Transmission Using Dna Sequencing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
The medical record system includes substantial information such as diagnoses of diseases, treatment undergone, patient's health condition, medication information, examination results and nursing actions.Consequently, these information helps medical staff understand the patient's medical record instantly and can provide accurate diagnoses for the disease. Traditional paper based medical report system has many problems including illegible handwriting, conversation difficulty, slow data transfer, easily damaged and rampant . To overcome such drawbacks, we reformed it into electronic patient records. With the increased development of internet, sharing the medical reports over a public domain is not much secured that it can be accessed by attackers and destroy them. To protect these information from attackers, existing system provides access control through Lagrange Interpolation in which the key we use is randomized, no relationship between each key so that the key can be managed effectively. To provide access control and to enhance security Elliptic Curve Cryptography was used in which the attackers encounter Elliptic Curve Discrete Logarithmic Problem. Once the prime number is big enough, attackers will have trouble deciphering the key but it increases the size of the encrypted message, is difficult, increases implementation errors and not much secured too. So that, we proposed DNA sequencing which ensures secured data authorization, storage and transmission
Authors and Affiliations
Bama R , Deivanai S , Priyadharshini K
Message Passing Algorithm: A Tutorial Review
This tutorial paper reviews the basics of error correcting codes like linear block codes and LDPC. The error correcting codes which are also known as channel codes enable to recover the original message from the...
Conceptual Design of “Lotos” Motorcar
Abstract: This work presents conceptual design of new “Lotos” motorcar. Brief review of analogue prototypes of different world-known motorcar manufacturers was made. When body concept design was created, bionic form of...
A Novel Approach for intrusion Detection in Heterogeneous Wireless Sensor Networks using multipath Routing
Abstract: The key concept of my redundancy management is to exploit the tradeoff between energy consumption vs. to the gain of reliability, timeliness, and also security for maximizing the system useful lifetime...
Data Gathering Mechanisms with Multiple Mobile Collectors in Wireless Sensor Network
Energy consumption becomes a primary concern in a Wireless Sensor Network. It have emerged as an effective solution for a wide range of applications. Introduced a new data-gathering mechanism for largescale wireles...
Palm Vein Extraction and Matching For Personal Identification
Abstract : The most common method used for authentication is Textual passwords. But Textual passwords are in risk to eves dropping, dictionary attacks, social engineering and shoulder surfing. Biometric passwords a...