23
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute based-Encryption

Scalable and secure sharing of personal health records

Embed Size (px)

DESCRIPTION

Scalable and Secure sharing of personal health records

Citation preview

Page 1: Scalable and secure sharing of personal health records

Scalable and Secure Sharing of Personal Health Records

in Cloud Computing using Attribute based-Encryption

Page 2: Scalable and secure sharing of personal health records

BYM. Swathi

Page 3: Scalable and secure sharing of personal health records

OUTLINE• What is Cloud Computing?• What is the use of it?• What is attribute-based encryption?• Introduction.• Existing system and its disadvantages.• Proposed system and its advantages.• Hardware requirements.• Software requirements.• Use case diagrams.• Conclusion.

Page 4: Scalable and secure sharing of personal health records

• Cloud Computing consists of hardware and

software resources made available on the Internet as managed third-party services.

• These services are typically provide access to advanced software applications and high-end

networks of server computers.

What is Cloud Computing?

Page 5: Scalable and secure sharing of personal health records

What is the use of it?

• There are a number of reasons why cloud computing is so widely used among

businesses today some are: Reduction of cost. Universal access. Flexibility.

Page 6: Scalable and secure sharing of personal health records

Examples of Cloud Computing

• Many popular social networking sites such as FaCeBoOk, PiCaSa, and YoUtUbE are also often considered parts of cloud computing.

Page 7: Scalable and secure sharing of personal health records

What is Attribute-based Encryption

• It is a type of public - key encryption in which the secret key of a user and the

cipher text are dependent upon attributes (e.g. the country he lives, the subscriber

he uses). • In such a system , the decryption of a

cipher text is possible only if the set of attributes of the user key matches the

attributes of the cipher text.

Page 8: Scalable and secure sharing of personal health records

Introduction

• This webpage is to secure the personal and medical information of the

patient using encryption.• Here we have an option of visibility... that means we can access the permission

for particular member to visit or to see the status of the person(patient), that is

nothing but ACCESS POLICY.

Page 9: Scalable and secure sharing of personal health records
Page 10: Scalable and secure sharing of personal health records

Existing system

• The existing system stores the information in files.• That is personal and medical information.• The entire details about the user or patient are stored, in written type or any printed papers.• By this we may face many.

Page 11: Scalable and secure sharing of personal health records

Disadvantages

• By storing the information in files it can be exposed to the third party or unauthorized

parties.• By secretly any one can access it this is the

main disadvantage of the existing system.• It occupies more space.

• High cost as it requires more space to store the files.

Page 12: Scalable and secure sharing of personal health records

Proposed system

• Here we use system memory to store the personal and medical information of the

person.• Here we use one technique to avoid risk like

accessing the information of the particular person via network analysis and that is

ATTRIBUTE –BASED ENCRYPTION.

Page 13: Scalable and secure sharing of personal health records

Advantages

• No can access the information of a person as it is encrypted by a secret key.

• To see any report about the person … him self should login into the webpage and

access the information.• Every user as unique user name and

password that is known only to him.•User as an option to access the information

for whom ever he needed.

Page 14: Scalable and secure sharing of personal health records

Access Policy

Page 15: Scalable and secure sharing of personal health records

Hardware Requirements

Speed - 1.1 Ghz RAM - 256 MB(min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Processor - Pentium-III Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA

Page 16: Scalable and secure sharing of personal health records

Software Requirements

Operating System :Windows95 /98/2000/XPApplication Server : Tomcat5.0Front End : Java, JSPDatabase : MYSQL

Page 17: Scalable and secure sharing of personal health records

Use Case Diagrams

admin

stri ng usernamestring password

login()

doctors

string unamestring password

login()view patients()enter treatment details()

patient

string usernamestring password

registration()login()

user

string unamestring pswd

search disease()login()registrations()

Class Diagram:

Page 18: Scalable and secure sharing of personal health records

registration

login

view old treatments

patients

enter disease details

Use Case Diagram:

Use Case Diagram

of Patient

Page 19: Scalable and secure sharing of personal health records

login

view patient details

Doctors

enter treatment details

Use Case Diagram:

Use Case Diagram of Doctor

Page 20: Scalable and secure sharing of personal health records

admin doctor patient users treatments

add doctors

view doctors

view patient details

view user details

enter treatments

search and view treatments

search and view treatments

Sequence Diagram:

Page 21: Scalable and secure sharing of personal health records

Home Page

Page 22: Scalable and secure sharing of personal health records

Conclusion

All patient data should be gathered and accessible through one system.

A PHR applies health information technology to your personal life to improve safety, reduces medical errors, reduces gaps

in communication and reduce delays in receiving proper care.

Page 23: Scalable and secure sharing of personal health records

Thank you