0% found this document useful (0 votes)
28 views35 pages

Mini Project Documentation

The document is a mini project report on 'Cloud Based Health-Care Services' submitted by Vakapalli Rajesh as part of the requirements for the Master of Computer Applications program. It outlines the development of a secure, flexible, and cost-effective cloud-based framework for healthcare services, emphasizing the importance of privacy and access control in electronic health records. The report includes system analysis, requirements, design, implementation, and testing details, aiming to enhance healthcare delivery in Saudi Arabia through improved technology integration.

Uploaded by

priyaberam410
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views35 pages

Mini Project Documentation

The document is a mini project report on 'Cloud Based Health-Care Services' submitted by Vakapalli Rajesh as part of the requirements for the Master of Computer Applications program. It outlines the development of a secure, flexible, and cost-effective cloud-based framework for healthcare services, emphasizing the importance of privacy and access control in electronic health records. The report includes system analysis, requirements, design, implementation, and testing details, aiming to enhance healthcare delivery in Saudi Arabia through improved technology integration.

Uploaded by

priyaberam410
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

Cloud Based Health-Care Services

A Mini Project Report Submitted in partial fulfilment of the Requirement


For IV Semester of

MASTER OF COMPUTER APPLICATIONS

Submitted By
VAKAPALLI RAJESH
19555F0086

Under the Esteemed Guidance of


Mr.L.Venkateswara Kiran
Assistant Professor, MCA Dept.

DEPARTMENT OF COMPUTER APPLICATIONS

GODAVARI INSTITUTE OF ENGINEERING & TECHNOLOGY (A)


[Affiliated to J.N.T.U.K, Kakinada |Recognized by UGC under section 2(f) & 12(B) | NAAC ‘A+’ GRADE]
NH-16 CHAITANYA KNOWLEDGE CITY, RAJAHMUNDRY (A.P)
2020
GODAVARI INSTITUTE OF ENGINEERING & TECHNOLOGY (A)
[Affiliated to J.N.T.U.K, Kakinada |Recognized by UGC under section 2(f) & 12(B) | NAAC ‘A+’ GRADE]
NH-16 CHAITANYA KNOWLEDGE CITY, RAJAHMUNDRY (A.P)
2020

DEPARTMENT OF COMPUTER APPLICATIONS

CERTIFICATE

Thisis to certify that this Mini project “Cloud Based Health-Care Services” is being
submitted by VAKAPALLI RAJESH (19555F0086) in partial fulfilment of the
requirements for IV Semester of MASTER OF COMPUTER APPLICATIONS in the
academic year 2019-2020 to the GIET AUTONOMOUS is a bonafide work carried out him
under my guidance and supervision.
The result embodied in this project has not been submitted to any other University or
Institute for the award of degree

CO-ORDINATOR SUPERVISOR
ACKNOWLEDGEMENT

It is privilege for me to have under taken the project “CLOUD BASED HEALTH-CARE
SERVICES” in GIET (A), Rajahmundry.

I avail this opportunity to express my deep sense of gratitude and heart full thanks to
Mr. K. SASI KIRAN VARMA, Honorable managing director of GODAVARI
INSTITUTE OF ENGINEERING & TECHNOLOGY, RAJAHMUNDRY.

I am thankful to beloved Principal Dr. P.M.M.S.SARMA, for permitting


encouraging me in doing this project.

I am deeply indebted to Mrs. R. TAMILKODI, Head of the Department of


Computer Applications, GIET, whose motivation in the field of software development made
me overcome all the hardships during the course of study.

I am heartily thankful to my internal guide Mr.L.Venkateswara Kiran Assistant


Professor, MCA dept, GIET, for valuable guidance, keen interest, open minded discussion
and his constant encouragement throughout the project work.
Finally I would like to extend my heartfelt thanks to my TEACHING AND NON
TEACHING STAFF who had shared their technical knowledge and their encouragement
were always there as a source of strength and inspiration.

