HospitalCloud - Final Am
HospitalCloud - Final Am
LIST OF TABLES
LIST OF FIGURES
LIST OF ABBREVIATIONS
1 Introduction
1.2 Objectives
2 System Analysis
3 System Specification
4 Software Description
5 Project Description
5.1 Problem Definition
6 System Testing
7 System Implementation
9 Appendix
10 References
ABSTRACT
The project deals with the hospital branch and patients management. Since cloud
computing delivers convenient, on-demand access to shared pools of data, applications
and hardware over the internet, it provides unlimited infrastructure to store and execute
patient data and program.
Due to this redundancy the data can be easily modified by unauthorized users
which can be stored in the database. This leads to loss of data privacy and security to
database. The proposed scheme ensures that cyclic redundancy check and time-tested
practices and technologies for managing trust relationships in traditional enterprise
environments can be extended to work effectively in both private and public clouds.
Those practices include data encryption, strong authentication and fraud detection, etc.
The testing application to enable Data Storage Security in Cloud Computing for
Hospital Enterprises designed using Microsoft Visual Studio .Net 2005 as front end. The
coding language used is Visual C# .Net. The web technology used is ASP .Net 2005.
MS-SQL Server 2000 is used as back end database.
LIST OF TABLES
5.9.1 ADMIN
5.9.2 BRANCH
5.9.3 DOCTORS
5.9.4 PATIENTS
5.9.5 TABLETS
5.9.7 RECEIPT
5.9.8 PRESCRIPTION
LIST OF FIGURES
5.4.1 SYSTEM FLOW DIAGRAM
LIST OF ABBREVIATIONS
CLR : COMMON LANGUAGE RUNTIME
IL : INTERMEDIATE LANGUAGE
To maintain the visits, prescription and receipt details in cloud storage space.
2. SYSTEM ANALYSIS
2. No more operations are carried out in any encrypted message and so security is
somewhat is less.
1. Since the data is kept in cloud space, hospital employees are not required to
2. Operations are carried out in encrypted message format and so security is more
The feasibility study deals with all the analysis that takes up in developing the
project. Each structure has to be thought of in the developing of the project, as it has to
serve the end user in a user-friendly manner. One must know the type of information to
be gathered and the system analysis consist of collecting, Organizing and evaluating facts
about a system and its environment.
The main objective of the system analysis is to study the existing operation and to
learn and accomplish the processing activities. The secure communication processing
through web application is needed to be analyzed well. The details are processed through
coding themselves. It will be controlled by the programs alone.
2.5.1 ECONOMIC FEASIBILITY
The organization has to buy a personal computer with a keyboard and a mouse,
this is a direct cost. There are many direct benefits of covering the manual system to
computerized system. The user can be given responses on asking questions, justification
of any capital outlay is that it will reduce expenditure or improve the quality of service or
goods, which in turn may be expected to provide the increased profits.
The cost and benefit analysis may be concluded that computerized system is
favorable in today’s fast moving world. The assessment of technical feasibility must be
based on an outline design of the system requirements in terms of input, output, files,
programs and procedure. The project aims to communicate securely even the records
contain multiple branches patients visit information using web application. The current
system aims to overcome the problems of the existing system. The current system is to
reduce the technical skill requirements so that more number of users can access the
application.
3. SYSTEM SPECIFICATION
This section gives the details and specification of the hardware on which the
system is expected to work.
Hard disk : 80 GB
This section gives the details of the software that are used for the development.
The .NET Framework can be hosted by unmanaged components that load the
common language runtime into their processes and initiate the execution of managed
code, thereby creating a software environment that can exploit both managed and
unmanaged features. The .NET Framework not only provides several runtime hosts, but
also supports the development of third-party runtime hosts.
1 Security
2 Robustness
3 Productivity
4 Performance
Visual Basic .NET, Visual C++ .NET, and Visual C# .NET all use the same
integrated development environment (IDE), which allows them to share tools and
facilitates in the creation of mixed-language solutions. In addition, these languages
leverage the functionality of the .NET Framework and simplify the development of ASP
Web applications and XML Web services.
