SlideShare a Scribd company logo
VISVESVARAYA TECHNOLOGICAL UNIVERSITY

PHASE 1
“Efficient Sharing of Personal Health Records using Encryption in Cloud
Computing”
By,
NAVEENA N
1BT12SCS08

Guide:
Mrs. R VIDHYALAKSHMI
Sr. Lecturer of CSE dept.
B.T.L INSTITUTE OF TECHNOLOGY
Department of Computer Science & Engineering
2013-14
AGENDA
oAbstract
oPersonal Health Records in cloud computing
oExisting system

oDrawbacks
oProposed System
oModules
oApplications
oConclusion
ABSTRACT
 Personal health records (PHRs) grant patients access to a wide range of
health information sources, best medical practices and health knowledge.
 In patient centric secure sharing, patients will create, manage and control
their personal health data from one place using the web.
 Prior to storing the records in cloud server, they are encrypted using
encryption algorithm which ensures the patient’s full control over their PHR.

 Patients only decide which set of users can access which set of files.
LITERATURE SURVEY
 . J. Benaloh, “Patient Controlled Encryption: Ensuring Privacy of Electronic
Medical Records,”
→ proposed a scheme in which a file can be uploaded without key distribution
and it is highly efficient. But it is a single data owner scenario and thus it is
not easy to add categories
 Recently J. Hur and D. K. Noh in “Attribute-Based Revocation in Data
Outsourcing Systems,”
→ proposed two CPABE schemes with immediate attribute revocation
capability, instead of periodical revocation. However, they were not
designed for Multi Authority Attribute Based Encryption (MAABE).
EXISTING SYSTEM

 Due to the high cost of building and maintaining specialized data centers,
many PHR services are outsourced to or provided by third-party service
providers, for example, Microsoft Health Vault.
 The main concern is about whether the patients could actually control the
sharing of their sensitive personal health information (PHI), especially when
they are stored on a third-party server which people may not fully trust.
OBJECTIVE

 The main aim of the proposed system is to provide secure patient-centric
PHR access and efficient key management at the same time.

 The key idea is to divide the system into multiple security domains
(namely, public domains (PUDs) and personal domains (PSDs))
according to the different users’ data access requirements.
Architecture

The proposed framework for patient-centric, secure and scalable PHR sharing on semi-trusted
storage under multi-owner settings.
SYSTEM FLOW CHART
Attribute Based Encryption (ABE)

 In this scheme, users are categorized into
personal and professional domains which
greatly reduce the key management
complexity.

 There is a structured way to access the files for
personal and professional purposes. Patients
are able to dynamically modify the access
policy and attributes.
Attribute Based Encryption (ABE)

Attribute Types in this System
 Friends
 Hospitals
 Insurance
 Emergency
MODULES
 PHR Owner Module
 Attribute based Access Policy Module
 Data confidentiality Module
 PHR Owner Module
 The key idea is to divide the system into multiple security domains
(namely, public domains (PUDs) and personal domains (PSDs))
according to the different users’ data access requirements.
 The PUDs consist of users who make access based on their
professional roles, such as doctors, nurses and medical researchers.
 For each PSD, its users are personally associated with a data owner
(such as family members or close friends), and they make accesses to
PHRs based on access rights assigned by the owner.
 Attribute based Access Policy Module
 Users having read and write access as data readers and
contributors, respectively.

 Dark boxes are the categories that a PSD’s data readers have access to.
 Data confidentiality Module
 The owners upload ABE-encrypted PHR files to the server.
 Each owner’s PHR file is encrypted both under a certain fine
grained and role-based access policy for users from the PUD to
access.
 Under a selected set of data attributes that allows access from users

in the PSD. Only authorized users can decrypt the PHR files,
excluding the server.
ADVANTAGES
Extensive analytical and experimental results are presented
which shows
 Data confidentiality
 On-demand revocation
 Write access control
 Scalability and usability
APPLICATIONS
 Hospital Management

