Security of Stored Data using AES Algorithm for Hospital Management System
Arnav Mehta1, Gaurav Jain2, Abirami G3

1Arnav Mehta*, Department of Computer Science and Engineering, SRMIST, Kattankulathur, India. 
2Gaurav Jain, Department of Computer Science and Engineering, SRMIST, Kattankulathur, India. 
3Abirami G, Department of Computer Science and Engineering, SRMIST, Kattankulathur, India.
Manuscript received on March 12, 2020. | Revised Manuscript received on April 25, 2020. | Manuscript published on April 30, 2020. | PP: 2199-2201 | Volume-9 Issue-4, April 2020. | Retrieval Number: D9100049420/2020©BEIESP | DOI: 10.35940/ijeat.D9100.049420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: : Securing data of patient in hospital is need of hour since hackers can misuse this data for doing some scam. There is increase in number of cyber attacks on healthcare organizations and the cybercriminals developing more sophisticated tools to attack healthcare industry, therefore security of healthcare has become more important. Many incidents have been reported, where patient comes to hospital routine blood check up, but pathologist hack old data of patient and generate a fake report by putting figure based on old data of last report and fool patient. There are scandals wherein certain organization hack the system of well reputed hospital to get private information about patient history and health record and misuse this information which lead to lot of agony and harassment to patient. Cyber attacks cause major disruption in healthcare services even in the best of time. Our project will ensure that that patient’s data remain secure and does not goes into hand of wrong people. In this paper we have discussed method to store healthcare data in data in cloud and use AES encryption algorithm to encrypt data, so it does not go into wrong hand.
Keywords: AES (Advance encryption Standard), Public Auditing, Integrity Check, Key-aggregation cryptosystem (KAC)