Diploma Project Last
Diploma Project Last
Diploma Project Last
KAZAKHSTAN
Altynbek Adil
Islambek Daulet
Bakytbekov Nursultan
DIPLOMA PROJECT
Almaty 2023
MINISTRY OF SCIENCE AND HIGHER EDUCATION OF THE REPUBLIC OF
KAZAKHSTAN
DEPARTMENT OF CYBERSECURITY
Approved
Head of Department,
cand. of tech. sc., assoc. professor
S.T. Amanzholova
«_____» ______________ 2023
DIPLOMA PROJECT
Islambek D. _______
«___» ______2023 (signature)
Bakytbekov N. _______
«___» ______2023 (signature)
Almaty 2023
2
International Information Technology University
Faculty of Computer Technology and Cybersecurity
Department of Cybersecurity
Educational program 6B06303 – Network Security
Students
Altynbek A., Islambek D., Bakytbekov N.
Diploma project topic
Data Management System for Multi-User Medical Platforms Using Blockchain
3
Consultations on diploma project (with related project chapters named)
___________ Islambek D.
(signature)
___________ Bakytbekov N.
(signature)
4
Diploma project writing schedule
5
АҢДАТПА
6
АННОТАЦИЯ
7
ANNOTATION
8
CONTENTS
INTRODUCTION 11
1 DESCRIPTION AND ANALYSIS OF THE PROJECT 12
1.1 Introduction to Cybersecurity in Healthcare 12
1.2 Classification of Information Security 15
1.3 Comparison of Existing Solutions 18
1.4 Project Description 22
1.5 Exploration of Potential Future Developments for the Product 24
2 MODELING THE PROCESS OF IMPROVING DATA 26
MANAGEMENT SYSTEM IN MEDICAL ORGANIZATIONS
2.1 Project Scope 26
2.2 Rules and Responsibilities 27
2.3 Project Risks 28
2.4 Success Managements 29
2.5 Project Oriented Organizational Structure 31
2.6 Roles and Responsibilities of Each Person in the Team 32
2.7 Work Breakdown Structure 36
2.8 SWOT Analysis 39
2.9 Competitive Matrix 41
2.10 Maslow's Pyramid 43
3 TECHNICAL IMPLEMENTATION 45
3.1 Technical Overview 45
3.2 Rationale for the Choice of Software 47
3.3 Interface Features (Design, Storage) 49
3.3.1 Sign Up Page 49
3.3.2 Home Page 50
3.3.3 Patient Page 52
3.4 Database Interaction Structure 53
3.4.1 ER Physical Model 53
3.4.2 Logical Design of the DB 54
3.5 Blockchain Structure 57
3.5.1 PatientBlock Class 58
3.5.2 Block Class 58
3.5.3 Blockchain Class 59
3.5.4 Cryptography 59
4 ECONOMIC EFFECTIVENESS OF THE PROJECT 61
4.1 Technical Description 61
4.2 Marketing Analysis 61
4.3 Marketing Action Plan 61
4.4 Calculation of the Economic Efficiency of Software Product 62
Development
4.5 The Price of Progress: The Significance of Equipment Costs in 62
Application Development
9
4.6 Expenses on Payroll (wage fund) 63
4.7 Overhead Costs 64
4.8 Calculation of Efficiency in the Implementation of Software in the 65
Enterprise (for the user)
CONCLUSION 67
REFERENCES 68
10
INTRODUCTION
The topic of the diploma project: A data management system for multi-user
medical platforms using blockchain.
Relevance: Blockchain solutions offer effective approaches to reliable data
management, especially in the field of medicine when storing and processing
confidential patient data.
Scientific novelty: Existing approaches using blockchain in medical
organizations are rare. This product will comply with modern application security
standards, and will also be able to flexibly customize the functionality for the task
and platform set by the company.
The object of research is flexible and complex applications related to
blockchain technology, information storage and secure access to them.
The practical value of the diploma project is the general register of patient data
and the platform for accessing this data will be very versatile and easily scalable due
to blockchain technology.
The main goal of the project is to develop a platform for storing and processing
patient data, ensuring their reliability and safety, and also to show the practical
application of this platform.
To achieve this goal , it is necessary to solve several tasks:
Analyze in detail all the requirements for the necessary information and any
aspects that will affect them, as well as the structure of mobile devices in the
corporate environment;
Find and add features that will be unique to our solution compared to other
solutions that are already on the market;
Determine the necessary technologies, tools, and platforms for creating an
data management system;
Develop a layout of a mobile application system;
Implement robust security measures to protect patient data from
unauthorized access, breaches, and data leaks;
Test the developed system.
Research methods: observation, comparison of existing solutions, study and
analysis of the standard, decomposition, testing.
The structure of the study includes an introduction, theoretical and analytical
part, practical part, justification of economic efficiency, conclusion.
11
1 DESCRIPTION AND ANALYSIS OF THE PROJECT
12
Malware and targeted persistent threats are expected to be the main drivers of
cybercrime growth. As Kazakhstan accelerates the pace of digitalization,the
government as well as key industrial organizations may become targets for cyber
espionage campaigns. See Figure 1.1.1 Information Security Incident Statistics.
We can also notice a special interest of the state in the training of new
personnel in the current year, see Figure 1.1.2
The security of the personal data of Kazakhstanis is one of the priority issues
for the Republic of Kazakhstan. Thus, the Ministry of Digital Development,
Innovation, and Aerospace Industry of the Republic of Kazakhstan announced the
acceptance of proposals for a bill to strengthen the protection of personal data.