 Health Care Website
CONCLUSION

 This paper proposed a novel framework of secure sharing of
personal health records in cloud computing. Considering partially
trustworthy cloud servers, argue that to fully realize the patientcentric concept, patients shall have complete control of their own
privacy through encrypting their PHR files to allow fine-grained
access.
Efficient sharing of personal health records using encryption in cloud computing
Ad

More Related Content

What's hot (20)

hospital management System
hospital management Systemhospital management System
hospital management System
sabin kafle
 
Hospital management system business case
Hospital management system business caseHospital management system business case
Hospital management system business case
Neelam Priya
 
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
NICHOLAS RATEMO
 
Hospital management final report presentation
Hospital management final report presentationHospital management final report presentation
Hospital management final report presentation
Md Abul Kalam Azad
 
automated doctor appointment and prescription management system
automated doctor appointment and prescription management systemautomated doctor appointment and prescription management system
automated doctor appointment and prescription management system
luckymoni76
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
Dr. Sunil Kr. Pandey
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
Sonali Jain
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
Abhishek Pachisia
 
Pathology Lab Software
Pathology Lab SoftwarePathology Lab Software
Pathology Lab Software
jawahar Choubey
 
HOSPITAL MANAGEMENT SYSTEM PROJECT
HOSPITAL MANAGEMENT SYSTEM PROJECTHOSPITAL MANAGEMENT SYSTEM PROJECT
HOSPITAL MANAGEMENT SYSTEM PROJECT
MUHAMMAD HUZAIFA CHAUDHARY
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
RashmikaJava
 
Uniwide Hospital Management System
Uniwide Hospital Management SystemUniwide Hospital Management System
Uniwide Hospital Management System
Uniwide Consultancy & Services Pvt. Ltd.
 
Managing File Transfers (MFT)
Managing File Transfers (MFT)Managing File Transfers (MFT)
Managing File Transfers (MFT)
Kellton Tech Solutions Ltd
 
Electronic medical record for Doctors
Electronic medical record for DoctorsElectronic medical record for Doctors
Electronic medical record for Doctors
Railwire
 
Clinical decision support systems
Clinical decision support systemsClinical decision support systems
Clinical decision support systems
Bhavitha Pulaparthi
 
Srs hospital management
Srs hospital managementSrs hospital management
Srs hospital management
maamir farooq
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
Saurabh Tripathi
 
Library Management System
Library Management System Library Management System
Library Management System
Ankita Jangir
 
Hospital Management Record System Proposal
Hospital Management Record System ProposalHospital Management Record System Proposal
Hospital Management Record System Proposal
Bishal Bista
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Ninh Nguyen
 
hospital management System
hospital management Systemhospital management System
hospital management System
sabin kafle
 
Hospital management system business case
Hospital management system business caseHospital management system business case
Hospital management system business case
Neelam Priya
 
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
NICHOLAS RATEMO
 
Hospital management final report presentation
Hospital management final report presentationHospital management final report presentation
Hospital management final report presentation
Md Abul Kalam Azad
 
automated doctor appointment and prescription management system
automated doctor appointment and prescription management systemautomated doctor appointment and prescription management system
automated doctor appointment and prescription management system
luckymoni76
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
Dr. Sunil Kr. Pandey
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
Sonali Jain
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
RashmikaJava
 
Electronic medical record for Doctors
Electronic medical record for DoctorsElectronic medical record for Doctors
Electronic medical record for Doctors
Railwire
 
Clinical decision support systems
Clinical decision support systemsClinical decision support systems
Clinical decision support systems
Bhavitha Pulaparthi
 
Srs hospital management
Srs hospital managementSrs hospital management
Srs hospital management
maamir farooq
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
Saurabh Tripathi
 
Library Management System
Library Management System Library Management System
Library Management System
Ankita Jangir
 
Hospital Management Record System Proposal
Hospital Management Record System ProposalHospital Management Record System Proposal
Hospital Management Record System Proposal
Bishal Bista
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Ninh Nguyen
 