Visual Studio supports the .NET Framework, which provides a common language
runtime and unified programming classes; ASP.NET uses these components to create
ASP Web applications and XML Web services. Also it includes MSDN Library, which
contains all the documentation for these development tools.
VISUAL C#
Visual C# includes many new features. The Visual C# supports interfaces but not
implementation inheritance. Visual C# supports implementation inheritance, interfaces
and overloading. In addition, Visual C# .NET supports multithreading concept.
IMPLEMENTATION INHERITANCE
Constructors are used to initialize objects, whereas destructors are used to destroy
them. In other words, destructors are used to release the resources allocated to the object.
In Visual C# .NET the sub finalize procedure is available. The sub finalize procedure is
used to complete the tasks that must be performed when an object is destroyed. The sub
finalize procedure is called automatically when an object is destroyed. In addition, the
sub finalize procedure can be called only from the class it belongs to or from derived
classes.
GARBAGE COLLECTION
OVERLOADING
MULTITHREADING
FEATURES OF SQL-SERVER
INTERNET INTEGRATION
The SQL Server 2000 database engine includes integrated XML support. It also
has the scalability, availability, and security features required to operate as the data
storage component of the largest Web sites. The SQL Server 2000 programming model is
integrated with the Windows DNA architecture for developing Web applications, and
SQL Server 2000 supports features such as English Query and the Microsoft Search
Service to incorporate user-friendly queries and powerful search capabilities in Web
applications.
The same database engine can be used across platforms ranging from laptop
computers running Microsoft Windows® 98 through large, multiprocessor servers
running Microsoft Windows 2000 Data Center Edition. SQL Server 2000 Enterprise
Edition supports features such as federated servers, indexed views, and large memory
support that allow it to scale to the performance levels required by the largest Web sites.
ENTERPRISE-LEVEL DATABASE FEATURES
The SQL Server 2000 relational database engine supports the features required to
support demanding data processing environments. The database engine protects data
integrity while minimizing the overhead of managing thousands of users concurrently
modifying the database. SQL Server 2000 distributed queries allow you to reference data
from multiple sources as if it were a part of a SQL Server 2000 database, while at the
same time, the distributed transaction support protects the integrity of any updates of the
distributed data. Replication allows you to also maintain multiple copies of data, while
ensuring that the separate copies remain synchronized. You can replicate a set of data to
multiple, mobile, disconnected users, have them work autonomously, and then merge
their modifications back to the publisher.
SQL Server 2000 includes a set of administrative and development tools that
improve upon the process of installing, deploying, managing, and using SQL Server
across several sites. SQL Server 2000 also supports a standards-based programming
model integrated with the Windows DNA, making the use of SQL Server databases and
data warehouses a seamless part of building powerful and scalable systems. These
features allow you to rapidly deliver SQL Server applications that customers can
implement with a minimum of installation and administrative overhead.
DATA WAREHOUSING
SQL Server 2000 includes tools for extracting and analyzing summary data for
online analytical processing. SQL Server also includes tools for visually designing
databases and analyzing data using English-based questions.
5. PROJECT DESCRIPTION
The first step in the software development life cycle is the identification of the
problem. As the success of the system depends largely on how accurately a problem is
identified.
So, this project identifies that, it helps for preventing such problems. The software
used to solve the problem and develop the application is Microsoft Visual Studio .Net
2005 with coding language C# and MS-SQL Server 2000.
The problem is taken in to consideration and tries to solve the problem using
following modules.
2. Database (With all regular visits, prescription and receipt data) Management in
Cloud Space.
The project deals with the hospital branch and patients management. Since cloud
computing delivers convenient, on-demand access to shared pools of data, applications
and hardware over the internet, it provides unlimited infrastructure to store and execute
patient data and program.
Due to this redundancy the data can be easily modified by unauthorized users
which can be stored in the database. This leads to loss of data privacy and security to
database. The proposed scheme ensures that cyclic redundancy check and time-tested
practices and technologies for managing trust relationships in traditional enterprise
environments can be extended to work effectively in both private and public clouds.
Those practices include data encryption, strong authentication and fraud detection, etc.
The testing application to enable Data Storage Security in Cloud Computing for
Hospital Enterprises designed using Microsoft Visual Studio .Net 2005 as front end. The
coding language used is Visual C# .Net. The web technology used is ASP .Net 2005.