There were 176 incidents in which the lack of access to Internet resources was
recorded, which is 69.2% more than a year earlier. The number of cyberattacks
related to the theft of personal data of Kazakhstanis, that is, cases of phishing,
remained unchanged: 43 incidents. The number of malware incidents rose from 37 to
38 over the year.
At the same time, according to the interactive map of cyber threats of JSC
Kaspersky Lab, over the last month in Kazakhstan, the number of infections detected
during automatic scanning (On-Access Scan) averaged slightly more than 222
thousand per week. In January 2022, 2,700 cyberattacks were caused by botnets,
13
which infect computers with malware for further use by cybercriminals without the
knowledge of their owners. The number of incidents with botnets increased by 3.2
times over the year. Consequently, the market needs high-quality information
security, in turn, we offer this option.
3%
6%
50%
6%
19%
14
Figure 1.1.4 - Average Cost of Data Breaches Worldwide in Million USD
Healthcare breach costs have been the most expensive for the last 12 years,
increasing by 41.6% since 2020. Healthcare breach costs hit a new record high with
the average breach costs increasing by nearly USD 1 million to reach USD 10.10
million. Financial organizations had the second highest costs with an average of USD
5.97 million followed by pharmaceuticals at USD 5.01 million, technology at USD
4.97 million, and energy at USD 4.72 million. See figure 1.1.4.
15
Figure 1.2.1 – Classifications of Information Security
16
transaction, can be verified and attributed to the responsible party. Digital signatures
and audit trails are examples of non-repudiation measures.
Physical security: Protects the physical assets, facilities, and equipment that
house information systems and data. It includes measures like access controls, video
surveillance, locks, alarms, and secure storage.
Network security: Focuses on securing the network infrastructure and
communication channels. It involves measures such as firewalls, intrusion
detection/prevention systems (IDS/IPS), virtual private networks (VPNs), and
network segmentation to protect against unauthorized access and malicious activities.
Application security: Addresses security vulnerabilities and threats specific to
software applications. It involves secure coding practices, input validation, user
authentication, access controls, and regular software updates to mitigate risks.
Incident response: Establishes processes and procedures to respond effectively
to security incidents and breaches. It includes incident detection, analysis,
containment, eradication, and recovery. Incident response plans outline the steps to
be taken during a security incident.
These are some general classifications of information security, and various
frameworks, such as the CIA triad (Confidentiality, Integrity, Availability), are often
used to guide the implementation of security controls. It's important to note that the
specific classifications and terminology used may vary depending on the context and
industry.
For the security of user data, we used blockchain technology. Blockchain
technology is a decentralized and distributed digital ledger that securely records and
verifies transactions across multiple computers or nodes. It was first introduced as the
underlying technology for cryptocurrencies like Bitcoin, but its applications have
expanded far beyond digital currencies.
Blockchain is one of the types of a broader class of data storage and
synchronization technologies in which all records are collected in blocks and linked
together by cryptography. In addition to the records themselves and the block
identifier, the hash sums of the current and previous blocks are included in the block.
Hash functions in the blockchain, combined with its distributed architecture, ensure
the immutability and irreversibility of the entire block chain.
Traditional mechanisms for the exchange of medical information are outdated,
they do not cope with their tasks in the modern healthcare infrastructure. In most
cases, the patient must independently bring all his past medical records to a new
hospital or take medical tests again.
In addition to the obvious inconvenience, the absence of a patient's medical
history can lead to improper treatment. Another problem is the lack of comprehensive
information about the patient and his medical history.
Blockchain is at the center of many modern developments in the field of
healthcare. This technology offers new approaches to data storage and management
models in healthcare. This is due to the ability of the blockchain to protect
information, as well as to organize the rapid exchange of medical data and services.
17
Blockchain technologies are capable of revolutionizing medical research.
Technology can speed up research, open access to data, and strengthen control over
the results. It is very important to understand that confidentiality and quick access to
data are a key factor in the construction of technological solutions in any area of our
lives.
Blockchain makes it easier for patients to grant permission to use their data for
clinical research.
In addition to information about the patient's consent, the blockchain allows
you to store various types of data from different sources: about patient care, about
clinical trials conducted, about biomarkers, about the supply chain of pharmaceutical
products, and others. The analysis of these disparate data makes it possible to
increase the effectiveness of clinical and biomedical research.
Blockchain is able to eliminate data falsification and the exclusion of
undesirable results of clinical trials. The immutability property of the blockchain
confirms the integrity of the data collected for clinical trials.
Advantages of Blockchain for Medical Research:
Improved data exchange. Thanks to the peer-to-peer architecture of the
blockchain, each research institution can maintain full control over its computing
resources and collaborate with other institutions for data exchange and joint analysis;
Timestamps. The data generated by the patient has timestamps. This makes
medical research more effective;
Verifiable data. Blockchain solves the issue of data origin. This allows you
to increase the accuracy of medical research;
High level of data availability. Blockchain can ensure the constant
availability of real-time data. Researchers will be able to quickly detect changes in
environmental conditions that affect the health of the population. For example, this
will allow earlier detection and containment of epidemics;
Guarantee of confidentiality. The guarantee of security and privacy can
attract millions of people, healthcare providers and researchers to share large amounts
of data about diet, lifestyle, genetics, health and the environment.
The use of blockchain in medicine is not limited to the processes and methods
that exist today. The rapid development of artificial intelligence technologies and the
Internet of Things will soon require a data storage infrastructure that meets the
increased requirements of security and information control. Blockchain can become
part of such an infrastructure, supporting new approaches to the analysis of medical
data.