Viewers also liked (19)

Attribute Based Encryption
Attribute Based EncryptionAttribute Based Encryption
Attribute Based Encryption
UT, San Antonio
 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds
Swathi Rampur
 
Scalable and secure sharing of public health record using attribute based Enc...
Scalable and secure sharing of public health record using attribute based Enc...Scalable and secure sharing of public health record using attribute based Enc...
Scalable and secure sharing of public health record using attribute based Enc...
shreyank byadagi
 
Scalable and secure sharing of personal health records
Scalable and secure sharing of personal health recordsScalable and secure sharing of personal health records
Scalable and secure sharing of personal health records
colourswathi
 
Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...
Naveena N
 
Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud Security
Mphasis
 
Personal Health Records
Personal Health RecordsPersonal Health Records
Personal Health Records
RRR784
 
Attributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionAttributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryption
KaashivInfoTech Company
 
Personal Health Records
Personal Health RecordsPersonal Health Records
Personal Health Records
Ayush Narula
 
Personal Health Records - An Overview
Personal Health Records - An OverviewPersonal Health Records - An Overview
Personal Health Records - An Overview
rcostantini
 
Personal Health Records
Personal Health RecordsPersonal Health Records
Personal Health Records
Dr. Satya Mishra.
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryption
IEEEFINALYEARPROJECTS
 
Personal Health Record and web 2.0
Personal Health Record and web 2.0Personal Health Record and web 2.0
Personal Health Record and web 2.0
Eugenio Santoro
 
Development of a Personal Health Record with a Diabetes Self-management Tool ...
Development of a Personal Health Record with a Diabetes Self-management Tool ...Development of a Personal Health Record with a Diabetes Self-management Tool ...
Development of a Personal Health Record with a Diabetes Self-management Tool ...
Liliana Laranjo
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 MULTI-STAGE ENCRYPTION USING SEEDED SDES MULTI-STAGE ENCRYPTION USING SEEDED SDES
MULTI-STAGE ENCRYPTION USING SEEDED SDES
Eswar Publications
 
kpit ppt
kpit pptkpit ppt
kpit ppt
Manoj Kumar K.M
 
Toward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networksToward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networks
Naveena N
 
Securededuplicationschemeforcloudstorage 141128075306-conversion-gate01
Securededuplicationschemeforcloudstorage 141128075306-conversion-gate01Securededuplicationschemeforcloudstorage 141128075306-conversion-gate01
Securededuplicationschemeforcloudstorage 141128075306-conversion-gate01
shobhiya kumar
 
2012 13 ieee projects jp infotech booklet
2012 13 ieee projects jp infotech booklet2012 13 ieee projects jp infotech booklet
2012 13 ieee projects jp infotech booklet
jpinfotech
 
Attribute Based Encryption
Attribute Based EncryptionAttribute Based Encryption
Attribute Based Encryption
UT, San Antonio
 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds
Swathi Rampur
 
Scalable and secure sharing of public health record using attribute based Enc...
Scalable and secure sharing of public health record using attribute based Enc...Scalable and secure sharing of public health record using attribute based Enc...
Scalable and secure sharing of public health record using attribute based Enc...
shreyank byadagi
 
Scalable and secure sharing of personal health records
Scalable and secure sharing of personal health recordsScalable and secure sharing of personal health records
Scalable and secure sharing of personal health records
colourswathi
 
Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...
Naveena N
 
Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud Security
Mphasis
 
Personal Health Records
Personal Health RecordsPersonal Health Records
Personal Health Records
RRR784
 
Attributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionAttributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryption
KaashivInfoTech Company
 
Personal Health Records
Personal Health RecordsPersonal Health Records
Personal Health Records
Ayush Narula
 
Personal Health Records - An Overview
Personal Health Records - An OverviewPersonal Health Records - An Overview
Personal Health Records - An Overview
rcostantini
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryption
IEEEFINALYEARPROJECTS
 
