+ All Categories
Home > Engineering > Scalable and secure sharing of public health record using attribute based Encryption

Scalable and secure sharing of public health record using attribute based Encryption

Date post: 15-Jul-2015
Category:
Upload: shreyank-byadagi
View: 230 times
Download: 1 times
Share this document with a friend
Popular Tags:
29
SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING ATTRIBUTE BASED ENCRYPTION By Shreyank M. Byadagi Email:[email protected]
Transcript
Page 1: Scalable and secure sharing of public health record using attribute based Encryption

SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING

ATTRIBUTE BASED ENCRYPTION

ByShreyank M. ByadagiEmail:[email protected]

Page 2: Scalable and secure sharing of public health record using attribute based Encryption

AGENDA:

1. Objectives of project.

2. Problem definition.

3. Literature survey.

4. Methodology.

5. Applications.

6. Implementation carried out.

7. References.

Page 3: Scalable and secure sharing of public health record using attribute based Encryption

OBJECTIVES:

• The main aim of this system is to provide secure patient-centric PHR access and efficient key management at the same time.

• The key idea is to divide the system into multiple security domains according to the different users’ data access requirements.

Page 4: Scalable and secure sharing of public health record using attribute based Encryption

PROBLEM DEFINITION:

Personal health record(PHR) is meant for health information exchange , this data is outsourced for maintenance like cloud providers.

CHALLENGES :

• PHR data is prone to unauthorized access.

• Access needs to be secure.

OUR SOLUTION:

• Attribute Based Encryption(ABE) techniques are used to encrypt patient’s PHR file.

• A high degree of patient privacy guaranteed.

Page 5: Scalable and secure sharing of public health record using attribute based Encryption

LITERATURE SURVEY:

• J. Benaloh, proposed a scheme “Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records,” in which a file can be uploaded without key distribution and it is highly efficient.

• J. Hur and D. K. Noh proposed a scheme “Attribute-Based Revocation in Data Outsourcing Systems” with immediate capability, instead of periodical revocation.

Page 6: Scalable and secure sharing of public health record using attribute based Encryption

SYSTEM FLOW DIAGRAM:

Page 7: Scalable and secure sharing of public health record using attribute based Encryption

ARCHITECTURE:

Page 8: Scalable and secure sharing of public health record using attribute based Encryption

ER-Diagram:

Page 9: Scalable and secure sharing of public health record using attribute based Encryption

EXISTING SYSTEM:

• Due to the high cost of building and maintaining specialized data centers, many PHR services are outsourced .

• The main concern is about whether the patients could actually control the sharing of their sensitive personal health information (PHI), especially when they are stored on a third-party server which people may not fully trust.

Page 10: Scalable and secure sharing of public health record using attribute based Encryption

EXISTING SYSTEM(Contd…):Hey, I got it !!Lets modify &

send!!!

Page 11: Scalable and secure sharing of public health record using attribute based Encryption

PROPOSED SYSTEM:

• It is the promising method to encrypt the PHRs before outsourcing.

• Risks of privacy exposure , scalability in key management , flexible access are important challenges towards data access control.

• Attribute Based Encryption(ABE) techniques are used to encrypt patient’s PHR file.

Page 12: Scalable and secure sharing of public health record using attribute based Encryption

PROPOSED SYSTEM (Contd…):????????????

?

Encryption using ABE

Page 13: Scalable and secure sharing of public health record using attribute based Encryption

ALGORITHMS:

• Advanced Encryption Standard(AES)

• Message Digest5(MD5)

Page 14: Scalable and secure sharing of public health record using attribute based Encryption

ADVANCED ENCRYPTION STANDARD:

• Step1:Substitute bytes.

• Step2. Shift rows.

• Step3. Mix Columns.

• Step4. Add Round Key

Page 15: Scalable and secure sharing of public health record using attribute based Encryption

Step1: SUBSTITUTE BYTES:

Page 16: Scalable and secure sharing of public health record using attribute based Encryption

Contd….

Page 17: Scalable and secure sharing of public health record using attribute based Encryption

Step2:SHIFT ROW TRANSFORMATION:

Page 18: Scalable and secure sharing of public health record using attribute based Encryption

Step3:MIX COLUMN TRANSFORMATION:

Page 19: Scalable and secure sharing of public health record using attribute based Encryption

STEP4:ADD ROUND KEY:

Page 20: Scalable and secure sharing of public health record using attribute based Encryption

MESSAGE DIGEST5(MD5):

• Step1: Append padding bits: Message is pad so its length is 448 mod 512

• Step2: Append Length Append a 64-bit length value to message Generate a message with 512 bits in length

• Step3: Initialize MD buffer Initialize a 4-word (128-bit) MD buffer (A, B, C, D)

Word A: 01 23 45 67 Word B: 89 AB CD EF Word C: FE DC BA 98Word D: 76 54 32 10

• Step4: Process Message in 16-word block Process message in 16-word (512-bit) blocks

• Step5: Output

Page 21: Scalable and secure sharing of public health record using attribute based Encryption

Difference B/W:

Existing System:

1. Expensive to maintain many PHR services.

2. Patient rejects to share his PHI as it is stored in third party server.

Proposed System:

1. Inexpensive to create and maintain PHR services.

2. Patient shares his PHI as it is encrypted using ABE technique before it is stored in third party server.

Page 22: Scalable and secure sharing of public health record using attribute based Encryption

ATTRIBUTE BASED ENCRYPTION(ABE):

Page 23: Scalable and secure sharing of public health record using attribute based Encryption

APPLICATIONS:

• Hospital Management.

• Health Care Website.

Page 24: Scalable and secure sharing of public health record using attribute based Encryption

MODULES:

• PHR Owner module

• Cloud Server Module

• Attribute based Access Policy Module

• Data confidentiality Module

Front end of our project is prepared with the help of JSP.

Page 25: Scalable and secure sharing of public health record using attribute based Encryption

REQUIREMENTS:

HARDWARE REQUIREMENTS:-

• Processor - Pentium –III

• Speed - 1.1 Ghz

• RAM - 256 MB(min)

• Hard Disk - 20 GB

• Floppy Drive - 1.44 MB

• Key Board - Standard Windows Keyboard

• Mouse - Two or Three Button Mouse

• Monitor - SVGA

Page 26: Scalable and secure sharing of public health record using attribute based Encryption

REQUIREMENTS(CONTD..)

SOFTWARE REQUIREMENTS:-

• Operating System : Windows95/98/2000/XP

• TOOL USED : ECLIPSE

• Front End : JAVA

Page 27: Scalable and secure sharing of public health record using attribute based Encryption

REFERENCES:

• M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings”.

• H. Lohr, A.-R. Sadeghi, and M. Winandy, “Securing the e-health cloud”.

• “The health insurance portability and accountability act”.

Page 28: Scalable and secure sharing of public health record using attribute based Encryption

ANY SUGGESTIONS??

Page 29: Scalable and secure sharing of public health record using attribute based Encryption

THANK YOU!!!!


Recommended