Upload
colourswathi
View
484
Download
0
Embed Size (px)
DESCRIPTION
Scalable and Secure sharing of personal health records
Citation preview
Scalable and Secure Sharing of Personal Health Records
in Cloud Computing using Attribute based-Encryption
BYM. Swathi
OUTLINE• What is Cloud Computing?• What is the use of it?• What is attribute-based encryption?• Introduction.• Existing system and its disadvantages.• Proposed system and its advantages.• Hardware requirements.• Software requirements.• Use case diagrams.• Conclusion.
• Cloud Computing consists of hardware and
software resources made available on the Internet as managed third-party services.
• These services are typically provide access to advanced software applications and high-end
networks of server computers.
What is Cloud Computing?
What is the use of it?
• There are a number of reasons why cloud computing is so widely used among
businesses today some are: Reduction of cost. Universal access. Flexibility.
Examples of Cloud Computing
• Many popular social networking sites such as FaCeBoOk, PiCaSa, and YoUtUbE are also often considered parts of cloud computing.
What is Attribute-based Encryption
• It is a type of public - key encryption in which the secret key of a user and the
cipher text are dependent upon attributes (e.g. the country he lives, the subscriber
he uses). • In such a system , the decryption of a
cipher text is possible only if the set of attributes of the user key matches the
attributes of the cipher text.
Introduction
• This webpage is to secure the personal and medical information of the
patient using encryption.• Here we have an option of visibility... that means we can access the permission
for particular member to visit or to see the status of the person(patient), that is
nothing but ACCESS POLICY.
Existing system
• The existing system stores the information in files.• That is personal and medical information.• The entire details about the user or patient are stored, in written type or any printed papers.• By this we may face many.
Disadvantages
• By storing the information in files it can be exposed to the third party or unauthorized
parties.• By secretly any one can access it this is the
main disadvantage of the existing system.• It occupies more space.
• High cost as it requires more space to store the files.
Proposed system
• Here we use system memory to store the personal and medical information of the
person.• Here we use one technique to avoid risk like
accessing the information of the particular person via network analysis and that is
ATTRIBUTE –BASED ENCRYPTION.
Advantages
• No can access the information of a person as it is encrypted by a secret key.
• To see any report about the person … him self should login into the webpage and
access the information.• Every user as unique user name and
password that is known only to him.•User as an option to access the information
for whom ever he needed.
Access Policy
Hardware Requirements
Speed - 1.1 Ghz RAM - 256 MB(min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Processor - Pentium-III Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA
Software Requirements
Operating System :Windows95 /98/2000/XPApplication Server : Tomcat5.0Front End : Java, JSPDatabase : MYSQL
Use Case Diagrams
admin
stri ng usernamestring password
login()
doctors
string unamestring password
login()view patients()enter treatment details()
patient
string usernamestring password
registration()login()
user
string unamestring pswd
search disease()login()registrations()
Class Diagram:
registration
login
view old treatments
patients
enter disease details
Use Case Diagram:
Use Case Diagram
of Patient
login
view patient details
Doctors
enter treatment details
Use Case Diagram:
Use Case Diagram of Doctor
admin doctor patient users treatments
add doctors
view doctors
view patient details
view user details
enter treatments
search and view treatments
search and view treatments
Sequence Diagram:
Home Page
Conclusion
All patient data should be gathered and accessible through one system.
A PHR applies health information technology to your personal life to improve safety, reduces medical errors, reduces gaps
in communication and reduce delays in receiving proper care.
Thank you