Personal Health Record and web 2.0
Personal Health Record and web 2.0Personal Health Record and web 2.0
Personal Health Record and web 2.0
Eugenio Santoro
 
Development of a Personal Health Record with a Diabetes Self-management Tool ...
Development of a Personal Health Record with a Diabetes Self-management Tool ...Development of a Personal Health Record with a Diabetes Self-management Tool ...
Development of a Personal Health Record with a Diabetes Self-management Tool ...
Liliana Laranjo
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 MULTI-STAGE ENCRYPTION USING SEEDED SDES MULTI-STAGE ENCRYPTION USING SEEDED SDES
MULTI-STAGE ENCRYPTION USING SEEDED SDES
Eswar Publications
 
Toward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networksToward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networks
Naveena N
 
Securededuplicationschemeforcloudstorage 141128075306-conversion-gate01
Securededuplicationschemeforcloudstorage 141128075306-conversion-gate01Securededuplicationschemeforcloudstorage 141128075306-conversion-gate01
Securededuplicationschemeforcloudstorage 141128075306-conversion-gate01
shobhiya kumar
 
2012 13 ieee projects jp infotech booklet
2012 13 ieee projects jp infotech booklet2012 13 ieee projects jp infotech booklet
2012 13 ieee projects jp infotech booklet
jpinfotech
 
Ad

Similar to Efficient sharing of personal health records using encryption in cloud computing (20)

secured storage of Personal health record in cloude
secured storage of Personal health record in cloudesecured storage of Personal health record in cloude
secured storage of Personal health record in cloude
Mahaveer kandgule
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
A Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud ComputingA Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud Computing
IJMER
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
dbpublications
 
Set paper winter sem 15 16 (final)
Set paper winter sem 15 16 (final)Set paper winter sem 15 16 (final)
Set paper winter sem 15 16 (final)
Vellore Institute of Technology
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
dbpublications
 
Full paper
Full paperFull paper
Full paper
Harilal Punalur
 
Full paper
Full paperFull paper
Full paper
Harilal Punalur
 
Full paper
Full paperFull paper
Full paper
Harilal Punalur
 
Scalable and secure sharing of personal health records in cloud computing us...
Scalable and secure sharing of personal health
records in cloud computing us...Scalable and secure sharing of personal health
records in cloud computing us...
Scalable and secure sharing of personal health records in cloud computing us...
Duraiyarasan S
 
Iaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal healthIaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal health
Iaetsd Iaetsd
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
ZTech Proje
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Harilal Punalur
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Harilal Punalur
 
Scalable and secure sharing of personal health
Scalable and secure sharing of personal healthScalable and secure sharing of personal health
Scalable and secure sharing of personal health
IMPULSE_TECHNOLOGY
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Editor IJCATR
 
Ijarcet vol-2-issue-3-925-932
Ijarcet vol-2-issue-3-925-932Ijarcet vol-2-issue-3-925-932
Ijarcet vol-2-issue-3-925-932
Editor IJARCET
 
Kg3617691773
Kg3617691773Kg3617691773
Kg3617691773
IJERA Editor
 
7
77
7
Technology_solution
 
secured storage of Personal health record in cloude
secured storage of Personal health record in cloudesecured storage of Personal health record in cloude
secured storage of Personal health record in cloude
Mahaveer kandgule
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
A Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud ComputingA Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud Computing
IJMER
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
dbpublications
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
dbpublications
 
Scalable and secure sharing of personal health records in cloud computing us...
Scalable and secure sharing of personal health
records in cloud computing us...Scalable and secure sharing of personal health
records in cloud computing us...
Scalable and secure sharing of personal health records in cloud computing us...
Duraiyarasan S
 
Iaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal healthIaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal health
Iaetsd Iaetsd
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
ZTech Proje
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Harilal Punalur
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Harilal Punalur
 