Although a leaflet title “Acknowledgement” cannot represent my true feelings for all
these persons, I feel very much thankful to all of them and also to my PARENTS and
FRIENDS for encouraging and giving me all the moral support required for making this
endeavour a reality.

VAKAPALLI RAJESH

(19555F0086)
DECLARATION

I VAKAPALLI RAJESH (PIN 19555F0086) declare that the mini project title
“CLOUD BASED HEALTH-CARE SERVICES” is a bonafide work carried out by me
and has not been submitted to any other university or college for the award of degree.

VAKAPALLI RAJESH
(19555F0086)
TABLE OF CONTENTS

Title Page.No

CHAPTER-1: INTRODUCTION

1.1 Purpose1 1-2

1.2 Scope 2

CHAPTER-2: SYSTEMANALYSIS

2.1 Existing System 3

2.2 Proposed System 3-7

CHAPTER-3: SYSTEM REQUIREMENTS

3.1 Functional Requirements 8

3.2 Non-Functional Requirements 8

3.3 Software Requirements 9

3.4 Hardware Requirements 9

CHAPTER-4: SYSTEM ADESIGN 10-12

CHAPTER-5: SYSTEM IMPLEMENTATION

5.1 Technology Description 13-14

5.2 Sample Code 14-20

CHAPTER-6: SYSTEM TESTING 21-22

CHAPTER-7: RESULTS 23-27

CHAPTER-8: CONCLUSION & FUTURESCOPE 28

References 29
ABSTRACT
In the healthcare sector, the growing demand for and adoption of software development in the
cloud environment to cope with and fulfill current and future demands in healthcare services.
In this paper, we propose a flexible, secure, cost-effective, and privacy preserved cloud-based
framework for the healthcare environment. A secure and efficient framework for the
government EHR system, in which fine-grained access control can be afforded based on
multi-authority cipher text-policy attribute-based encryption (CP-ABE), together with a
hierarchical structure, to enforce access control policies. The proposed framework will allow
decision-makers in Saudi Arabia to develop the healthcare sector and to benefit from the
existing e-government cloud computing platform ``Yasser,'' which is responsible for
delivering shared services through a highly efficient, reliable, and safe environment. This
framework aims to provide health services and facilities from the government to citizens
(G2C). Furthermore, multifactor applicant authentication has been identified and proofed in
cooperation with two trusted authorities. The security analysis and comparisons with the
related frameworks have been conducted.
CHAPTER-1
INTRODUCTION

1.1 Purpose
The traditional health system has been replaced by an electronic health information
system because the traditional system has been found to be ineffective due to a number of
issues, including low storage capacity, high operating and maintenance costs, and system
integration. The computerized health system was then replaced by cloud computing because
it relies on a more efficient infrastructure, as well as the many benefits of cloud computing in
IT, such as cost, scalability, flexibility, and other features. The use of cloud computing in
electronic health records reduces costs in the provision of health services, maintenance costs,
networks, licensing fees, and infrastructure in general, and this will therefore encourage
developers to adopt the cloud in healthcare.

The rapid shift to the cloud and its use in healthcare systems has raised concerns
about crucial issues of privacy and information security. The adoption of the cloud in IT
increases the focus and concern of healthcare providers on clinical and patient-related
services and reduces attention on infrastructure management. The sharing of personal and
health information across the Internet and various servers outside the safe environment of the
healthcare institution has led to a number of problems related to privacy, security, access, and
compliance issues.

In the literature, there are no existing powerful frameworks that clearly address all
viable schemes and interrelationships between cloud computing and health- care technology.
Improving the framework for healthcare in cloud computing has been studied by several
researchers. Further developments and solutions in these challenges will increase the
adoption of cloud health- care and encourage healthcare providers to move forward with
cloud-based services. Our contributions can be summarized as follows:

Provides a flexible, secure, cost-effective, and privacy- preserved G-cloud-based framework


for government healthcare services by:

1. Applying, using, and modifying the most recent encryption and decryption mechanisms
suited for cloud-based EHR systems. The proposed scheme does not use the standard
encryption system, which is not suited to the cloud environment.

