Skip to main content

Cloud-Assisted Mobile-Access of Health Data with Privacy and Audit ability

Cloud-Assisted Mobile-Access of Health Data with Privacy and Audit ability

Abstract:-

Motivated by the privacy issues, curbing the adoption of electronic healthcare systems and the wild success of cloud service models, we propose to build privacy into mobile healthcare systems with the help of the private cloud. Our system offers salient features including efficient key management, privacy-preserving data storage, and retrieval, especially for retrieval at emergencies, and audit ability for misusing health data. Specifically, we pro-pose to integrate key management from pseudorandom number generator for unlink ability, a secure indexing method for privacy-preserving keyword search which hides both search and access pat-terns based on redundancy, and integrate the concept of attribute-based encryption with threshold signing for providing role-based access control with audit ability to prevent potential misbehavior, in both normal and emergency cases. Anywhere-anytime-accessible electronic healthcare systems play a vital role in our daily life. Services supported by mobile devices, such as home care and remote monitoring, enable patients to retain their living style and cause minimal interruption to their daily activities. In addition, it significantly reduces the hospital occupancy, allowing patients with higher need of in-hospital treatment to be admitted.




Existing System:-  

Ø Existing system a PHR system model, there are multiple owners who may encrypt according to their own ways, possibly using different sets of cryptographic keys.
Ø Each user obtains keys from every owner whose PHR she wants to read would limit the accessibility since patients are not always online.
Ø An alternative is to employ a central authority CA to do the key management on behalf of all PHR owners, but this requires too much trust on a single authority.
Ø Key escrow also known as a “fair” cryptosystem is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys.
Ø We provide a thorough analysis of the complexity and scalability of our Existing secure PHR sharing  solution, in terms of multiple metrics in computation, communication, storage and  key management
Ø This requirement is the most challenging and none of the existing efficient SSE can satisfy it.

Disadvantages:-
Ø Difficult for Long Term Medication. Several Kinds of Medicine Diagnosing, Frustration of missing Doses.
Ø  Manual Insurance Climbing Patients could actually control the sharing of their sensitive PHI, especially when they are stored on a third-party server which people may not fully trust.
Ø  Because a third-party server inside hackers can able to leak the patient’s information and security records to other peoples so this scheme is not fully trust.
Ø  The ABE important issues such as key management scalability, dynamic policy updates, and efficient on-demand revocation are non-trivial to solve, and remain largely open up-to-date.
Proposed System:-

Ø The proposed cloud-assisted mobile health networking is inspired by the power, flexibility, convenience, and cost efficiency of the Cloud-based data/computation outsourcing paradigm.
Ø  We introduce the private cloud which can be considered as a service offered to mobile users.
Ø  The result indicates that the proposed scheme is efficient as well as scalable.
Ø  Mobile users outsource data processing tasks to the private cloud which stores the processed results on the public cloud.
Ø  The cloud-assisted service model supports the implementation of practical privacy mechanisms since intensive computation and storage can be shifted to the cloud, leaving mobile users with lightweight tasks.
Ø  Our proposed pattern hiding scheme just slightly increases the computation and storage costs at the public cloud compared to the most efficient construction. 


Advantages:

Ø We provide a thorough analysis of the complexity and scalability of our proposed secure PHR sharing solution, in terms of multiple metrics in computation, communication, storage and key management.
Ø Data Confidentiality and On-Demand Revocation. Write Access Control and Scalability and Usability.
Ø We proposed to build privacy into mobile health systems with the help of the private cloud.
Ø  We provided a solution for privacy-preserving data storage by integrating a PRF based key management for unlink ability


Hardware Requirements:-
Ø SYSTEM        : Pentium IV 2.4 GHz
Ø HARD DISK   : 40 GB
Ø RAM              : 256 MB

Software Requirements:-
Ø Operating system :  Xp-3.
Ø IDE                       :  Microsoft Visual Studio 2010
Ø Database               :  Sql server 2005
Ø Coding Language  :  C#.NET.



Comments

Popular posts from this blog

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD report

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD ABSTRACT More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity checking is also an important security problem in public cloud storage. It makes the clients check whether their outsourced data is kept intact without downloading the whole data. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, system model and se...

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM ABSTRACT Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as”the weakest link” in the authentication chain. Rather than arbitrary alphanumeric strings, users tend to choose passwords either short or meaningful for easy memorization. With web applications and mobile apps piling up, people can access these applications anytime and anywhere with various devices. This evolution brings great convenience but also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, we proposed a novel authentication system PassMatrix, based on graphical passwords to resist shoulder surfing attacks. With a one-time valid login indicator and ...

garbage monitoring using arduino code with gsm

#include <SoftwareSerial.h> #include <LiquidCrystal.h> //LiquidCrystal lcd(7, 6, 5, 4, 3, 2); LiquidCrystal lcd(13, 12, 11, 10, 9, 8); SoftwareSerial mySerial(0,1); #define trigPin 2 #define echoPin 3 #define PIR_sensor 4 #define m11 5 #define m12 6 void setup() {    lcd.begin(16, 2);    lcd.print("    Garbage    ");    Serial.println("garbage ");   lcd.setCursor(0,1);   lcd.print("   Open Close    ");   Serial.println(" open close");   delay(3000);   lcd.clear();   //lcd.print(" ");   delay(2000); mySerial.begin(9600); // Setting the baud rate of GSM Module Serial.begin (9600); pinMode(trigPin, OUTPUT); pinMode(echoPin, INPUT);  pinMode(m11, OUTPUT);   pinMode(m12, OUTPUT);   } void loop() {  readPIR();  pingDist();  SendMessage(); } void pingDist ()   {     long duration, distance;...