18
concepts and main use cases, but concrete implementations and embodiments are
relatively rare. This mini-review examines current research on specific blockchain
implementations in healthcare.
In countries of the CIS, there are not many solutions in this sector, so the table
below (Table 1.2.2) lists the solutions that are currently available.
19
for some healthcare
providers to adopt the
platform.
Overview of Products:
20
o Database Manager - API written in GoLang that provides access to an
underlying database. R/W access is governed by permissions stored on the
blockchain;
o Ethereum Client - A pointer to the go-ethereum codebase;
o SmartContracts - The Solidity contracts and their tests that are used by other
MedRec components;
o UserClient - A front-facing node app that can be used by any party to
interact with the MedRec system;
o This project is being developed under the GPLv2 LICENSE.
Figures 1.2.4 and 1.2.5 for explore the interface and architecture of the
MedRec program.
21
Figure 1.2.6 – Interface of Healthereum
22
the blockchain , replacing the existing concept, is not cheap. In the architecture we
propose, we introduce an integration system in the degree of a layer, called
blockchain handshaker, among the existing cloud EHR management concept and the
available blockchain network in order to study the concept of managing medical
records protected from unauthorized admission.
The healthcare blockchain is considered as a divided registry for the purpose of
preserving medical records, for the purpose of general use, exchange or other
purposes among the involved facets. In the concepts of electric healthcare,
information has every chance be earned from different keys, similar as well as
hospitals, clinics and pathology. In the blockchain-based EHR management concept,
all information belonging to patients, without exception, is stored in a calculated
registry offered by the blockchain network. The course of saving a set of combined
information is as famous as the transaction. Any transaction is regarded together with
the support of the category of accomplices, popular as well as miners, before saving
in calculated registry. Blockchain networks are ready to reject unauthorized
transactions, which are trying to change the information in the calculated registry. As
a result, no unauthorized entity is in any way able to change information in the
blockchain network. The basic theory of the blockchain and smart contract, expand
the abilities that do not inspire confidence in any way among the various accomplices
of the EHR management concept. A smart contract contains a computer program that
includes a set of contracts and basics. Without exception, all members are obliged to
be guided by a set of contracts and fundamentals. Thus, in order to store information
in the blockchain, an authorized third party is not necessary in any way.
We focus on 2 tasks related together with the introduction of blockchain into
the EHR cloud system. Firstly, the introduction of blockchain is obliged to eliminate
control over the information storage from the edge of the main body to the
government. In other words, the information must be extremely decentralized. As a
result, falsification of information in the blockchain network becomes difficult. For
this reason, it is important to choose the optimal blockchain network for the purpose
of EHR management concepts. Secondly, the blockchain methodology has a different
platform, starting from classical concepts. In a similar way, creating a blockchain-
based concept requires development from scratch.
The work assumes a blockchain-based concept of exchanging medical
information, which, at the necessary level, solves the problems of access control,
coupled together with secret information stored in the cloud. The concept is based on
a valid blockchain, which gives access only to convened and, thus, verified users. In
addition, in order to guarantee the acquisition of information, verification and
preparation of protected information according to medical information, the creators
use smart contracts and access control system in their own other work. Someone
effectively monitors the actions of information and revokes access to infringing
objects when a pathology of permissions is detected in the access to information.
Smart-contracts in order to preserve metadata about the owner of the journal,
permissions and unity of information. The functions of the transfer of the contract
capital are carried out by political figures who guarantee the forcible change of
23
information only in the relationship of legitimate transactions. Marketing
announcements of meters and mobile devices are added to the healthcare blockchain
in order to create an omnipresent public bond (PSN) in exchange for storing medical
records in blocks. The PSN section is able to walk other sections of the bond and
acquire access to information about staying well-being through addresses stored in
the blockchain. This activity has this advantage, that is, the reduction of costs in
storing information in devices, the presence of which did not take into account the
security of addresses. In our system, smart contract is a set of instructions that
validates data of one or more attributes value based on predefined conditions related
to patient health condition. There can be single or multiple smart contracts in our
system. A smart contact is created by a system administrator who decides which
attributes of a patient health records need to be verified.
We proposed a novel approach of tamper proof electronic medical record
management using public blockchain technology. The existing approaches try to
provide solutions based on blockchains from scratch, which can be infeasible and
expensive as such procedures need changes to the existing systems. We avoid such
complexities by introducing independence between business logic and blockchain
technologies.
For the future, there are some ideas for a wider size of users and for
competition with other products in the IT field. For example, integration with
emerging technologies, so blockchain can be integrated with other emerging
technologies to enhance healthcare systems. For example, combining blockchain with
artificial intelligence (AI) can enable advanced analytics and decision-making
capabilities based on large-scale healthcare data. Integration with Internet of Things
(IoT) devices can provide real-time data feeds for monitoring patients, managing
inventory, and ensuring supply chain integrity.
Also we will develop patient-centric data management, future blockchain-
based systems may empower patients to have greater control over their medical data.
Patients can manage consent mechanisms, selectively share their data with healthcare
providers, and receive rewards or incentives for participating in data sharing
initiatives. This approach shifts the ownership and control of health data from
centralized authorities to individual patients, fostering patient empowerment and data
privacy.
Health Data Exchange and Interoperability: Blockchain can facilitate secure
and efficient health data exchange between different healthcare providers, healthcare
systems, and even across borders. Blockchain-based solutions can enable
standardized data formats, secure data sharing mechanisms, and enforce data privacy
regulations. This can lead to improved care coordination, reduced duplication of tests,
and better patient outcomes.