1 Department of Computer Applications, GIET (A), Rajamahendravaram


2. Achieving scalability of computing resources that can be expanded and controlled
according to the required health services. The HER is able to support massive data
exchanges.
3. Providing an effective solution for decision makers in the government health sector to
adopt cloud-
a. based healthcare systems, especially in developing countries.
b. Providing a better authentication multifactor applicant authentication in
cooperation with two trusted authorities.
c. Different domains of attributes are managed by different attribute authorities,
which operate independently from each other and controlled by the central
trusted authority.

1.2 Scope
A new idea in encryption called attribute-based encryption (ABE). In the ABE scheme,
cipher texts and users’ secret keys are associated with a set of attributes. A user can decrypt a
cipher text if, and only if, there is a match between its secret key and the cipher text. ABE has
been applied and tested in many cloud-based applications.

2 Department of Computer Applications, GIET (A), Rajamahendravaram


CHAPTER-2
SYSTEM ANALYSIS

2.1Existing System
These health problems could be prevented before they occur or their complications prevented
by early detection. This is due to a combination of factors: planning, operational, and
technical. If we were able to overcome them, this would lead to significant progress in the
level of health care. In addition, there is a weakness and lack of available hospital
information systems, which is some of the most advanced software that directly serves all
technical and administrative healthcare activities, ensuring that the medical institution has full
control over all its activities and resources. The successes of these advanced systems do not
depend on the exact selection of equipment and software for storage. Rather, their success
depends on their suitability for different users from healthcare providers, such as doctors,
nurses,technicians, and even administratorsfiwhere the vision and priorities of each of these
categories differ, and their information needs vary, as do the benefits of each of these
systems.

2.1.1 Disadvantages
The traditional health system (paper) has been replaced by an electronic health information
system because the traditional system has been found to be ineffective due to a number of
issues, including low storage capacity, high operating and maintenance costs, and system
integration.
In the literature, there are no existing powerful frameworks that clearly address all viable
schemes and interrelationships between cloud computing and healthcare technology

2.2 Proposed System


A cloud-based theoretical framework has been developed for the improvement of electronic
health services in Saudi Arabia. The proposed framework will allow decision makers to
develop the health sector and to benefit from the services provided by other sectors in the
kingdom, such as the electronic services system called ``Absher,'' which is used by the
Ministry of the Interior to ensure the personal identity of the beneficiaries and the e-
government cloud computing platform ``Yasser,'' which is responsible for delivering shared

3 Department of Computer Applications, GIET (A), Rajamahendravaram


services through a highly efficient, reliable, and safe environment. The proposed framework
uses cloud computing to develop health services provided by the Ministry of Health to
citizens.This framework aims to provide health services and facilities from the government to
citizens (G2C) in the kingdom

Advantages
1.Data privacy
2.Fine grained access control

Modules Description

The Patient
The patient is the main entity in our proposed framework. The patient has the following main
tasks:
A new patient must apply for an authentication request to the trusted authority to get his or
her identification number (ID), and then he or she will be able to use the system services.
Creates the patient history record (PHR) and stores it at the cloud server.
Ensures the PHR is fully secured and protected by defining an (attribute-based) access policy
that can be used for encrypting the data before it is distributed.

Healthcare Providers
Healthcare providers are individuals who provide healthcare services of all kinds in an
organized manner to all members of a community. The healthcare providers could include the
following members: health practitioners and specialists, physicians, nurses, pharmacists,
surgeons, medical technicians,
laboratory workers, and other employees. Each of these members must have access to some
part of the patient records for specific purposes.
Each healthcare provider must complete the following tasks:
Apply for an identification number (ID) from the trusted authority to be able to access
specific parts of the
patient's record.
Apply a request for the secret key attached with the appropriate parameters.
Be able to decrypt, modify, and encrypt the same document with the same key.
Trusted Authority