Scalable and secure sharing of personal health
Scalable and secure sharing of personal healthScalable and secure sharing of personal health
Scalable and secure sharing of personal health
IMPULSE_TECHNOLOGY
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Editor IJCATR
 
Ijarcet vol-2-issue-3-925-932
Ijarcet vol-2-issue-3-925-932Ijarcet vol-2-issue-3-925-932
Ijarcet vol-2-issue-3-925-932
Editor IJARCET
 
Ad

Recently uploaded (20)

Dialysis and care of person with dialysis .pptx
Dialysis and care of person with dialysis .pptxDialysis and care of person with dialysis .pptx
Dialysis and care of person with dialysis .pptx
Rishika Rawat
 
1D-2D NMR- dhanashree kolhekar- BBAU, Lucknow.pptx
1D-2D NMR- dhanashree kolhekar- BBAU, Lucknow.pptx1D-2D NMR- dhanashree kolhekar- BBAU, Lucknow.pptx
1D-2D NMR- dhanashree kolhekar- BBAU, Lucknow.pptx
DHANASHREE KOLHEKAR
 
Surgical Implant Workup by Mari-Alina Timoshchuk.pptx
Surgical Implant Workup by Mari-Alina Timoshchuk.pptxSurgical Implant Workup by Mari-Alina Timoshchuk.pptx
Surgical Implant Workup by Mari-Alina Timoshchuk.pptx
Mari-Alina Timoshchuk
 
Pathophysiology of obesity - Rawa Muhsin
Pathophysiology of obesity - Rawa MuhsinPathophysiology of obesity - Rawa Muhsin
Pathophysiology of obesity - Rawa Muhsin
Rawa Muhsin
 
Triads in Ophthalmology (specific symptom or sign combinations) Dr Riyad Bana...
Triads in Ophthalmology (specific symptom or sign combinations) Dr Riyad Bana...Triads in Ophthalmology (specific symptom or sign combinations) Dr Riyad Bana...
Triads in Ophthalmology (specific symptom or sign combinations) Dr Riyad Bana...
Riyad Banayot
 
FIREARM INJURIES.pptx forensic medicine h
FIREARM INJURIES.pptx forensic medicine hFIREARM INJURIES.pptx forensic medicine h
FIREARM INJURIES.pptx forensic medicine h
preet259564
 
Formulation and evaluation of Poly herbal face syrum..
Formulation and evaluation of Poly herbal face syrum..Formulation and evaluation of Poly herbal face syrum..
Formulation and evaluation of Poly herbal face syrum..
VishalGautam960592
 
MIZAN 8 May 2025 Probabation period special.pdf
MIZAN 8  May 2025 Probabation period special.pdfMIZAN 8  May 2025 Probabation period special.pdf
MIZAN 8 May 2025 Probabation period special.pdf
Government Tibbi College and Hospital, Patna
 
“Pharmacology of Aminoglycosides: A Detailed Review for Medical and Pharmacy ...
“Pharmacology of Aminoglycosides: A Detailed Review for Medical and Pharmacy ...“Pharmacology of Aminoglycosides: A Detailed Review for Medical and Pharmacy ...
“Pharmacology of Aminoglycosides: A Detailed Review for Medical and Pharmacy ...
Dr. NIDHI SRIVASTAVA
 
Understanding Scleroderma Renal Crisis: What Patients Need to Know
Understanding Scleroderma Renal Crisis: What Patients Need to KnowUnderstanding Scleroderma Renal Crisis: What Patients Need to Know
Understanding Scleroderma Renal Crisis: What Patients Need to Know
Scleroderma Foundation of Greater Chicago
 
prevention of food Adulteration Act,1954.pptx
prevention of food Adulteration Act,1954.pptxprevention of food Adulteration Act,1954.pptx
prevention of food Adulteration Act,1954.pptx
SakshiSk1
 
Valvular-Heart-Diseases-A-Comprehensive-Overview.pdf
Valvular-Heart-Diseases-A-Comprehensive-Overview.pdfValvular-Heart-Diseases-A-Comprehensive-Overview.pdf
Valvular-Heart-Diseases-A-Comprehensive-Overview.pdf
Assist. Prof. Radhwan Hazem Alkhashab
 