24
Decentralized Clinical Data Repositories: Blockchain can support the creation
of decentralized clinical data repositories where medical data is stored securely, while
patients control access and permissions. This decentralized approach reduces the
reliance on centralized authorities and enables more efficient and secure sharing of
medical information among healthcare providers. It can also facilitate research
collaborations while maintaining data privacy.
Smart Contracts for Healthcare Payments: Blockchain-based smart contracts
can streamline and automate healthcare payment processes. They can enable
automatic execution of payment agreements between healthcare providers, insurers,
and patients, reducing administrative overheads and ensuring timely payments. Smart
contracts can also enforce pre-defined conditions, such as insurance coverage and
claim settlements, reducing fraud and errors in billing and reimbursements.
Enhanced Data Privacy and Security: Future developments in blockchain
technology may focus on advanced encryption techniques, zero-knowledge proofs,
and privacy-preserving algorithms. These innovations can further enhance the
privacy and security of healthcare data stored on the blockchain. Privacy-focused
blockchains and privacy-oriented consensus mechanisms can be explored to address
specific healthcare use cases.
25
2 MODELING THE PROCESS OF IMPROVING DATA MANAGEMENT
SYSTEM IN MEDICAL ORGANIZATIONS
26
Selecting and filtering information
Notifications
Specifications:
Subscriber add-on for Android
Server-side addition in Java along with the use of frameworks
PostgreSQL Knowledge Base with JDBC
Application of blockchain platform
Creating an API for the purpose of exchanging information
Providing concept and information security
Verification of the functionality and properties of the concept.
27
Activities along with the basic information:
Create queries and improve performance.
Management of additional copies and updates.
Monitoring and improving the performance of the information framework.
Thus, already after the absolute execution of all problems and distribution, the
team of creators began to form an indicative information management with multiple
presentation of honey. platforms along with manifestation. Any member has direct
duties efforts to holistically address a wide range of management issues that
adversely preserve and interchange medical considerations among doctors and
patients in conjunction with the application of technology. These signs are
discovered, users gain access to a particular medical disease, and doctors have every
chance to manage and update information with a noticeable spread of medical
support.
28
transmission of information, optimization of the basis of
which can affect the reliability of information. It is also
diagnoses and cures. possible to use information
caching and information
compression hardware to
reduce the amount of
information that needs to
be broadcast.
29
Security of information Blockchain guarantees a high degree of
security, since all transactions and
information without exception are
stored in a chain of constructions and
are confirmed by a network of partners.
This can help protect medical clearance
from unauthorized access and
interference.
Improving the interaction among the Blockchain is able to facilitate the most
partners of the concept effective interaction among the
different partners of the medical
platform, such as patients, doctors,
insurance companies and
pharmaceutical companies. This is
capable of facilitating data exchange
movements, improving coordination
and increasing the quality of service
due to sick people.
30
Above all, providing data security is considered a significant sign of success.
Blockchain technology provides a high degree of security, which can help secure
medical information from unauthorized access and interference.
In addition, it is important to focus interest in the clarity of the data.
Blockchain guarantees clarity, allowing you to trace and control all transactions and
changes in data without exception. This is especially appropriate for the purpose of
medical platforms, where it is important to have specific and solid information
regarding patients, diseases, medications and monitoring.
Improved data management is also considered a significant sign of success.
Blockchain makes it possible to manage data more successfully and more clearly.
The use of "smart contracts" automates the movement and guarantees the safety and
security of data.
And, ultimately, improving the interaction among the different partners of the
medical platform is considered a significant aspect of success. Blockchain facilitates
the most efficient interaction among patients, doctors, insurance companies and
pharmaceutical companies. This can help to simplify the exchange of information,
improve coordination and increase the quality of patient service.
In full, effective implementation of the concept of information management for
the purpose of multi-user medical platforms, together with the use of blockchain, can
cause increased security, data clarity, management performance and improved
interaction among platform partners. This contributes to the improvement of the
quality of providing medical support and is able to give significant advantages for the
purpose of absolutely all partners in the medical field.
31
Daulet
Adil
(Front-end)
(Back-End) Project Manager
( Adil)
Nursultan
(Database)
32
Counting conditions and specifications backend concept presence to
research frontend functionality.
Providing consistency and strength of information transfer between the
subscriber and server elements of the add-on.
3. UI performance and empathy improvements:
Improving the loading and display of information in the user interface in
order to provide a fast and responsive add-on operation.
Using efficient algorithms and methods for caching information in order to
improve the performance of the presence of labor along with a huge amount of
information.
Checking and improving the interface for different devices and screen
resolutions.
4. Checking and setting:
Writing and implementing test scenarios to control functionality and user
experience.
Adjustment and change of errors in front-end code and user interface.
Communication with testers and other accomplices of the instruction in
order to provide the properties of the developed product.
5. Collaboration and communication:
Assistance in meetings, discussions and exchange of skills together with
other developers and accomplices of the instruction.
Adjustment of conditions and approval of conclusions together with
designers, backend developers and other involved facets of the plan.
6. Help and development:
Help and development of the existing front-end program code and interface,
including changes in errors and the introduction of improvements.
Galvanotropism in the opposite relationship of users and the introduction of
the required changes to the socket.
Providing comparability of front-end parts along with the latest versions of
operator concepts and devices.
7. Study and formation:
Study of the latest technologies, frameworks and devices, which have every
chance to improve the course of research and the results of front-end activities.
Use of modern methods and best practices in the field of user interface
research.
Assistance in high-class formation, visits to conferences, directions and
trainings in order to update skills and knowledge.