4 Department of Computer Applications, GIET (A), Rajamahendravaram


The trusted authority (TU), such as the Ministry of Health or any government sector, is
responsible for the following functions:
Authenticate all participants who interact with the system.
Generate keys for healthcare providers and publish public parameters required by
cryptographic operations.
The E-Government Cloud-Based HER
The proposed e-government cloud-based EHR consists of the following cloud services:
The first service consists of two fundamental parts: data repository and computing resources.
The first service is responsible for storing the encrypted EHRs that are accessible only by the
authenticated healthcare providers through an access policy based on healthcare provider
attributes.
The second service is responsible for generating the access policies, providing efficient keys
management, and performing other required computing processes.
The third service is hosting the web-based portal. The developed web-based portal should be
a secure online website that can be accessed by the stockholders from anywhere, with 24-
hour a day access, through Internet connection, and can be accessed by any device.
FEASIBILITY STUDY

Preliminary investigation examine project feasibility, the likelihood the system


will be useful to the organization. The main objective of the feasibility study is to test the
Technical, Operational and Economical feasibility for adding new modules and debugging
old running system. All system is feasible if they are unlimited resources and infinite time.
There are aspects in the feasibility study portion of the preliminary investigation:

• Technical Feasibility
• Operational Feasibility
• Economical Feasibility

ECONOMIC FEASIBILITY

A system can be developed technically and that will be used if installed must still be a
good investment for the organization. In the economical feasibility, the development cost in
creating the system is evaluated against the ultimate benefit derived from the new systems.
Financial benefits must equal or exceed the costs.

The system is economically feasible. It does not require any addition hardware or
software. Since the interface for this system is developed using the existing resources and
5 Department of Computer Applications, GIET (A), Rajamahendravaram
technologies available at NIC, There is nominal expenditure and economical feasibility for
certain.

OPERATIONAL FEASIBILITY

Proposed projects are beneficial only if they can be turned out into information
system. That will meet the organization’s operating requirements. Operational feasibility
aspects of the project are to be taken as an important part of the project implementation.
Some of the important issues raised are to test the operational feasibility of a project includes
the following: -

• Is there sufficient support for the management from the users?


• Will the system be used and work properly if it is being developed and implemented?
• Will there be any resistance from the user that will undermine the possible application
benefits?
This system is targeted to be in accordance with the above-mentioned issues.
Beforehand, the management issues and user requirements have been taken into
consideration. So there is no question of resistance from the users that can undermine the
possible application benefits.

The well-planned design would ensure the optimal utilization of the computer resources and
would help in the improvement of performance status.

TECHNICAL FEASIBILITY

The technical issue usually raised during the feasibility stage of the investigation
includes the following:

• Does the necessary technology exist to do what is suggested?


• Do the proposed equipments have the technical capacity to hold the data required to use
the new system?
• Will the proposed system provide adequate response to inquiries, regardless of the
number or location of users?
• Can the system be upgraded if developed?
• Are there technical guarantees of accuracy, reliability, ease of access and data security?
Earlier no system existed to cater to the needs of ‘Secure Infrastructure
Implementation System’. The current system developed is technically feasible. It is a web
based user interface for audit workflow at NIC-CSD. Thus it provides an easy access to the
users. The database’s purpose is to create, establish and maintain a workflow among various
6 Department of Computer Applications, GIET (A), Rajamahendravaram
entities in order to facilitate all concerned users in their various capacities or roles.
Permission to the users would be granted based on the roles specified. Therefore, it provides
the technical guarantee of accuracy, reliability and security. The software and hard
requirements for the development of this project are not many and are already available in-
house at NIC or are available as free as open source.

7 Department of Computer Applications, GIET (A), Rajamahendravaram


CHAPTER-3

SYSTEM REQUIREMENTS

3.1 FUNCTIONAL REQUIREMENTS


Patient(User):
Patient search report, after search if file available submit for key and View file if he/she enter
correct key.
Trust:
Trust View All Patient details and accept file request from users.
E GOVT:
E GOVT view HSP and Patient details, Attacker information, User Keys and Revoke Users.
Attacker:

View un-attacked users and attack user file.