Navigating the Clinical Integration of TROP2-Targeted ADCs in TNBC and HR+, H...
Navigating the Clinical Integration of TROP2-Targeted ADCs in TNBC and HR+, H...Navigating the Clinical Integration of TROP2-Targeted ADCs in TNBC and HR+, H...
Navigating the Clinical Integration of TROP2-Targeted ADCs in TNBC and HR+, H...
PVI, PeerView Institute for Medical Education
 
Breaking Down the Duties of a Prior Authorization Pharmacist.docx
Breaking Down the Duties of a Prior Authorization Pharmacist.docxBreaking Down the Duties of a Prior Authorization Pharmacist.docx
Breaking Down the Duties of a Prior Authorization Pharmacist.docx
Portiva
 
Semaglutide(Wegovy, Ozempic)-Mechanism, Clinical Applications, Trials, and Fu...
Semaglutide(Wegovy, Ozempic)-Mechanism, Clinical Applications, Trials, and Fu...Semaglutide(Wegovy, Ozempic)-Mechanism, Clinical Applications, Trials, and Fu...
Semaglutide(Wegovy, Ozempic)-Mechanism, Clinical Applications, Trials, and Fu...
Chitranshu Rajput
 
Bala Samvardhana (Growth and Development)_010548.pdf
Bala Samvardhana (Growth and Development)_010548.pdfBala Samvardhana (Growth and Development)_010548.pdf
Bala Samvardhana (Growth and Development)_010548.pdf
aditijogal
 
MSUS musculoskeletal ultrasound On The wrist basic level Marwa Abo ELmaaty Be...
MSUS musculoskeletal ultrasound On The wrist basic level Marwa Abo ELmaaty Be...MSUS musculoskeletal ultrasound On The wrist basic level Marwa Abo ELmaaty Be...
MSUS musculoskeletal ultrasound On The wrist basic level Marwa Abo ELmaaty Be...
Internal medicine department, faculty of Medicine Beni-Suef University Egypt
 
Tumors of Urinary System - Carcinoma - Kidney, UB, Prostate, Penis & Testes.
Tumors of Urinary System - Carcinoma - Kidney, UB, Prostate, Penis & Testes.Tumors of Urinary System - Carcinoma - Kidney, UB, Prostate, Penis & Testes.
Tumors of Urinary System - Carcinoma - Kidney, UB, Prostate, Penis & Testes.
Uthamalingam Murali
 
MSUS On The Knee basic level Marwa Abo ELmaaty Besar.pdf
MSUS On The Knee basic level Marwa Abo ELmaaty Besar.pdfMSUS On The Knee basic level Marwa Abo ELmaaty Besar.pdf
MSUS On The Knee basic level Marwa Abo ELmaaty Besar.pdf
Internal medicine department, faculty of Medicine Beni-Suef University Egypt
 
Report Back from SGO: What’s New in Ovarian Cancer Research?
Report Back from SGO: What’s New in Ovarian Cancer Research?Report Back from SGO: What’s New in Ovarian Cancer Research?
Report Back from SGO: What’s New in Ovarian Cancer Research?
RheannaRandazzo
 
Dialysis and care of person with dialysis .pptx
Dialysis and care of person with dialysis .pptxDialysis and care of person with dialysis .pptx
Dialysis and care of person with dialysis .pptx
Rishika Rawat
 
1D-2D NMR- dhanashree kolhekar- BBAU, Lucknow.pptx
1D-2D NMR- dhanashree kolhekar- BBAU, Lucknow.pptx1D-2D NMR- dhanashree kolhekar- BBAU, Lucknow.pptx
1D-2D NMR- dhanashree kolhekar- BBAU, Lucknow.pptx
DHANASHREE KOLHEKAR
 