8. Performing stereotypes and actions:
Fulfillment of coding, architecture and design stereotypes
Performing Exploration Actions
Daulet:
1. Creating a backend architecture:
Planning and architecture of the backend system, including data base, API
33
Selection of optimal technologies, frameworks and devices for the purpose
of research and integration of backend parts.
2. Creating a database:
Formation and improvement of the texture of the basis of information in
order to preserve and manage medical information.
Creation of tables, views, persisted operations, and indexes to provide
successful access to information.
3. Create an API:
Formation and logging of API for the purpose of exchanging information
between the client and server parts of the system.
Providing security and authentication is the presence of rotation to the API.
4. Checking and setting:
Writing and implementing studies to control the functionality, performance
and security of the backend concept.
Adjustment and change of errors in the program code and data basis.
5. Performance improvements:
Research and improve the performance of the backend concept, including
information basis requirements, handling large information sizes, and overload
separation.
6. Collaboration and communication:
Communication with front-end developers, and other accomplices of
guidance in order to discuss conditions, agree on interfaces and exchange data.
7. Help and development:
Assistance and development of the backend concept, including changes in
errors, addition of the latest list of features and improvements.
Overseeing and managing server infrastructure, including scaling and
resource optimization.
8. Security and protection of information:
Implementation of elements of security and protection of information,
including coding, access control and authentication equipment.
Compliance with standards and regulations in the field of protection of
medical information, such as HIPAA.
9. Documents and logging:
Formation of industrial documentation, including representation of the
architecture, API and research activities.
Logging program code, including note, function representation and
application.
Implementation of standards and actions:
Fulfillment of research, architecture and coding stereotypes
Perform research activities, including the concept of version control,
problem management, and review.
10. Study and self-study:
34
The study of the latest technologies, instruments and research methodologies
with the aim of continuous formation of skills and knowledge.
Exchange of skills and knowledge together with employees, assistance in
educational events and conferences.
Nursultan:
1. Database structure planning:
Examination of conditions and establishing the texture of the database,
including tables, relationships, properties, and indexes.
Selection of suitable data types in order to save medical information.
2. Creating a data base:
Formation of tables, views, indexes and stored operations based on
information.
Improving the performance of queries and indexes to provide successful
access to information.
3. Predicting Details:
Plan networks and their attributes based on the information defined by
medical information and platform conditions.
Establishing relationships among tables and the formation of data integrity
laws.
4. Import and export information:
Creation of data import and export elements, including communication with
external systems and information formats.
5. Information security:
Creation of data protection elements, including coding, access control and
authentication equipment.
Implementation of stereotypes and regulations in the field of protection of
medical information
6. Surveillance and service:
Observation and management of the basis of information, including
additional copying, restoration and scale selection.
7. Collaboration and communication:
Communication with the developers of the backend, frontend in order to
discuss conditions, agree on interfaces and exchange data.
8. Documents and logging:
Formation of industrial documentation that outlines the texture of the basis
of information, schemas, indices and principles of unity
9. Basic Information Check:
Plan and implement research into the knowledge base to monitor
functionality, consistency, and performance.
10. Development and maintenance:
Creation and introduction of changes in the texture of the basis of
information in accordance with the conditions for the formation of the concept.
35
Preventing errors, improving queries, and aiding the performance of the
information framework.
11. Study and self-study:
Research the latest technologies, methods and layouts for the study of the
courtyard of information in order to increase skills and knowledge.
Facilitation in high-class societies, conferences and exchange of skills
together with employees.
12. Performing stereotypes and actions:
Fulfillment of the stereotypes of the study of the courtyard of the
information, architecture and coding defined by the company.
Performing research activities, including version management, problem
management, and throttling with other developers.
2. Collaboration with other developers:
Sharing skills, knowledge and best practices with collaborators to enhance
research quality.
WBS of the plan (also popular as well as Work Breakdown Structure or ISR,
hierarchical structure of work) - this distribution of the plan into certain results,
which must be won in order to complete the project more fully.
As well as the principle, the plan itself is indicated in the upper degree, then (in
the initial degree) - the main results.
Destined Manager Degree:
Drawing up a plan and coordinating the overall progress of the study of the
concept.
Formation of goals and questions of the plan.
Sharing resources and managing the plan's budget.
Enterprising communication and partnership among different rules.
Concept Architect Degree:
Creation of a unified system architecture.
Establishment of the key parts of the concept and their connection.
Plan for the background of the details and the texture of the details.
Establishment of key technologies and instruments in order to implement the
concept.
Backend developer:
Creating a server side of the concept in Java along with the use of
frameworks and libraries.
Providing security and data protection.
Checking and configuring server share concept.
Frontend creator:
Creating a mobile add-on user interface using Android Studio.
36
Implementation of the functionality of the interface, communication along
with the server component.
Improving the performance and reactivity of the user interface.
Checking and configuring the client part of the system.
Information Foundation Developer:
Planning and improving the texture of the data base along with the use of
PostgreSQL.
Creating a schema of details, tables, views, and stored operations.
Providing security of information and unity of the basis of information.
Improving the performance of queries and indexes.
Degree of self-testing:
Any creator is obliged to promptly take part in testing their own program
code.
Adjustment and change of the errors found during the study.
Checking the program code along with others Level discussions and skill
exchange:
Systematic meetings and discussions along with the installation of the
creators.
Interchange of skill and knowledge among developers.
Consideration of best practices and research methods.
Implementation of code review in order to increase the properties of the
program code.
Degree of functionality:
Creation and implementation of multifunctional conditions of the concept.
Providing absolute functionality of the concept, appropriate to the conditions
of the client.
Checking and configuring system functionality.
