Keamanan Data Pasien dengan Algoritma Blowfish pada HOTSPODT

Fahriani, Nuniek and Kurniawati, Indah Keamanan Data Pasien dengan Algoritma Blowfish pada HOTSPODT. J-COSINE, 5 (2). pp. 140-148. ISSN 2541-0806

This is the latest version of this item.

[thumbnail of Artikel Ilmiah] PDF (Artikel Ilmiah)
416-Article Text-1741-1-10-20211228.pdf - Published Version

Download (852kB)
[thumbnail of Cek Plagiasi] PDF (Cek Plagiasi)
15. CEK SIMILARITY SYARAT KHUSUS.pdf - Supplemental Material

Download (2MB)
[thumbnail of Bukti Korespondensi]
Preview
PDF (Bukti Korespondensi)
BUKTI KORESPONDENSI JCOSINE.pdf - Supplemental Material

Download (1MB) | Preview

Abstract

At HOTSPODT (Hospital Ship for Covid
Disaster) there are no stages regarding the application of the
use of information technology systems, especially for
securing patient data which includes personal data and
patient medical records. Confidential patient data collected
during the current pandemic, including the patient’s name,
address, diagnosis, family history and medical records
without the patient’s consent, may pose a risk to the
individual concerned. The concept of patient data security is
adjusted to the user’s position on the importance of data.
Access to patient data authorization is one of the security
gaps that the security system needs to pay attention to and
guard against. So, in this case applied a data security
algorithm in the form of cryptography. The algorithm used
is the Blowfish Algorithm. The test results of the scenario in
the application prove that it can be successfully processed
from the encrypted file to ciphertext until it is returned as
the original file.

Item Type: Article
Uncontrolled Keywords: WBAN, Blowfish, HOTSPODT, Enkripsi, Dekripsi.
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Jurnal > Fakultas Teknik
Depositing User: Nuniek Fahriani Nuniek
Date Deposited: 13 Mar 2025 04:10
Last Modified: 13 Mar 2025 04:10
URI: https://repository.um-surabaya.ac.id/id/eprint/9915

Available Versions of this Item

Actions (login required)

View Item
View Item