Surgical Implant Workup by Mari-Alina Timoshchuk.pptx
Surgical Implant Workup by Mari-Alina Timoshchuk.pptxSurgical Implant Workup by Mari-Alina Timoshchuk.pptx
Surgical Implant Workup by Mari-Alina Timoshchuk.pptx
Mari-Alina Timoshchuk
 
Pathophysiology of obesity - Rawa Muhsin
Pathophysiology of obesity - Rawa MuhsinPathophysiology of obesity - Rawa Muhsin
Pathophysiology of obesity - Rawa Muhsin
Rawa Muhsin
 
Triads in Ophthalmology (specific symptom or sign combinations) Dr Riyad Bana...
Triads in Ophthalmology (specific symptom or sign combinations) Dr Riyad Bana...Triads in Ophthalmology (specific symptom or sign combinations) Dr Riyad Bana...
Triads in Ophthalmology (specific symptom or sign combinations) Dr Riyad Bana...
Riyad Banayot
 
FIREARM INJURIES.pptx forensic medicine h
FIREARM INJURIES.pptx forensic medicine hFIREARM INJURIES.pptx forensic medicine h
FIREARM INJURIES.pptx forensic medicine h
preet259564
 
Formulation and evaluation of Poly herbal face syrum..
Formulation and evaluation of Poly herbal face syrum..Formulation and evaluation of Poly herbal face syrum..
Formulation and evaluation of Poly herbal face syrum..
VishalGautam960592
 
“Pharmacology of Aminoglycosides: A Detailed Review for Medical and Pharmacy ...
“Pharmacology of Aminoglycosides: A Detailed Review for Medical and Pharmacy ...“Pharmacology of Aminoglycosides: A Detailed Review for Medical and Pharmacy ...
“Pharmacology of Aminoglycosides: A Detailed Review for Medical and Pharmacy ...
Dr. NIDHI SRIVASTAVA
 
prevention of food Adulteration Act,1954.pptx
prevention of food Adulteration Act,1954.pptxprevention of food Adulteration Act,1954.pptx
prevention of food Adulteration Act,1954.pptx
SakshiSk1
 
Breaking Down the Duties of a Prior Authorization Pharmacist.docx
Breaking Down the Duties of a Prior Authorization Pharmacist.docxBreaking Down the Duties of a Prior Authorization Pharmacist.docx
Breaking Down the Duties of a Prior Authorization Pharmacist.docx
Portiva
 
Semaglutide(Wegovy, Ozempic)-Mechanism, Clinical Applications, Trials, and Fu...
Semaglutide(Wegovy, Ozempic)-Mechanism, Clinical Applications, Trials, and Fu...Semaglutide(Wegovy, Ozempic)-Mechanism, Clinical Applications, Trials, and Fu...
Semaglutide(Wegovy, Ozempic)-Mechanism, Clinical Applications, Trials, and Fu...
Chitranshu Rajput
 
Bala Samvardhana (Growth and Development)_010548.pdf
Bala Samvardhana (Growth and Development)_010548.pdfBala Samvardhana (Growth and Development)_010548.pdf
Bala Samvardhana (Growth and Development)_010548.pdf
aditijogal
 
Tumors of Urinary System - Carcinoma - Kidney, UB, Prostate, Penis & Testes.
Tumors of Urinary System - Carcinoma - Kidney, UB, Prostate, Penis & Testes.Tumors of Urinary System - Carcinoma - Kidney, UB, Prostate, Penis & Testes.
Tumors of Urinary System - Carcinoma - Kidney, UB, Prostate, Penis & Testes.
Uthamalingam Murali
 
Report Back from SGO: What’s New in Ovarian Cancer Research?
Report Back from SGO: What’s New in Ovarian Cancer Research?Report Back from SGO: What’s New in Ovarian Cancer Research?
Report Back from SGO: What’s New in Ovarian Cancer Research?
RheannaRandazzo
 