The degree of the opposite relationship:
Acquisition of the opposite relationship with the users and the client of the
system.
Research and calculation of the opposite relationship in order to improve the
concept.
Introduction of changes in the concept in the basis of the opposite
relationship.
Degree of documentation:
Recording conditions, architecture and functionality of the concept.
Formation of industrial documentation and manuals for the purpose of the
user.
Documentation assistance in a valid stay.
Degree of assistance:
Creation of elements of help and service concept.
Galvanotropism in the requirements and difficulties of users.
37
Providing the correct activity of the concept and its assistance in working
stay.
Degree of risk management:
Recognizing and investigating the likely risks associated with the
exploration and operation of the concept.
Creation and implementation of strategies according to risk management.
Observation and control of risks during the whole course of the study.
Degree of role in the plan:
Intensive assistance in absolutely all stages of the plan, including drafting
the plan, research, verification and introduction.
Providing constant information about the work done and the progress of the
plan.
Fulfillment of terms and properties of performance of works.
Degree of self-learning:
Continuous research into the latest technologies, instruments and research
methods.
Assistance in trainings, conferences and online courses in order to increase
qualifications.
Intensive self-education and study of modern layouts in the field of
researching the concepts of information management and blockchain.
Degree of communication:
Effective communication with other project partners.
Interchange of data and thoughts along with the research setting.
Information regarding the progress of activities and systematic development
regarding the status of the project.
Degree of problem management:
Making a plan and undertaking personal matters.
Guiding the timing and values of questions.
Solving incidents and questions arising in the process of research.
Property Degree:
Providing a significant feature of the study and operation of the concept.
Using of best practices and research stereotypes.
Checking and adjusting the program code in order to provide inaccessibility
of errors and malfunctions.
Degree of integration:
Communication with other developers and experts in order to provide
comparability and integration of different parts of the concept.
Checking and controlling the activity of built-in modules and parts.
User teaching degree:
Organization and implementation of teaching users concept.
Formation of guidelines and guidelines according to the application of the
concept.
38
Helping users and solutions to their problems.
Maintenance Degree:
Helping and servicing a concept after its introduction.
Systematic development and patching of the concept in order to provide
security and correct possible errors.
Research and improvement performance concept.
SWOT analysis (study of major and minor margins, capabilities and hazards) is
considered a strategic planning tool that can help evaluate a company or project's
current deal, uncover its internal and external conditions, and establish strategic
impacts. According to the medical platform, along with the application of blockchain,
SWOT analysis can be necessary in order to establish its competitiveness and
superiority.
Strengths
Data security: Blockchain guarantees a significant level of security and
immutability of medical information, preventing its falsification or prohibited access.
Transparency and credibility: Blockchain creates transparency in the medical
platform by allowing any contributor to the concept to control and prove the mix.
This helps to increase the trust of patients and other involved regions.
Improved access and interchange of data: Due to the dispersed nature of the
blockchain, patients, doctors, insurance firms, and other members of healthcare have
39
every chance of sharing medical data in the absence of arbitrators, which perfects the
accessibility and effectiveness of the service.
Improved service coordination: blockchain can help improve coordination
among different healthcare providers, such as doctors, laboratories and pharmacies.
This is able to reduce the waiting period, eliminate duplication of operations and
improve the uniform continuity of treatment.
Increasing business opportunities: Blockchain can help increase the business
opportunities of the medical platform by attracting the latest partners and traders,
improving competitiveness, and shaping the latest healthcare financing mods.
Weaknesses
Difficulty of introduction and integration: The introduction of blockchain into a
medical platform can be difficult and require significant efforts to integrate existing
concepts and activities. This is capable of requiring time and resources.
Industrial limits: Blockchain methodology is without exception still in its
infancy, and industrial limits are likely, such as narrow scalability, high data retention
costs, and high consumption.
High research and service costs: The introduction and maintenance of a
blockchain platform can be costly. This includes research, software development,
staff training, and network security.
Opportunities:
Improved data security and integrity;
Improving the actions of the automation line;
Improved access to medical information;
Advanced monitoring and supply management;
Improving studies and medical checks;
Formation of the latest modifications of health care financing;
Increasing the scope of partnerships among medical institutions;
Improvement of the concept of identification of patients;
Improving coordination and continuity of treatment;
Improved transparency and mutual trust for sick and interested regions;
Improved observation and management of the well-being of patients;
Improved platform for the purpose of educating and exchanging medical
knowledge.
Threats
Industrial challenges: Industrial challenges, such as blockchain scalability, high
transaction processing costs, and speed limits, are likely to have a negative impact on
platform efficiency and effectiveness.
Resisting change: The introduction of new technological processes, including
blockchain, is capable of provoking opposition from the edge of healthcare
contributors like doctors, patients and insurance companies, which can complicate the
introduction and widespread use of the platform.
40
2.9 Competitive matrix
41
Coral Health: Coral Health is a BurstIQ: BurstIQ is a blockchain-based
blockchain-based platform that allows medical platform that allows patients to
patients to have complete control over control and monetize their own medical
their own medical information and information. It is she who also
share their differences with different guarantees a reliable interchange of
healthcare partners. It is she who also data among medical institutions and
guarantees the clarity and security of partners in the healthcare ecosystem.
the presence of data exchange among
doctors, patients and insurance
companies.
42
extensive functionality and a subconsciously accessible socket have every chance of
being significant conditions for the presence of a platform selection.
In a complete, competitive table, it can help to mark the strong and small edges
of the different medical platforms at the heart of the blockchain and make an
informed decision regarding the selection of the most optimal platform for the
purpose of the plan.
