Scalable and secure sharing of public health record using attribute based Encryption
-
Upload
shreyank-byadagi -
Category
Engineering
-
view
236 -
download
1
Transcript of Scalable and secure sharing of public health record using attribute based Encryption
![Page 1: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/1.jpg)
SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING
ATTRIBUTE BASED ENCRYPTION
ByShreyank M. ByadagiEmail:[email protected]
![Page 2: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/2.jpg)
AGENDA:
1. Objectives of project.
2. Problem definition.
3. Literature survey.
4. Methodology.
5. Applications.
6. Implementation carried out.
7. References.
![Page 3: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/3.jpg)
OBJECTIVES:
• The main aim of this system is to provide secure patient-centric PHR access and efficient key management at the same time.
• The key idea is to divide the system into multiple security domains according to the different users’ data access requirements.
![Page 4: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/4.jpg)
PROBLEM DEFINITION:
Personal health record(PHR) is meant for health information exchange , this data is outsourced for maintenance like cloud providers.
CHALLENGES :
• PHR data is prone to unauthorized access.
• Access needs to be secure.
OUR SOLUTION:
• Attribute Based Encryption(ABE) techniques are used to encrypt patient’s PHR file.
• A high degree of patient privacy guaranteed.
![Page 5: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/5.jpg)
LITERATURE SURVEY:
• J. Benaloh, proposed a scheme “Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records,” in which a file can be uploaded without key distribution and it is highly efficient.
• J. Hur and D. K. Noh proposed a scheme “Attribute-Based Revocation in Data Outsourcing Systems” with immediate capability, instead of periodical revocation.
![Page 6: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/6.jpg)
SYSTEM FLOW DIAGRAM:
![Page 7: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/7.jpg)
ARCHITECTURE:
![Page 8: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/8.jpg)
ER-Diagram:
![Page 9: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/9.jpg)
EXISTING SYSTEM:
• Due to the high cost of building and maintaining specialized data centers, many PHR services are outsourced .
• The main concern is about whether the patients could actually control the sharing of their sensitive personal health information (PHI), especially when they are stored on a third-party server which people may not fully trust.
![Page 10: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/10.jpg)
EXISTING SYSTEM(Contd…):Hey, I got it !!Lets modify &
send!!!
![Page 11: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/11.jpg)
PROPOSED SYSTEM:
• It is the promising method to encrypt the PHRs before outsourcing.
• Risks of privacy exposure , scalability in key management , flexible access are important challenges towards data access control.
• Attribute Based Encryption(ABE) techniques are used to encrypt patient’s PHR file.
![Page 12: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/12.jpg)
PROPOSED SYSTEM (Contd…):????????????
?
Encryption using ABE
![Page 13: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/13.jpg)
ALGORITHMS:
• Advanced Encryption Standard(AES)
• Message Digest5(MD5)
![Page 14: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/14.jpg)
ADVANCED ENCRYPTION STANDARD:
• Step1:Substitute bytes.
• Step2. Shift rows.
• Step3. Mix Columns.
• Step4. Add Round Key
![Page 15: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/15.jpg)
Step1: SUBSTITUTE BYTES:
![Page 16: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/16.jpg)
Contd….
![Page 17: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/17.jpg)
Step2:SHIFT ROW TRANSFORMATION:
![Page 18: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/18.jpg)
Step3:MIX COLUMN TRANSFORMATION:
![Page 19: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/19.jpg)
STEP4:ADD ROUND KEY:
![Page 20: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/20.jpg)
MESSAGE DIGEST5(MD5):
• Step1: Append padding bits: Message is pad so its length is 448 mod 512
• Step2: Append Length Append a 64-bit length value to message Generate a message with 512 bits in length
• Step3: Initialize MD buffer Initialize a 4-word (128-bit) MD buffer (A, B, C, D)
Word A: 01 23 45 67 Word B: 89 AB CD EF Word C: FE DC BA 98Word D: 76 54 32 10
• Step4: Process Message in 16-word block Process message in 16-word (512-bit) blocks
• Step5: Output
![Page 21: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/21.jpg)
Difference B/W:
Existing System:
1. Expensive to maintain many PHR services.
2. Patient rejects to share his PHI as it is stored in third party server.
Proposed System:
1. Inexpensive to create and maintain PHR services.
2. Patient shares his PHI as it is encrypted using ABE technique before it is stored in third party server.
![Page 22: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/22.jpg)
ATTRIBUTE BASED ENCRYPTION(ABE):
![Page 23: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/23.jpg)
APPLICATIONS:
• Hospital Management.
• Health Care Website.
![Page 24: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/24.jpg)
MODULES:
• PHR Owner module
• Cloud Server Module
• Attribute based Access Policy Module
• Data confidentiality Module
Front end of our project is prepared with the help of JSP.
![Page 25: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/25.jpg)
REQUIREMENTS:
HARDWARE REQUIREMENTS:-
• Processor - Pentium –III
• Speed - 1.1 Ghz
• RAM - 256 MB(min)
• Hard Disk - 20 GB
• Floppy Drive - 1.44 MB
• Key Board - Standard Windows Keyboard
• Mouse - Two or Three Button Mouse
• Monitor - SVGA
![Page 26: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/26.jpg)
REQUIREMENTS(CONTD..)
SOFTWARE REQUIREMENTS:-
• Operating System : Windows95/98/2000/XP
• TOOL USED : ECLIPSE
• Front End : JAVA
![Page 27: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/27.jpg)
REFERENCES:
• M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings”.
• H. Lohr, A.-R. Sadeghi, and M. Winandy, “Securing the e-health cloud”.
• “The health insurance portability and accountability act”.
![Page 28: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/28.jpg)
ANY SUGGESTIONS??
![Page 29: Scalable and secure sharing of public health record using attribute based Encryption](https://reader034.fdocuments.us/reader034/viewer/2022052213/55a5c59c1a28abe16d8b4612/html5/thumbnails/29.jpg)
THANK YOU!!!!