HSP(Owner):

HSP Upload Patient Details, view all previously uploaded documents and view public keys.

3.2NON FUNCTIONAL REQUIREMENTS

The major non-functional Requirements of the system are as follows

Usability
The system is designed with completely automated process hence there is no or less user
intervention.

Reliability
The system is more reliable because of the qualities that are inherited from the chosen
platform java. The code built by using java is more reliable.

Performance
This system is developing in the high level languages and using the advanced front-end and
back-end technologies it will give response to the end user on client system with in very less
time.

Supportability

8 Department of Computer Applications, GIET (A), Rajamahendravaram


The system is designed to be the cross platform supportable. The system is supported on a
wide range of hardware and any software platform, which is having JVM, built into the
system.
Implementation
The system is implemented in web environment using struts framework. The apache tomcat
is used as the web server and windows xp professional is used as the platform.
Interface the user interface is based on Struts provides HTML Tag

3.3 Software Requirements


Language : JDK (1.7.0)
Frontend : JSP, Servlets
Backend : Oracle10g
IDE : my eclipse 8.6
Operating System : windows XP
Server : tomcat
3.4 Hardware Requirements
Processor : Pentium IV
Hard Disk : 80GB
RAM : 2GB

9 Department of Computer Applications, GIET (A), Rajamahendravaram


CHAPTER-4

SYSTEM DESIGN
The purpose of the design phase is to plan a solution of the problem specified by the
requirement document. This phase is the first step in moving from the problem domain to the
solution domain. In other words, starting with what is needed, design takes us toward how to
satisfy the needs. The design of a system is perhaps the most critical factor affection the
quality of the software; it has a major impact on the later phase, particularly testing,
maintenance. The output of this phase is the design document. This document is similar to a
blueprint for the solution and is used later during implementation, testing and maintenance.
The design activity is often divided into two separate phases System Design and Detailed
Design. System Design also called top-level design aims to identify the modules that should
be in the system, the specifications of these modules, and how they interact with each other to
produce the desired results.

System Model
Introduction to UML
The unified Modeling Language (UML) is a standard language for writing software
blueprints. The UML may be used to visualize, specify , construct and document the artifacts
of software-intensive system.
The goal of UML is to provide a standard notation that can be used by all object - oriented
methods and to select and integrate the best elements .UML is itself does not prescribe or
advice on how to use that notation in a software development process or as part of an object -
design methodology. The UML is more than just bunch of graphical symbols. Rather , behind
each symbol in the UML notation is well-defined semantics.
The system development focuses on three different models of the system.
➔ Functional model
➔ Object model
➔ Dynamic model
Functional model in UML is represented with use case diagrams , describing the
functionality of the system from user point of view.

Object model in UML is represented with class diagrams , describing the structure of the
system in terms of objects , attributes , associations and operations

10 Department of Computer Applications, GIET (A), Rajamahendravaram


Data Flow Diagrams

A graphical tool used to describe and analyze the moment of data through a system manual or

automated including the process, stores of data, and delays in the system. Data Flow

Diagrams are the central tool and the basis from which other components are developed. The

transformation of data from input to output, through processes, may be described logically

and independently of the physical components associated with the system. The DFD is also

know as a data flow graph or a bubble chart.

DFDs are the model of the proposed system. They clearly should show the requirements on

which the new system should be built. Later during design activity this is taken as the basis

for drawing the system’s structure charts. The Basic Notation used to create a DFD’s are as

follows:

1. Dataflow: Data move in a specific direction from an origin to a destination.

2. Process: People, procedures, or devices that use or produce (Transform) Data. The

physical component is not identified.

11 Department of Computer Applications, GIET (A), Rajamahendravaram


12 Department of Computer Applications, GIET (A), Rajamahendravaram
CHAPTER-5

SYSTEM IMPLEMENTATION

5.1 Technology Description

About the Java Technology

The Java platform consists of the Java application programming interfaces


(APIs) and the Java virtual machine (JVM).