43
5. Need for self-realization and self-actualization: The medical platform,
together with the blockchain, is able to help patients reach the highest levels of the
Maslow pyramid, combined with self-realization and self-actualization. The platform
is able to provide data on the potentials for growth and formation, save educational
projects and online courses regarding health status, self-development and fuller
recruitment. In addition, due to the blockchain, patients have every chance to gain
admission to innovative studies and technologies in medicine, which can help them
realize their own abilities and try to self-actualize.
In a similar way, the medical playground, together with the blockchain, is able
to store all levels of Maslow's hierarchy of needs without exception, starting with
physical needs and ending with self-realization and self-actualization. This enables
patients to acquire multifaceted care and support in their medical needs, contributing
to the achievement of rational well-being and well-being.
44
3 TECHNICAL IMPLEMENTATION
45
Figure 3.1.2 - Technical Overview
46
Java serves as a primary programming language for Android app development,
and Android Studio fully supports Java as the main language for writing Android
applications. Developers utilize Java to define the app's behavior, handle user
interactions, implement business logic, and interact with the Android platform and
APIs. By writing a Java code, developers create classes, methods, and functions that
define the application's functionality. Java enables them to manage events, process
data, perform computations, and communicate with external services.
47
issues and get support. If you have questions or problems with development, you can
often turn to the community for help.
Combining the Android Studio development environment and the Java
programming language provides a powerful toolkit for creating and deploying
effective Android applications.
Spring boot. Spring Boot is a widely adopted Java framework designed to
simplify the creation and deployment of production-grade, standalone applications
based on the Spring framework. It offers a comprehensive suite of tools for building
web and enterprise applications, including integrated support for popular
technologies like Spring Data, Spring Security, and Spring MVC.
Advantages of Spring Boot:
Simplified Usage: Spring Boot simplifies the usage and configuration
process. It provides numerous preconfigured choices and automated setups to
minimize the amount of code needed and simplify customization of your application.
Automated Configuration: Spring Boot introduces an automated
configuration mechanism that identifies the presence of libraries and configures them
without explicit configuration requirements. This significantly reduces the need for
manual configuration and integration of application components.
Built-in Application Server: Spring Boot incorporates a built-in application
server, such as Tomcat or Jetty, enabling effortless execution of an application
without the necessity of setting up and deploying a separate server.
PostgreSQL. A strong and reliable open source object-relational database is
PostgreSQL. It offers a broad range of features and skills that make it an appealing
option for many projects and applications.
A PostgreSQL database has the following important characteristics and
advantages:
High data dependability and integrity are made possible by PostgreSQL's
strong transaction system, support for ACID (Atomicity, Consistency, Isolation, and
Durability), and data integrity techniques. Due to this, PostgreSQL is a fantastic
option for applications where data security and dependability are crucial.
Scalability and performance: PostgreSQL can handle massive volumes of
data and handle sophisticated queries with ease. It provides parallel processing
capabilities, efficient query execution techniques, and indexes to quicken data
retrieval. PostgreSQL can effectively grow and handle heavily loaded applications
with the help of these capabilities.
Extensibility: PostgreSQL provides a large selection of plugins and
extensions that let you expand the database's capabilities to meet the demands of your
project. This provides features including JSON support, full text search, and spatial
extensions. This enables developers to produce new and personalized solutions.
Standards Support: PostgreSQL provides several extensions to cope with
different data types and functions and closely adheres to the ANSI SQL standards. As
a result, programmers may quickly migrate between various databases and write
portable code.
48
Large community and support: The PostgreSQL database is continually
developed and maintained by a vibrant developer community. Developers can seek
support and find solutions thanks to the wealth of resources, forums, and
documentation accessible.
A robust and adaptable database, PostgreSQL offers a dependable data
repository for a variety of applications. It is a fantastic option for developers trying to
construct dependable and efficient apps because to its extensibility, high
performance, and vibrant community.
49
Figure 3.3.1.3 – Authorization Page
The "Registration" page is one common panel, which contains questions and
fields for entering answers. To check the correctness of the entered data, explanatory
inscriptions are used that indicate the type errors and what the user should correct
when answering a question. There is a button to check the account (login) for
employment. If the user entered a login that is already in the system, then the form
will display a message stating that this Login cannot be used for registration.
50
Figure 3.3.2.1 – Home Page
The home page of the project serves as the entry point for users, providing a
comprehensive overview of the system's features and functionality. It aims to deliver
a user-friendly and intuitive interface that promotes easy navigation and access to key
information. The home page serves as a central hub, offering a glimpse into the
system's capabilities while guiding users to specific areas of interest.
In general, the user interface of MedApp ensures easy to use encounter through
its intuitive layout and robust security measures. It presents a cohesive platform
51
where users can effortlessly navigate and engage with the information stored in the
Database. For each user, permissions are defined that govern access to tasks and
objects.
52
Figure 3.3.3.2 – Patient Analysis List
The Patient Analysis List within the MedApp empowers doctors to conduct
targeted analysis and gain valuable insights from patient data. It supports evidence-
based decision-making, trend identification, and personalized care delivery. The
customizable analysis criteria, visualization options, and export capabilities enhance
the efficiency and effectiveness of data analysis processes.
53
Figure 3.4.1.1 - Block Database
Block DB part is universal, it can be used by other server clients and should be
clustered for decentrilized saving of blocks.
54
linked together, and any alteration to a block would require recalculating the hash of
that block and all subsequent blocks. This process is computationally intensive,
making it extremely difficult to modify past transactions without the consensus of the
network.