MS-SQL Server 2000 is used as back end database.
5.3 MODULE DESCRIPTION
5.3.2 Database (With all regular visits, prescription and receipt data)
Management in Cloud Space.
In this module, the hospital server is updated with the day to day visit results of
the transactions made by them. Since the server requirement is to minimum (since the
cloud manage every data (here the hardware resources are kept to be minimum)), only
un-encrypted information is to be stored in data owner’s (hospital) space. This is to verify
the data integrity between the data replicated redundantly in more cloud spaces. The data
to be stored in strongly encrypted in both the places.
5.3.2 Database (With all regular visits, prescription and receipt data) Management
in Cloud Space
In this module, the cloud server is updated with the day to day visit details,
prescription and receipt made by them. The cloud provider manages all data (here the
hardware resources are kept to be maximum). The kind of users accessing the data is
more and so different privileges are to be assigned to them so that unauthorized data
modification or theft is prevented. The data is encrypted and stored so that the all users
(except content owner) are unable to view the actual data.
RECEIPT ENTRY
BRANCH VIEW
DELETE DELETE
TABLET BRANCH
PRESCRIPTION
PATIENTS
ENTRY
DOCTOR VIEW
ENTRY
VISITS VIEW
EDIT
DOCTOR
RECEIPT VIEW
DELETE
DOCTOR PRESCRIPTION
VIEW
DOCTORS
VIEW
REPORTS
BRANCHES
PATIENTS
TABLETS
RECEIPT VIEW
ALL PATIENT ID
WISE
5.5 DATA FLOW DIAGRAM
Branch Entry
Patient Doctor
Entry Entry
Branch
Patients Doctors
Hospital
HospitalDatabase
Database
Updation Branch
Hospital User
Login in Cloud HospitalUsers
Space
Database
Updation in CloudDB
Cloud Server
Users Login
Provision Users
FIG 5.5.2 DATA FLOW DIAGRAM (TRANSACTIONS)
Admin Login
Admin
Visit
Entry
Prescription
Entry Prescription
Visits
Tablets
Receipt Entry
Receipt
5.6 DATABASE DESIGN
The most important consideration in designing the database is, how information
will be used. The main objectives of designing a database are:
Data Integration:
Data integrity means storing all data in one place only and how each application
to access it. This approach results in more consistent information, one update being
sufficient to achieve a new record status for all applications. This leads to less data
redundancy; data items need not be duplicated; a reduction in the direct access storage
requirement.
Data Independence:
The tables needed for each module were designed and the specification of each
and every column based on the records is provided and details collected during record
specification of the system study.
HospitalAdminPassword Varchar 15
CreatedBy Varchar 15
LastLogoutTime Datetime 8
BranchName Varchar 50
EntryDate Datetime 8
Street Varchar 50
City Varchar 50
State Varchar 30
5.6.3 TABLE: DOCTORS
AnnualIncome Numeric 9
FatherName Varchar 30
VisitingFrom Varchar 30
VisitingTo Varchar 30
Street Varchar 50
City Varchar 50
State Varchar 30
PinCode Varchar 6
Telephone Varchar 20
Fax Varchar 20
Mobile Varchar 12
EMailID Varchar 50
CustomerId Varchar 20
Name Varchar 50
Dob Datetime 8
HealthCardIdIfAny Varchar 50
EntryDate Datetime 8
Nationality Varchar 50
AnnualIncome Numeric 9
FatherName Varchar 30
GuardianName Varchar 30
Relationship Varchar 30
Street Varchar 50
City Varchar 50
State Varchar 30
Pincode Varchar 6
Telephone Varchar 20
Fax Varchar 20
Mobile Varchar 12
EmailId Varchar 50
TabletName Varchar 50
Category Varchar 20
5.6.6 TABLE: VISITTRANS [HOSPITAL CLOUD WEB DATABASE]
Purpose: To store the patient visit details such as disease and treatment along with charge.
Purpose: To store the user credential such as user name and password to access the web
application.
Purpose: To store the username and passwords of the administrator for web application.
Password Varchar 15
5.7 INPUT DESIGN
The design of the input should be made the input as the over to the numerous
networks in the reliable area that should be passed as the installation in the remote
network. It has the following constraints in the input database.
The system takes input from the users, processes it and produces an output. Input
design is link that ties the information system into the world of its users. The system
should be user-friendly to gain appropriate information to the user. The decisions made
during the input design are,
The project gives the low time consumption to make the sensitive application
made simple. When applying the project it provides the low man-power attrition with the
reasonable output.
The amount of fund that the company can spend into the research and
development of the system is limited. The expenditures must be justified. Thus the
developed system as well within the budget and this was achieved because most of the
technologies used are freely available. Only the customized products had to be purchased.
In this system mainly used to protect the system and files giving file path input
option. Mail sending utility input as sends the Email to recipient with attachment. System
analysis decide the following input design details like, what data to input, what medium
to use, how the data should be arranged or coded, data items and transactions needing
validations to detect errors and at last the dialogue to guide user in providing input.
Input data of a system may not be necessarily is raw data captured in the system
from scratch. These can also be the output of another system or subsystem. The design of
input covers all the phases of input from the creation of initial data to actual entering of
the data to the system for processing. The design of inputs involves identifying the data
needed, specifying the characteristics of each data item, capturing and preparing data fro
computer processing and ensuring correctness of data.
Any Ambiguity in input leads to a total fault in output. The goal of designing the
input data is to make data entry as easy and error free as possible. In the project, the
patient details, visits, prescriptions and receipts are the input given and saved in database
with all transactions encrypted and saved.
The various forms used to implement the windows application project concept
are:
5.7.2 Database (With all regular visits, prescription and receipt data)
Management in Cloud Space.
In this form, the hospital server is updated with the day to day visit results of the
transactions made by them. Since the server requirement is to minimum (since the cloud
manage every data (here the hardware resources are kept to be minimum)), only un-
encrypted information is to be stored in data owner’s (hospital) space.
5.7.2 Database (With all regular visits, prescription and receipt data) Management
in Cloud Space
In this form, the cloud server is updated with the day to day visit details,
prescription and receipt made by them. The cloud provider manages all data (here the
hardware resources are kept to be maximum). The kind of users accessing the data is
more and so different privileges are to be assigned to them so that unauthorized data
modification or theft is prevented.
In this form (hospital and patient login), different kind of privileges is assigned to
different users so that they can view and access the data according to their requirements.
The key arrangements are made such that content owner can modify all the data, the users
only view the data.
5.8 OUTPUT DESIGN
Output design generally refers to the results and information that are generated by
the system for many end-users; it should be understandable with the enhanced format.
The Output of the software is used to make the remote installation of the new software in
the system and, it is awake the immediate alert to the system that should be enhanced it as
the input to the system. Output is the main reason for developing the system and the basis
on which they evaluate the usefulness of the application.
Computer output is the most important direct source of information to the user
output design deals with form design efficient output design should improve the
interfacing with user. The term output applies to any information produced by an
information system in terms of displayed. When analyst design system output, they
Identify the specific output that is needed to meet the requirements of end user.
Previewing the output reports by the user is extremely important because the user is the
ultimate judge of the quality of the output and, in turn, the success of the system
In the project, the patients list, visits list, prescription list and receipt list are displayed in
data grid view controls. The following output forms are available.
In this form, the day to day visit details records are displayed (from cloud server),
prescription and receipt are also displayed. The encrypted data is fetched, decrypted and
displayed.
6. SYSTEM TESTING
After the source code has been completed, documented as related data structures.
Completed the project has to undergo testing and validation where there is subtitle and
The project developer treads lightly, designing and execution test that will
demonstrates that the program works rather than uncovering errors, unfortunately errors
will be present and if the project developer doesn’t find them, the user will find out.
The project developer is always responsible for testing the individual units i.e.
modules of the program. In many cases developer also conducts integration testing i.e.
the testing step that leads to the construction of the complete program structure.
This project has undergone the following testing procedures to ensure its
correctness.
1. Unit testing
In unit testing, we have to test the programs making up the system. For this
reason, Unit testing sometimes called as Program testing. The software units in a system
are the modules and routines that are assembled and integrated to perform a specific
function, Unit testing first on the modules independently of one another, to locate errors.
This enables, to detect errors in coding and logic that are contained with the module
alone. The testing was carried out during programming stage itself.
6.2 USER ACCEPTANCE TESTING
In these testing procedures the project is given to the customer to test whether all
requirements have been fulfilled and after the user is fully satisfied. The project is
perfectly ready. If the user makes request for any change and if they found any errors
those all errors has to be taken into consideration and to be correct it to make a project a
perfect project.
7. SYSTEM IMPLEMENTATION
When the initial design was done for the system, the client was consulted for the
acceptance of the design so that further proceedings of the system development can be
carried on. After the development of the system a demonstration was given to them about
the working of the system. The aim of the system illustration was to identify any
malfunction of the system.
After the management of the system was approved the system implemented in the
concern, initially the system was run parallel with existing manual system. The system
has been tested with live data and has proved to be error free and user friendly.
This process is uses to verify and identify any logical mess working of the system
by feeding various combinations of test data. After the approval of the system by both
end user and management the system was implemented.
System implementation is made up of many activities. The six major activities are
as follows.
Coding
Testing
Once the coding process is begin and proceed in parallel, as each program module
can be tested.
Installation
Installation is the process during which the current system is replaced by the new
system. This includes conversion of existing data, software, and documentation and work
procedures to those consistent with the new system.
Documentation
It is result from the installation process, user guides provides the information of
how the use the system and its flow.
Training plan is a strategy for training user so they quickly learn to the new
system. The development of the training plan probably began earlier in the project.
It is believed that almost all the system objectives that have been planned at the
commencement of the software development have been net with and the implementation
process of the project is completed. A trial run of the system has been made and is giving
good results the procedures for processing is simple and regular order. The process of
preparing plans been missed out which might be considered for further modification of
the application. The project effectively stores and retrieves the records from the cloud
space database server. The records are encrypted and decrypted whenever necessary so
that they are secure.
LOGIN FORM
TABLET MENU
BRANCH MENU
PATIENT MENU
REPORTS MENU
TABLET FORM
BRANCH FORM
DOCTOR FORM
PATIENT FORM
USER FORM
UPDATE VISIT DETAILS FORM
PATIENTS LIST
TABLETS VIEW
PATIENTS LIST
TABLETS LIST
MAIN FORM
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Text;
using System.Windows.Forms;
namespace SecureCloud
public frmMainHospital()
InitializeComponent();
f.Show();
this.Visible = false;
f.ShowDialog();
if (f.ok)
this.Visible = true;
else
Application.Exit();
if (cls.con.State != ConnectionState.Open)
cls.con.Open();
cls.cmd.ExecuteNonQuery();
cls.con.Close();
f.Show();
}
private void viewAccountsToolStripMenuItem_Click(object sender, EventArgs e)
f.viewtype = 1;
f.Show();
f.viewtype = 2;
f.Show();
f.viewtype = 3;
f.Show();
f.Show();
f.viewtype = 3;
f.Show();
if (cls.cloudcon.State != ConnectionState.Open)
cls.cloudcon.Open();
try
if (cls.cloudcmd.ExecuteScalar() == null)
}
else
accdatestr = cls.cloudcmd.ExecuteScalar().ToString();
if (cls.cloudcmd.ExecuteNonQuery() > 0)