Efficient sharing of personal health records using encryption in cloud computing

  • 1. VISVESVARAYA TECHNOLOGICAL UNIVERSITY PHASE 1 “Efficient Sharing of Personal Health Records using Encryption in Cloud Computing” By, NAVEENA N 1BT12SCS08 Guide: Mrs. R VIDHYALAKSHMI Sr. Lecturer of CSE dept. B.T.L INSTITUTE OF TECHNOLOGY Department of Computer Science & Engineering 2013-14
  • 2. AGENDA oAbstract oPersonal Health Records in cloud computing oExisting system oDrawbacks oProposed System oModules oApplications oConclusion
  • 3. ABSTRACT  Personal health records (PHRs) grant patients access to a wide range of health information sources, best medical practices and health knowledge.  In patient centric secure sharing, patients will create, manage and control their personal health data from one place using the web.  Prior to storing the records in cloud server, they are encrypted using encryption algorithm which ensures the patient’s full control over their PHR.  Patients only decide which set of users can access which set of files.
  • 4. LITERATURE SURVEY  . J. Benaloh, “Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records,” → proposed a scheme in which a file can be uploaded without key distribution and it is highly efficient. But it is a single data owner scenario and thus it is not easy to add categories  Recently J. Hur and D. K. Noh in “Attribute-Based Revocation in Data Outsourcing Systems,” → proposed two CPABE schemes with immediate attribute revocation capability, instead of periodical revocation. However, they were not designed for Multi Authority Attribute Based Encryption (MAABE).
  • 5. EXISTING SYSTEM  Due to the high cost of building and maintaining specialized data centers, many PHR services are outsourced to or provided by third-party service providers, for example, Microsoft Health Vault.  The main concern is about whether the patients could actually control the sharing of their sensitive personal health information (PHI), especially when they are stored on a third-party server which people may not fully trust.
  • 6. OBJECTIVE  The main aim of the proposed system is to provide secure patient-centric PHR access and efficient key management at the same time.  The key idea is to divide the system into multiple security domains (namely, public domains (PUDs) and personal domains (PSDs)) according to the different users’ data access requirements.
  • 7. Architecture The proposed framework for patient-centric, secure and scalable PHR sharing on semi-trusted storage under multi-owner settings.
  • 9. Attribute Based Encryption (ABE)  In this scheme, users are categorized into personal and professional domains which greatly reduce the key management complexity.  There is a structured way to access the files for personal and professional purposes. Patients are able to dynamically modify the access policy and attributes.
  • 10. Attribute Based Encryption (ABE) Attribute Types in this System  Friends  Hospitals  Insurance  Emergency
  • 11. MODULES  PHR Owner Module  Attribute based Access Policy Module  Data confidentiality Module
  • 12.  PHR Owner Module  The key idea is to divide the system into multiple security domains (namely, public domains (PUDs) and personal domains (PSDs)) according to the different users’ data access requirements.  The PUDs consist of users who make access based on their professional roles, such as doctors, nurses and medical researchers.  For each PSD, its users are personally associated with a data owner (such as family members or close friends), and they make accesses to PHRs based on access rights assigned by the owner.
  • 13.  Attribute based Access Policy Module  Users having read and write access as data readers and contributors, respectively.  Dark boxes are the categories that a PSD’s data readers have access to.
  • 14.  Data confidentiality Module  The owners upload ABE-encrypted PHR files to the server.  Each owner’s PHR file is encrypted both under a certain fine grained and role-based access policy for users from the PUD to access.  Under a selected set of data attributes that allows access from users in the PSD. Only authorized users can decrypt the PHR files, excluding the server.
  • 15. ADVANTAGES Extensive analytical and experimental results are presented which shows  Data confidentiality  On-demand revocation  Write access control  Scalability and usability
  • 17. CONCLUSION  This paper proposed a novel framework of secure sharing of personal health records in cloud computing. Considering partially trustworthy cloud servers, argue that to fully realize the patientcentric concept, patients shall have complete control of their own privacy through encrypting their PHR files to allow fine-grained access.
  翻译: