Keywords

1 Introduction

India as a developing nation health care is also an important domain to be taken care and it needed special care as it involves confidential and sensitive data of patients. Manipulation of health records is always a matter of life and death. Recently death related to medical negligence has become common news, especially during pregnancy and childbirth. This not only affects the citizen’s trust in hospitals but also affects the reputation of doctor’s community. As per World Health Report ranking India’s healthcare system is at 112 out of 190 countries [1, 2]. So, it is high time to implement a proper health care management system to improve the quality of life of citizens and to reduce infant and maternal mortality rate. A proper and systematic medical data recording system based on individual health record will help in reducing the infant mortality rate (IMR) and maternal mortality rate (MMR) also helps in minimizing medical malpractices.

The scope of the study includes improving the quality of health care system in India which has key issues like maternal mortality, birth defects etc. by providing an Electronic health record (EHR) and a usable authentication system as the digital data plays a vital role. Digital society is in store for near future for all the countries across the globe and it has a high impact as the online users are increasing day by day. Most of the organizations are globally connected leading to economic growth whereas few domains such as healthcare are not exploiting the online facilities apart from few private hospitals as the data breach and confidentiality issues are major inhibitors.

This paper proposes a simple and usable health care system which concurrently maintains EHR and prevents unauthorized access to it by using DNA based encryption techniques. Aadhaar, 12-digit unique identification number issued by the Unique Identification Authority of India [3] is also incorporated into the proposed EHR and related authentication system as it helps and plays a major role for unique identification of a citizen. The proposed system will be beneficial for m-health based services as the system ensures security without using complex algorithms and the model is Universal and can be implemented in the countries where a unique national ID is used for residents. Linking DNA and EHR has various benefits as the future is of personalized medicine, (e.g. Pharmacogenomics) and real DNA can be used for authentication of EHR. Next section explains the existing EHR systems across the world, merits and demerits, usage of internet connectivity and mobile and its impact on health care.

2 Electronic Health Records Welfare, Challenges and Existing Systems

EHR plays an important role considering the quality of care, patient safety and on time treatment whereas information security issues and data breach related to the health care industry are major concerns. Nir Menachemi and Taleah H Collum gives details on the benefits and drawbacks of EHR systems. In the paper, the authors highlight the potential benefits of EHR and related uses in clinical, organizational and societal and outcomes. EHR systems have many capabilities but main functionalities which improve the quality of health care are Clinical decision support (CDS) tools, Computerized physician order entry (CPOE) systems and Health information exchange (HIE).

All the three criteria mentioned above are of “meaningful use” set forth in the HITECH Act of 2009 [4]. Benefits of using EHR also includes reducing malpractices, increased availability of data which in turn helps in clinical analysis and helps in providing best practices. The major drawbacks for the adoption of EHR are security and privacy concerns whereas financial issues and changes in the workflow are also considered [5].

Most of the countries are shifting towards digitization of data in every field whereas health care is a domain which has more benefits of digitization. Digital health data provides availability and interoperability of health information which is essential during an emergency as it ensures timely treatment and care and helps to reduce mortality. Setting up digital databases will help in HIE at the same time ensuring security and privacy is a major concern. The majority of the private hospitals are using the benefits of digitization whereas government sectors are still inert to tackle the situation.

The majority of the developed countries have well-defined Health Care System and it varies from nation to nation depending on the economic development and available resources. EHR implementation around the world is reviewed by the author in [6] and gives a quick look of adoption of EHR and related policies across various countries -The United States, The United Kingdom, France including the initiatives by India and claims that the EHR system in India does not have adequate security and privacy. Singapore has one of the most successful health care systems in the world-National Electronic Healthcare Record (NEHR) and has been rated as most efficient in the world by Bloomberg in 2014 [7].

A mobile based application - MOTHER (MObile based maTernal HEalth awaReness is a good initiative developed by Centre for Development of Advanced Computing (C-DAC), India [8]. It is a scheduler for sending customized alerts on maternal and child health related information straightway to the mobile phones of the pregnant and lactating women as voice calls in regional languages. The government of India has taken an initiative to define India’s Healthcare future by developing an integrated Health Information system – National eHealth Authority (NeHA) proposed by Ministry of Health and Family Welfare. It will also be responsible for enforcing the laws and regulations relating to the privacy and security of the patient’s health information and records. Vision of the program is

  • To facilitate the integration of multiple health IT systems through health information exchanges.

  • To ensure that security, confidentiality, and privacy of patient data.

  • To prepare documents relating to architecture, standards, policies and guidelines for e-Health stores, National Health Information Network (NHIN) and HIE [9].

Population from the rural areas will be more benefited by this initiative as it will promote telemedicine and m-health services. But concurrently data security issues persist and there is a need for secure but less complex techniques considering the fact most of the population rely on mobile based systems [10].

Internet usage statistical reports claim India as the second largest online market with 460 million internet users [11] which is a clear demonstration of growing internet usage. Internet penetration rate of India as per 2016 is 34.8% [12]. World Bank measured Indian rural population as 67.25% as per 2015 report [13], which explicitly indicates most of the people lives in rural areas. Digital India campaign was initiated for setting up broadband services in rural India. Considering Internet connectivity and mobile usage in rural area m-health services will be more usable.

Defining a digital health care system which is secure but with less complexity will be efficient and effective considering the usability of the public. Usability and Security always conflicts but in EHR a balance between both are important. Password-based authentication is still prominent and dominant because of easy to use, considering these facts the proposed system is a password-based authentication using DNA cryptography which is easy to use for both patients and doctors. Instead of using complex algorithms, simple but secure algorithms will be more reliable especially if the EHR is accessed using mobile and here comes the importance of DNA encryption techniques, which provides security based on biocomputations. Next section gives a review on DNA cryptography, basics of DNA, structure, DNA computing and the digital representation of DNA.

3 DNA Cryptography

Data breach and security issues are major drawbacks resisting the adoption of electronic data on health care as most of the organizations are concerned about the security of patient’s electronic data. Encryption and Authentication techniques can play a major role in securing EHR but usability and data availability must be considered. DNA based encryption techniques are the recent branch in Cryptography and it’s getting wide acceptance due to the vast parallelism and computational complexity. Computational properties of DNA were first introduced in 1994 by Dr. Leonard M. Adleman of the University of South California to solve the complex computational problem of Mathematics [14].

3.1 DNA

DNA is the genetic blueprint of all living cells. In 1869 DNA was first identified by Swiss physician Friedrich Miescher. DNA is a double-stranded helix of nucleotides. A DNA sequence consists of four nucleic acid bases A (adenine), C (cytosine), G (guanine), T (thymine), where A and T, G and C are complementary [15]. Figure 1 represents nitrogenous bases of DNA [16]. Figure 2 depicts the pictorial representation of the helical structure of DNA [17].

Fig. 1.
figure 1

Nitrogenous bases of DNA

Fig. 2.
figure 2

Helical structure of DNA

3.2 DNA Computing

DNA Computing allows to code A, G, C, T in binary form and this digital representation of the DNA sequences formed the basis of DNA based encryption. Table 1 represents the binary coding of DNA. DNA bases A, G, C and T can be represented as 4! = 24, which adds computational complexity to the sequences if used with biomolecular concepts.

Table 1. Binary representation of DNA bases

DNA based cryptographic techniques can be used for securing information as it ensures security by means of biocomputations. DNA based encryption methods are widely classified as [18] Symmetric DNA cryptography, Asymmetric DNA cryptography, Pseudo DNA cryptography and DNA Steganography.

Conventional cryptographic techniques used in hybridization with DNA encryption enhances security. DNA based authentication has more applications, especially in EHR. In [18] authors proposed Image and DNA based authentication which ensures usability and security. DNA authentication can be performed using a wet lab or by using digital sequences which are available in the databases in billions. DNA Steganography can be used for transferring confidential medical data especially using Image based Steganography which plays a vital role if medical images are used.

4 Proposed Methodology

The proposed model is to develop an EHR which is a pregnancy registry and tracking system for pregnant women by linking Aadhaar. The purpose of using Aadhaar card is to provide authorized access to patient’s data for doctors. The system will have patient’s portal where the patient can log in through two-step verification. It also has doctor’s portal where registered doctor can login into the database using hospital ID and his own user ID and view patient’s health records by using patients Aadhaar. Aadhaar has a QR code which has details of patient embedded in it and can be read by a simple barcode reader or by entering Aadhaar number.

The system aims to protect data as each patient would like to maintain their information privacy. The mother can sign up once pregnancy and estimated due date is confirmed. Based on registered user’s EHR and demographic dividend options such as message alerts, voice alerts or flash the system can be used to connect with mothers and share the information related to infant and pregnancy care. The alerts are evoked based on individual’s health data and pregnancy stage, emergency numbers can also be shared with expecting moms. Users can rate or raise complaints through the system after each medical consultation. The information registered will be secured in the centralized database using DNA-based authentication techniques. The centralized database system impacts on reducing IMR and MMR and the mortality due to medical negligence as every act and events are updated in the database and these records also help patients to sue for the medical malpractice.

Figure 3 is the architecture proposed for Health Care System in India by including the fields which are essential for the functioning of the centralised database system. It includes National health information network (NHIN), National Accreditation Board for Hospitals & Healthcare Providers (NABH), National health information network (NHIN) and Public health foundation of India. The system can be used for maternal health care and this can be extended for general healthcare in India (Table 2).

Fig. 3.
figure 3

Proposed architecture for health care system in India

Table 2. Notations used in the algorithm

For registration process the patients can take support from Primary health care (PHC) agent or officer and once the registration process is completed the user can view her health record using Aadhaar and OTP received or the details can be shared with the PHC agent to view the health records. If the user wants to view or edit the records the proposed authentication methodology can be used to login and edit the details. Doctors can log in to the EHR portal using his ID and hospital ID and view the patient details using patient Aadhaar number, these will help in case of emergency to access the EHR. The proposed authentication model has three phases – Registration phase, Authentication Phase and password change phase.

4.1 Registration Phase

  • R1: In the interface or EHR portal two options will be available for Registration.

    • a. Register as a Patient Login. b. Register as a Doctor’s Login

    • User, Mother can register as a patient by entering essential credentials including AIDU.

  • R2: AS allows the user to select a valid IDU and pwdU.

  • R3: AS allows the user to select a security question and user can set an answer of her choice.

  • R4: AS picks a DNA sequence (UDS) depending on user credentials and AIDU. This act as a key factor in DNA Cryptography during user authentication phase.

  • R5: Registration Phase completed Successfully. An EHR is created for the user, U. Figure 4 depicts the registration process.

    Fig. 4.
    figure 4

    Registration phase

4.2 Authentication Phase/Login Phase

The proposed authentication phase is a simple, secure and usable technique. This method is a two-step verification phase, but only password based verification is included to ensure usability.

  1. A1:

    Interface has two options.

    • a. Patient Login b. Doctor’s Login, User enters \( {\text{ID}} \to {\text{ID}}_{\text{U}} \).

  2. A2:

    U enters \( {\text{password}} \to {\text{pwd}}_{\text{U1}} \).

  3. A3:

    AS displays the security question.

  4. A4:

    U enters pwdU2.

  5. A5:

    AS picks the unique DNA sequence (UDS) and computes a key value based on IDU, pwdU1, pwdU2 and UDS.

  6. A6:

    Key computation is based on DNA coding and DNA encryption and generates a hash. During authentication AS computes the key value and if it matches the key value computed during registration the server authenticates the user to the corresponding EHR system.

    $$ {\text{Computation}}\,{\text{of}}\,{\text{key}}\,{\text{value}}\, = \,{\text{pwd}}_{{{\text{U}}1 \to }} \,{\text{binary}} $$
    (1)
    $$ = {\text{pwd}}_{{{\text{U2}} \to }} \;{\text{binary}} $$
    (2)
    $$ = \,\left( {{\text{pwd}}_{{{\text{U}}1}} } \right)\, \oplus \,\left( {{\text{pwd}}_{\text{U2}} } \right) $$
    (3)
    $$ {\text{Conversion}}\,{\text{of}}\,{\text{Eq}} .\,\left( 3 \right)\,{\text{to}}\,{\text{DNA}}\,{\text{code}}\,{\text{based}}\,{\text{on}}\,{\text{Table}}\,1 $$
    (4)
    $$ {\text{DNA encryption by Eq. (4) and UDS}} $$
    (5)

    Hash of cipher text generated from Eq. (5) is the key value.

  7. A7:

    AS checks the key value computed for the user, U during the registration phase, if the key value matches, authentication to the system is granted else denied.

Figure 5 represents authentication phase.

Fig. 5.
figure 5

Authentication phase

4.3 Password Change Phase

In this phase user, can change the passwords and set the new passwords.

  • P1: User can enter the details on the interface.

  • P2: After Authentication phase user, can change the password, security question or both can be changed. The users who prefer additional security can also opt for one-time password (OTP) instead of the security question or as an additive layer depending on the usability of the end-user.

5 Security Analysis

The proposed system is simple and usable and can be used by common people without any technical background, considering this fact there is no two-factor verification involved but a two-step password based verification is included for usability. But information security of the system must be maintained for this DNA encryption and hash computations are performed at the server side which ensures security. This section gives security analysis of the proposed system.

5.1 Attack on Password File

The proposed scheme resists password file compromise attack as the password file saved in the database is a computed key value based on hash algorithm as a final output using inputs as:

  • Binary \( (({\text{pwd}}_{\text{U1}} ) \oplus ({\text{pwd}}_{\text{U2}} )) \) → Eq. (1)

  • DNA Sequence Conversion (Eq. (1)) → Eq. (2)

  • DNA encryption (Eq. (2) and UDS) → Eq. (3)

Hash Eq. (3) → Eq. (4) → output. If the password file is compromised it will be difficult to extract the passwords and enter the system.

5.2 Attack on DNA Sequence

DNA encryption is based on DNA coding, which can be represented as 4! = 24, DNA coding in Table 1 represents one of the digital representation of DNA. The sequence selected by the server will be difficult to guess considering the availability of millions of DNA sequences in the digital databases and the selection criteria used for DNA reference sequence. It is also possible to generate random sequences, say n which resists the possibility of reference sequence attack.

5.3 Attack on Unique ID

Availability of the Aadhaar or a unique ID of a user to an unauthorized person will not provide access to the EHR. To view the EHR details the knowledge of both passwords are vital. During the registration process users also registers their mobile number for receiving message alerts, voice alerts and to the same number the user receives alert message or notification whenever her EHR is accessed and alerts the valid user about unauthorized attempt to access the data and user can take appropriate action to prevent data access. An option to add OTP ensures additive security and in that scenario, the unauthorized person must have access to all three values.

6 Merits of Aadhaar Usage

Use of Aadhaar in the protocol has potential benefits especially during emergency cases where including the availability of health records and time plays a critical role. If the doctor has the knowledge of patient’s Aadhaar he can retrieve the users EHR using his login and hospital login credentials which help in providing effective and timely treatment. Aadhaar will also help in HIE as the unique ID is valid and unique across India. Implementation time of the proposed system can be reduced by using Aadhaar card rather than introducing a new health card system or a smart card for 1.324 billion people, India’s huge population.

7 Proof of Concept

This section demonstrates the working of proposed protocol. This section only describes and discusses on the key computation of authentication server for the user U.

  1. Step 1:

    The user after selecting her valid Id selects the pwdU1 as “myehr”.

  2. Step 2:

    AS displays list of security questions, sample question “who is your best friend?” The user enters (pwdU2) as “bob”.

  3. Step 3:

    AS selects a random DNA sequence based on user credentials. DNA sequence selection can be done based on digital sequence, random sequence or from user data. In this study, a sample random sequence of size 300 base pairs (bp) [19] has been generated. Random DNA Sequence generated is:

    figure a
  4. Step 4:

    Key value computation mainly includes 3 stages

    1. (a)

      Converting passwords to binary and performing XOR the value generated

      1101101011110010110010101101000000100000110001001101000 → (1), converting (1) into DNA coding based on Table 1.

    2. (b)

      The value generated is:

      TGCCTTACTACCTGAAACAATAGATGAA → (2). A parity bit is added to correct the conversion.

    3. (c)

      DNA Encryption: The encrypted password which is in DNA form is camouflaged into Random DNA sequence to generate:

      figure b
    4. (d)

      Computing Hash: Hash of the encrypted sequence is computed using SHA-2.

      843a81d0051ede0a3a4b1affc7e1a9f3589d91db29048a7059e74f0a57f11022 → (4)

8 Conclusion and Future Work

In this paper, a methodology has been proposed to reduce the IMR and MMR rate in India which also reduces the medical malpractice related to childbirth and pregnancy as EHR helps to track every records and event. The healthcare system can be integrated for general health care to ensure better treatment. The proposed health care architecture can be integrated for general healthcare system by combining with regulatory agencies for better performance. The work also focuses on the usable authentication of the system by a novel DNA based authentication which uses DNA encryption and unique ID- Aadhaar considering patients usability and data security.

Future work is to propose a single sign-on mechanism for securing electronic health records using Aadhaar by integrating maternity and infant care, health insurance policies, national immunization registry, HIE etc. into a single platform and connect to a centralized database. DNA based authentication techniques can be used with conventional techniques for a secure environment.