Furthermore, the distributed nature of a blockchain database enhances its
security. Instead of relying on a single central authority, the database is maintained by
a network of nodes that participate in the consensus mechanism. Each node has a
copy of the entire blockchain and validates transactions based on the predefined
consensus rules. This decentralized structure makes it more resilient to attacks, as
compromising a single node would not compromise the entire database.
55
Figure 3.4.2.4 – Tables Block Database
56
start_date DATETIME NOT NULL
end_date DATETIME NOT NULL
info C (50) NOT NULL
diagnose_id N (7) FK
Block:
Block;
Blockchain;
Crypt;
PatientBlock.
57
3.5.1 PatientBlock Class
In the PatientBlock class, we create a block inside which there will be a unique
ID and patient IIN.
58
In this class, we will add the block that was created in the PatientBlock class to
the blockchain block. The blockchain block will have its own data such as, ID, its
own unique hash, the hash of the previous block, the patient's data block and the time
of block creation.
In this class we will add a block in the blockchain. The addBlock method is
responsible for adding a block to this blockchain and setting the hash of the previous
block to the previousHash parameter in this block. The is ChainValid method is
responsible for verifying blocks in the blockchain for authenticity using hashing.
We iterate over all the blocks. Checking if the current hash is equal to the
computed hash or not. If the hashes match, then the current and previous blocks are
successfully saved.
3.5.4. Cryptography
The primary purpose of using the SHA-256 hash function in the project is to
ensure data integrity and verification. By comparing the computed hash value of a
piece of data with its original hash value, one can determine if the data has been
modified or tampered with. This can be useful in validating the authenticity and
integrity of stored data, such as patient records or transactional information.
59
Figure 3.5.4 – Cryptography
60
4 ECONOMIC EFFECTIVENESS OF THE PROJECT
In recent years, hacker attacks have become more common, posing a serious
threat to data. What attracts intruders in the healthcare sector? First of all, the ease of
implementing attacks. Medical institutions use outdated systems, rarely update
software, and therefore these solutions contain hundreds of dangerous vulnerabilities
that open access even for those hackers who are not highly qualified. Modern
technologies allow you to protect confidential information and prevent such attacks.
Blockchain is one of such technologies. The three strengths of blockchain are cost
reduction, increased security and transparency of transactions.
Thus, for a medical platform that decides to implement blockchain technology
into its system, this technology will significantly reduce time costs and improve the
data management system and also attract a large number of new users interested in
data privacy.
61
The study assumes the task of attracting 2-3 clinics per month during the first
year. The plan to attract customers is as follows:
Offer Free Trials: Offer free trials or demo versions of the security system to
help healthcare professionals understand the benefits and ease of use.
Create marketing materials: Develop marketing materials that talk about
the benefits of the security system, such as brochures, flyers, presentations and
videos.
Provide ongoing support: Provide ongoing support to healthcare
providers who have purchased a security system, such as training, customer support,
and regular updates.
Following these steps, a marketing action plan for a medical security system
can effectively inform about the benefits of the system and attract potential customers
for the company.
62
4.6 Expenses on Payroll (wage fund)
Thus, the payroll in the initial months was 2 200 000 tenge.
63
Next, it is necessary to calculate the amount of mandatory deductions from
wages, which include: social contributions, social tax and MSHI.
Pension contribution = 10% * accrued wages = 2200000 * 0,1 = 220000
Social contributions = 3.5%*(accrued wages – pension contributions) =
0,035(2200000 – (2200000*0,1)) = 69300
Deductions for compulsory social health insurance = 3.5% * accrued wages =
0,035 * 2200000 = 77000
Social tax = 9.5%* (accrued wages – pension contributions –deductions for
compulsory social health insurance from an employee) – social contributions =
0,095* ((2200000-2200000 * 0,1)-77000)- 69300 = 111485
Total mandatory deductions from the total salary of all employees = 69300 +
77000 + 111485 = 257785 KZT.
Payroll:
Total salary + deductions = 2 200 000 + 257 785 = 2 457 785 KZT.
64
4.7 Overhead Costs
Overhead costs are the costs that are not attributed to the direct costs of
developing a web application. In our case - it's rent of premises, payment of utilities,
Internet.
65
Depending on the purpose of the project economic efficiency and payback
period should also be calculated for the users, i.e. users of the developed software
product (medical clinics) in terms of reducing labor costs, saving time, reducing the
number of staff, reducing the financial cost of labor, etc. As a cost in this case will be
the cost of the purchase of the clinic of this software (software product).
DТ=Т0-Т1 (4.9)
КТ=DТ/T0 (4.10)
index of labor cost reduction or increase in labor productivity due to the use of
new equipment (YT):
66
quality of service, which confirms the effectiveness of the implementation of this
software.
We will calculate the cost reduction in value terms by comparing the cost of
work with the traditional type of customer service of the clinic and the PP proposed
in the project, by determining the economic effect, i.e. by comparing the cost costs
due to an absolute reduction in cost costs.
Economic effect = costs before implementation – costs after implementation
We will calculate the payback period for the implementation of this PP in the
clinic's activities:
Payback period = initial costs/ cost savings
Payback period = 2 045 675 / 10 019 815 = 0.204 year (2 month and 13 days).
Thus, the clinic, having acquired a software product developed in the project,
at a total cost of 2 045 675 tenge, will reduce labor costs by 87% and will recoup
these investments within 0.204 years, i.e. within 2 month and 13 days, will receive an
economic effect in saving 10 019 815 tenge, which proves the profitability of
acquiring and implementing into its activities the developed in the project the
product.
67
CONCLUSION
68
REFERENCES
69