The following Java technology lets developers, designers, and business partners develop and
deliver a consistent user experience, with one environment for applications on mobile and
embedded devices. Java meshes the power of a rich stack with the ability to deliver
customized experiences across such devices.

Java APIs are libraries of compiled code that you can use in your programs. They let you add
ready-made and customizable functionality to save you programming time.
Java programs are run (or interpreted) by another program called the Java Virtual Machine.
Rather than running directly on the native operating system, the program is interpreted by the
Java VM for the native operating system. This means that any computer system with the Java
VM installed can run Java programs regardless of the computer system on which the
applications were originally developed.

In the Java programming language, all source code is first written in plain text files ending
with the .java extension. Those source files are then compiled into .class files by the javac
compiler. A .class file does not contain code that is native to your processor; it instead

13 Department of Computer Applications, GIET (A), Rajamahendravaram


contains bytecodes — the machine language of the Java Virtual Machine (Java VM). The
java launcher tool then runs your application with an instance of the Java Virtual Machine.

Because the Java VM is available on many different operating systems, the same .class files
are capable of running on Microsoft Windows, the Solaris TM Operating System (Solaris
OS), Linux, or Mac OS.

Java technology is both a programming language and a platform.

The Java Programming Language

The Java programming language is a high-level language that can be characterized by all of
the following buzzwords:

• Simple • Architecture neutral


• Object oriented • Portable
• Distributed • High performance
• Multithreaded • Robust
• Dynamic • Secure

5.2 SAMPLE CODE


Login.jsp
<!DOCTYPE html>
<html>
<head>
<meta name="viewport" content="width=device-width, initial-scale=1">
<style>
body {font-family: Arial, Helvetica, sans-serif;}
/* Full-width input fields */
input[type=text], input[type=password] {
width: 100%;
padding: 12px 20px;
margin: 8px 0;
display: inline-block;

14 Department of Computer Applications, GIET (A), Rajamahendravaram


border: 1px solid #ccc;
box-sizing: border-box;
}
/* Set a style for all buttons */
button {
background-color: #4CAF50;
color: white;
padding: 14px 20px;
margin: 8px 0;
border: none;
cursor: pointer;
width: 100%;
}
button:hover {
opacity: 0.8;
}
/* Extra styles for the cancel button */
.cancelbtn {
width: auto;
padding: 10px 18px;
background-color: #f44336;
}
/* Center the image and position the close button */
.imgcontainer {
text-align: center;
margin: 24px 0 12px 0;
position: relative;
}
img.avatar {
width: 40%;
border-radius: 50%;

15 Department of Computer Applications, GIET (A), Rajamahendravaram


}
.container {
padding: 16px;
}

span.psw {
float: right;
padding-top: 16px;
}
/* The Modal (background) */
.modal {
display: none; /* Hidden by default */
position: fixed; /* Stay in place */
z-index: 1; /* Sit on top */
left: 0;
top: 0;
width: 100%; /* Full width */
height: 100%; /* Full height */
overflow: auto; /* Enable scroll if needed */
background-color: rgb(0,0,0); /* Fallback color */
background-color: rgba(0,0,0,0.4); /* Black w/ opacity */
padding-top: 60px;
}
/* Modal Content/Box */
.modal-content {
background-color: #fefefe;
margin: 5% auto 15% auto; /* 5% from the top, 15% from the bottom and centered */
border: 1px solid #888;
width: 80%; /* Could be more or less, depending on screen size */
}

16 Department of Computer Applications, GIET (A), Rajamahendravaram


/* The Close Button (x) */
.close {
position: absolute;
right: 25px;
top: 0;
color: #000;
font-size: 35px;
font-weight: bold;
}
.close:hover,
.close:focus {
color: red;
cursor: pointer;
}
/* Add Zoom Animation */
.animate {
-webkit-animation: animatezoom 0.6s;
animation: animatezoom 0.6s
}
@-webkit-keyframes animatezoom {
from {-webkit-transform: scale(0)}
to {-webkit-transform: scale(1)}
}

@keyframes animatezoom {
from {transform: scale(0)}
to {transform: scale(1)}
}
/* Change styles for span and cancel button on extra small screens */
@media screen and (max-width: 300px) {
span.psw {

17 Department of Computer Applications, GIET (A), Rajamahendravaram


display: block;
float: none;
}
.cancelbtn {
width: 100%;
}
}
</style>
</head>
<body>
<h2>Modal Login Form</h2>
<button onclick="document.getElementById('id01').style.display='block'"
style="width:auto;">Login</button>
<div id="id01" class="modal">
<form class="modal-content animate" action="" method="post">
<div class="imgcontainer">
<span onclick="document.getElementById('id01').style.display='none'" class="close"
title="Close Modal">&times;</span>
<img src="images/healthcare1.jpg" alt="Avatar" class="avatar">
</div>
<div class="container">
<label for="uname"><b>Username</b></label>
<input type="text" placeholder="Enter Username" name="uname" required>
<label for="psw"><b>Password</b></label>
<input type="password" placeholder="Enter Password" name="psw" required>
<button type="submit">Login</button>
</div>
<div class="container" style="background-color:#f1f1f1">
<button type="button" onclick="document.getElementById('id01').style.display='none'"
class="cancelbtn">Cancel</button>
</div>
</form>

18 Department of Computer Applications, GIET (A), Rajamahendravaram


</div>
<button onclick="document.getElementById('id02').style.display='block'"
style="width:auto;">Sign UP</button>
<div id="id02" class="modal">
<form class="modal-content animate" action="" method="post">
<div class="imgcontainer">
<span onclick="document.getElementById('id02').style.display='none'" class="close"
title="Close Modal">&times;</span>
<img src="images/healthcare1.jpg" alt="Avatar" class="avatar">
</div>
<div class="container">
<label for="uname"><b>username</b></label>
<input type="text" placeholder="Enter Username" name="uname" required>

<label for="password"><b>Password</b></label>
<input type="text" placeholder="Enter Password" name="password" required>
<label for="email"><b>Email</b></label>
<input type="text" placeholder="Enter Email" name="email" required>
<label for="dob"><b>Date Of Birth</b></label>
<input type="date" placeholder="Enter dob" name="dob" required>
<br/>
<label for="mobile"><b>Mobile</b></label>
<input type="text" placeholder="Enter Mobile" name="mobile" pattern="{1}[789]{9}[0-
9]" title="Please Enter Mobile Number" maxlength="10" required>
<button type="submit">Sign UP</button>
</div>
<div class="container" style="background-color:#f1f1f1">
<button type="button" onclick="document.getElementById('id02').style.display='none'"
class="cancelbtn">Cancel</button>
</div>
</form>
</div>

19 Department of Computer Applications, GIET (A), Rajamahendravaram


<script>
// Get the modal
var modal = document.getElementById('id01');
var modal = document.getElementById('id02');
// When the user clicks anywhere outside of the modal, close it
window.onclick = function(event) {
if (event.target == modal) {
modal.style.display = "none";
}
}
</script>
</body>
</html>

CHAPTER-6

20 Department of Computer Applications, GIET (A), Rajamahendravaram


SYSTEM TESTING

TESTING METHODOLOGIES

The following are the Testing Methodologies:

o Unit Testing.
o Integration Testing.
o User Acceptance Testing.
o Output Testing.
o Validation Testing.

Unit Testing

Unit testing focuses verification effort on the smallest unit of Software design that is
the module. Unit testing exercises specific paths in a module’s control structure to ensure
complete coverage and maximum error detection. This test focuses on each module
individually, ensuring that it functions properly as a unit. Hence, the naming is Unit Testing.

During this testing, each module is tested individually and the module interfaces are
verified for the consistency with design specification. All important processing path are
tested for the expected results. All error handling paths are also tested.

Integration Testing

Integration testing addresses the issues associated with the dual problems of
verification and program construction. After the software has been integrated a set of high
order tests are conducted. The main objective in this testing process is to take unit tested
modules and builds a program structure that has been dictated by design.

The following are the types of Integration Testing:

1)Top Down Integration

This method is an incremental approach to the construction of program structure.


Modules are integrated by moving downward through the control hierarchy, beginning with
the main program module. The module subordinates to the main program module are
incorporated into the structure in either a depth first or breadth first manner.
In this method, the software is tested from main module and individual stubs are
replaced when the test proceeds downwards.
21 Department of Computer Applications, GIET (A), Rajamahendravaram
2. Bottom-up Integration

This method begins the construction and testing with the modules at the lowest level
in the program structure. Since the modules are integrated from the bottom up, processing
required for modules subordinate to a given level is always available and the need for stubs is
eliminated. The bottom up integration strategy may be implemented with the following steps:

▪ The low-level modules are combined into clusters into clusters that perform a
specific Software sub-function.
▪ A driver (i.e.) the control program for testing is written to coordinate test case input
and output.
▪ The cluster is tested.
▪ Drivers are removed and clusters are combined moving upward in the program
structure

The bottom up approaches tests each module individually and then each module is module is
integrated with a main module and tested for functionality.

User Acceptance Testing

User Acceptance of a system is the key factor for the success of any system. The system
under consideration is tested for user acceptance by constantly keeping in touch with the prospective
system users at the time of developing and making changes wherever required. The system developed
provides a friendly user interface that can easily be understood even by a person who is new to the
system.

Output Testing

After performing the validation testing, the next step is output testing of the proposed system,
since no system could be useful if it does not produce the required output in the specified format.
Asking the users about the format required by them tests the outputs generated or displayed by the
system under consideration. Hence the output format is considered in 2 ways – one is on screen and
another in printed format.

CHAPTER-7

22 Department of Computer Applications, GIET (A), Rajamahendravaram


RESULTS

7.1 Home Page

23 Department of Computer Applications, GIET (A), Rajamahendravaram


7.2 SignUP Page

24 Department of Computer Applications, GIET (A), Rajamahendravaram


7.3 Attackers Information Page

25 Department of Computer Applications, GIET (A), Rajamahendravaram


7.4 Revoke User Page

26 Department of Computer Applications, GIET (A), Rajamahendravaram


7.5 Trust Authority Page

27 Department of Computer Applications, GIET (A), Rajamahendravaram


CHAPTER-8

CONCLUSION & FUTURE SCOPE


Secure cloud-based EHR framework that guarantees the security and privacy of medical data
stored in the cloud, relying on hierarchical multi-authority CP-ABE to enforce access control
policies. The proposed framework provides a high level of integration, interoperability, and
sharing of EHRs among healthcare providers, patients, and practitioners. In the framework,
the attribute domain authority manages a different attribute domain and operates
independently. In addition, no computational overhead is completed by the government
authority, and multifactor applicant authentication have been identified and proofed.

The proposed scheme can be adopted by any government that has a cloud computing
infrastructure and provides treatment services to the majority of citizen patients. Future work
includes implementing and evaluating the proposed scheme in a real-world environment

28 Department of Computer Applications, GIET (A), Rajamahendravaram


REFERENCES
Core Java™ 2 Volume I – Fundamentals 7th Edition - Cay S. Hortsman
Pearson Education – Sun Microsystems Gary Cornell

Core Java™ 2 Volume II – Advanced - Cay S. Hortsman


Pearson Education – Sun Microsystems Gary Cornell

Head First Servlets & JSP - Eric Freeman


O’Reilly – SPD Elisabeth Freeman

The Book of JavaScript 2nd Edition - Thau


SPD

Effective Java – Programming Language Guide - Joshua Bloch


Pearson Education – Sun Microsystems

Java Database Best Practices - George Reese


O’Reilly – SPD

29 Department of Computer Applications, GIET (A), Rajamahendravaram

You might also like