else
finally
cls.cloudcon.Close();
}}
public void EncryptMessage(ref string encaccno, string accno)//ref byte[] key)
//Dim key() As Byte = _ {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, _ 15, 16, 17, 18, 19,
20, 21, 22, 23, 24}
byte[] iv = { 8, 7, 6, 5, 4, 3, 2, 1 };
encaccno = des.Encrypt(accno);
byte[] iv = { 8, 7, 6, 5, 4, 3, 2, 1 };
decryptedMessage = des.Decrypt(message);
Application.Exit();
f.Show();
}
private void exitToolStripMenuItem1_Click(object sender, EventArgs e)
Application.Exit();
f.Show();
f.viewtype = 4;
f.Show();
f.Show();
f.mode = 2;
f.Show();
f.Show();
f.mode = 3;
f.Show();
f.mode = 3;
f.Show();
f.Show();
f.Show();
f.Show();
f.viewtype =6;
f.Show();
f.viewtype = 21;
f.Show();
f.reporttype = 1;
f.Show();
f.reporttype = 2;
f.Show();
}
private void tabletsToolStripMenuItem1_Click(object sender, EventArgs e)
f.reporttype = 3;
f.Show();
f.reporttype = 41;
f.Show();
f.reporttype = 42;
f.Show();
f.reporttype = 51;
f.Show();
f.reporttype = 52;
f.Show();
}
f.reporttype =61;
f.Show();
f.reporttype = 62;
f.Show();
}
PATIENT CREATION FORM
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Text;
using System.Windows.Forms;
using Microsoft.VisualBasic;
using System.Diagnostics;
using System.Data.SqlClient;
namespace SecureCloud
{
public partial class frmPatientCreation
{
if (cls.con.State != ConnectionState.Open)
cls.con.Open();
if (cls.cloudcon.State != ConnectionState.Open)
cls.cloudcon.Open();
cls.cmd.ExecuteNonQuery();
cls.cloudcmd.ExecuteNonQuery();
if (R1.Checked == true)
{
Gender = "Male";
}
else if (R2.Checked == true)
{
Gender = "Female";
}
cls.cloudcmd.CommandText = sql;
if (cls.cloudcmd.ExecuteNonQuery() == 1)
{
ClearForm();
}
catch (Exception ex)
{
Interaction.MsgBox(ex.Message, MsgBoxStyle.Critical,"Error");
}
finally
{
cls.con.Close();
cls.cloudcon.Close();
}
}
}
foreach (Control x in GroupBox3.Controls)
{
if (x is TextBox)
{
x.Text = "";
}
}
}
if (cls.cloudcon.State != ConnectionState.Open)
cls.cloudcon.Open();
cls.cloudcmd.CommandText = "Select Count(*)From Patients";
int cnt = 0;
cnt =int.Parse(cls.cloudcmd.ExecuteScalar().ToString()) + 1;
comboBox1.Focus();
}
D1.Text = r[6].ToString();
T4.Text = r[7].ToString();
D2.Text = r[8].ToString();
T5.Text = r[9].ToString();
T6.Text = r[10].ToString();
T7.Text = r[11].ToString();
T8.Text = r[12].ToString();
T9.Text = r[13].ToString();
T10.Text = r[14].ToString();
T11.Text = r[15].ToString();
TxtStreet.Text = r[16].ToString();
TxtAdd1.Text = r[17].ToString();
TxtCity.Text = r[18].ToString();
TxtState.Text = r[19].ToString();
TxtPIN.Text = r[20].ToString();
TxtPhone1.Text = r[21].ToString();
TxtFax1.Text = r[22].ToString();
TxtMobile1.Text = r[23].ToString();
TxtEmailId.Text = r[24].ToString();
else
{
Interaction.MsgBox("Record Not Found", MsgBoxStyle.Information,"Note");
}
r.Close();
}
catch (Exception ex)
{
Interaction.MsgBox(ex.Message, MsgBoxStyle.Critical, "Note");
}
finally
{
cls.cloudcon.Close();
}
}
private void Button4_Click(System.Object sender, System.EventArgs e)
{
try
{
if (cls.cloudcon.State != ConnectionState.Open)
cls.cloudcon.Open();
cls.con.Close();
Interaction.MsgBox("Patient ID. Deleted", MsgBoxStyle.Information, "Note");
}
else
{
//MsgBox("Patient ID. Not Deleted", MsgBoxStyle.Information)
Interaction.MsgBox("Mismatched Patient ID.", MsgBoxStyle.Information, "Note");
}
}
catch (Exception ex)
{
Interaction.MsgBox(ex.Message, MsgBoxStyle.Critical, "Error");
}
finally
{
if (cls.cloudcon.State != ConnectionState.Closed)
cls.cloudcon.Close();
}
}
}
}
10. REFERENCES
BOOK REFERENCES
3. Herbert Schildt, “C# 2.0, The Complete Reference”, Osborne Complete Reference
Series.
WEB REFERENCES
1. http://msdn.microsoft.com
2. http://www.c-sharpcorner.com
3. http://www.codeproject.com
4. http://www.programmersheaven.com