Cloud-Assisted
Mobile-Access of Health Data with Privacy and Audit ability
Abstract:-
Motivated by the
privacy issues, curbing the adoption of electronic healthcare systems and the
wild success of cloud service models, we propose to build privacy into mobile
healthcare systems with the help of the private cloud. Our system offers
salient features including efficient key management, privacy-preserving data
storage, and retrieval, especially for retrieval at emergencies, and audit
ability for misusing health data. Specifically, we pro-pose to integrate key
management from pseudorandom number generator for unlink ability, a secure
indexing method for privacy-preserving keyword search which hides both search
and access pat-terns based on redundancy, and integrate the concept of
attribute-based encryption with threshold signing for providing role-based
access control with audit ability to prevent potential misbehavior, in both
normal and emergency cases. Anywhere-anytime-accessible electronic healthcare
systems play a vital role in our daily life. Services supported by mobile
devices, such as home care and remote monitoring, enable patients to retain
their living style and cause minimal interruption to their daily activities. In
addition, it significantly reduces the hospital occupancy, allowing patients
with higher need of in-hospital treatment to be admitted.
Existing System:-
Ø
Existing system a PHR system model,
there are multiple owners who may encrypt according to their own ways, possibly
using different sets of cryptographic keys.
Ø
Each user obtains keys from every
owner whose PHR she wants to read would limit the accessibility since patients
are not always online.
Ø
An alternative is to employ a
central authority CA to do the key management on behalf of all PHR owners, but
this requires too much trust on a single authority.
Ø
Key escrow also known as a “fair”
cryptosystem is an arrangement in which the keys needed to decrypt encrypted
data are held in escrow so that, under certain circumstances, an authorized
third party may gain access to those keys.
Ø
We provide a thorough analysis of
the complexity and scalability of our Existing secure PHR sharing solution, in terms of multiple metrics in
computation, communication, storage and
key management
Ø
This requirement is the most
challenging and none of the existing efficient SSE can satisfy it.
Disadvantages:-
Ø Difficult for Long Term Medication. Several Kinds of Medicine
Diagnosing, Frustration of missing Doses.
Ø
Manual Insurance Climbing Patients
could actually control the sharing of their sensitive PHI, especially when they
are stored on a third-party server which people may not fully trust.
Ø
Because a third-party server inside
hackers can able to leak the patient’s information and security records to
other peoples so this scheme is not fully trust.
Ø
The ABE important issues such as
key management scalability, dynamic policy updates, and efficient on-demand
revocation are non-trivial to solve, and remain largely open up-to-date.
Proposed System:-
Ø The proposed cloud-assisted mobile health networking is inspired
by the power, flexibility, convenience, and cost efficiency of the Cloud-based
data/computation outsourcing paradigm.
Ø We introduce the private cloud which can be considered as a
service offered to mobile users.
Ø The result indicates that the proposed scheme is efficient as well
as scalable.
Ø Mobile users outsource data processing tasks to the private cloud
which stores the processed results on the public cloud.
Ø The cloud-assisted service model supports the implementation of
practical privacy mechanisms since intensive computation and storage can be
shifted to the cloud, leaving mobile users with lightweight tasks.
Ø Our proposed pattern hiding scheme just slightly increases the
computation and storage costs at the public cloud compared to the most
efficient construction.
Advantages:
Ø We
provide a thorough analysis of the complexity and scalability of our proposed
secure PHR sharing solution, in terms of multiple metrics in computation,
communication, storage and key management.
Ø Data
Confidentiality and On-Demand Revocation. Write Access Control and Scalability
and Usability.
Ø We
proposed to build privacy into mobile health systems with the help of the
private cloud.
Ø We provided a solution for privacy-preserving
data storage by integrating a PRF based key management for unlink ability
Hardware
Requirements:-
Ø SYSTEM :
Pentium IV 2.4 GHz
Ø HARD
DISK : 40 GB
Ø RAM
: 256 MB
Software
Requirements:-
Ø Operating
system :
Xp-3.
Ø IDE :
Microsoft Visual Studio 2010
Ø Database :
Sql server 2005
Ø Coding
Language : C#.NET.
Comments
Post a Comment