SlideShare a Scribd company logo
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
Privacy-preserving Medical Treatment System through
Nondeterministic Finite Automata
Abstract:
Abstract—In this paper, we propose a privacy-preserving medical treatment system using
nondeterministic finite automata (NFA), hereafter referred to as P-Med, designed for remote
medical environment. P-Med makes use of the nondeterministic transition characteristic of NFA
to flexibly represent medical model, which includes illness states, treatment methods and state
transitions caused by exerting different treatment methods. A medical model is encrypted and
outsourced to cloud to deliver telemedicine service. Using P-Med, patient-centric diagnosis and
treatment can be made on-the-fly while protecting the confidentiality of patient’s illness states
and treatment recommendation results. Moreover, a new privacy-preserving NFA evaluation
method is given in P-Med to get a confidential match result for the evaluation of an encrypted
NFA and an encrypted data set, which avoids the cumbersome inner state transition
determination. We demonstrate that P-Med realizes treatment procedure recommendation
without privacy leakage to unauthorized parties. We conduct extensive experiments and analysis
to evaluate the efficiency.
Index Terms—Data security and privacy, medical treatment, nondeterministic finite automata,
secure outsourced computing.
Existing System:
The medical Internet of Things (mIoT) plays a critical role in distant medical diagnosis and
treatment by deploying wireless wearable (or implantable) sensors on a patient to collect the vital
signs and physiological data [2], [3]. The monitored physiological parameters are sent to hospital
for medical diagnosis, which supplies rich longitudinal health records than the brief illness
description. Using the detailed monitoring data, physicians can make a much better prognosis for
the patient and recommend treatment, early intervention and drug adjustment that are effective
for disease recovery.
The key factor for the accuracy of remote medical diagnosis and treatment is the physician’s
expertise and professional experience. A medical model is designed in accordance with objective
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
and measurable observation to provide clinically useful information about the course of the
illness over time and direct specific treatments for the condition, which plays a significant role in
regulating the treatment process and providing premium rate healthcare services.
Finite automata (FA) [4] is one of the mainstream technologies that can be used to represent
medical models. Compared with the flow diagram or block diagram based model, a FA-based
medical model has the advantage of regularized representation, flexibility in illness state
evaluation and good expansibility [5], [6]. FA can be categorized into two types: deterministic
finite automata (DFA) and nondeterministic finite automata (NFA). The term “deterministic” in
DFA means that it can only transit to one state at a time (i.e. for some given input);
“nondeterministic” in NFA means it can transit to multiple states at once. Hence, DFA can be
regarded as a special case of NFA; NFA is powerful to represent the nondeterministic state
transitions and allows empty string input (-move), which is more practical. NFA is a competent
modeling tool and applicable to various fields in practice, such as regular language processing,
program lexer, and medical modeling.
Proposed System:
we propose a privacy-preserving medical treatment system using NFA-based medical model,
hereafter referred to as P-Med. In a medical model, the illness states are expressed as the NFA
states; an illness state transition caused by a therapeutic intervention is expressed as an NFA
state transition; the diversity of therapeutic responses is expressed by exploring the
nondeterministic characteristic of NFA. To protect the privacy of the medical model, the NFA-
based model is encrypted and before it is outsourced to a cloud server for remote medical
service. In order to perform privacypreserving diagnosis and treatment, a patient uploads his or
her recent (e. g. several days of) illness states in encrypted form to the cloud server which
performs computations over encrypted data. Specifically, the proposed system achieves the
following
Privacy-preserving NFA evaluation. Privacy-preserving NFA evaluation is essential to realize
outsourced regular expression matching and pattern matching while without privacy leakage to
the cloud server which performs the computation: given an encrypted NFA model and an
encrypted set of symbols, the encrypted matching result is obtained through secure computation
over encrypted data. Since NFA may contain many states, transitions, loops and self-loops, the
challenge is to determine the inner state transitions caused by the input symbols in a privacy-
preserving way.
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
To overcome this disadvantage, we propose, for the first time, a secure NFA evaluation method
to eliminate the client-server interaction such that the inner state transition can be computed by
the server alone in a privacy-preserving way. P-Med converts the state transition problem into
string matching. It firstly traverses the NFA model to find the regular language. Then, an elegant
protocol is designed for privacy-preserving string matching and weight calculation (for weighted
NFA).
Secure automatic medical diagnosis on-the-fly. P-Med leverages privacy-preserving protocols to
calculate on patient’s encrypted illness states and healthcare provider’s encrypted NFA-based
medical model. Illness state match protocol helps to find the match state in the NFA-based
medical model according to patient’s multi-dimension quantitative physiological data monitored
by mIoT. Based on patient’s successive illness states, the condition of disease is diagnosed in the
cloud through secure outsourced computation.
Secure treatment procedure recommendation. In an NFA-based medical model, we assign a
weight to each state transition according to the therapeutic effect of the corresponding treatment
method, which is also encrypted before outsourcing. Based on the diagnosis result, P-Med
traverses all the possible treatment procedures and calculates a weighted recommendation for
each of them. Our secure best treatment procedure selection protocol chooses the top-k
recommended procedures, which preserves data privacy throughout the selection process.
Transparent operation for patient. P-Med does not require a patient to perform any complex pre-
processing before requesting remote medical service. The interaction between a patient and a
cloud server is simply a single round - the patient only needs to submit his or her illness states in
encrypted form and wait to get the best treatment procedure recommendation also in encrypted
form.
System Architecture:
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• PROCESSOR : I3.
• Hard Disk : 40 GB.
• Ram : 2 GB.
SOFTWARE REQUIREMENTS:
• Operating system : Windows.
• Coding Language : JAVA/J2EE
• Data Base : MYSQL
• IDE :Netbeans8.1

More Related Content

Similar to privacy preserving medical treatment system through nondeterministic finite automata

2016 Guardian TOS Sales Deck RAPT V2
2016 Guardian TOS Sales Deck RAPT V22016 Guardian TOS Sales Deck RAPT V2
2016 Guardian TOS Sales Deck RAPT V2
Michael Filewicz
 

Similar to privacy preserving medical treatment system through nondeterministic finite automata (20)

IRJET-Cloud Based Patient Referral System
IRJET-Cloud Based Patient Referral SystemIRJET-Cloud Based Patient Referral System
IRJET-Cloud Based Patient Referral System
 
CDM.pptx
CDM.pptxCDM.pptx
CDM.pptx
 
Framework architecture for improving
Framework architecture for improvingFramework architecture for improving
Framework architecture for improving
 
Patient Privacy Control for Health Care in Cloud Computing System
Patient Privacy Control for Health Care in Cloud Computing  SystemPatient Privacy Control for Health Care in Cloud Computing  System
Patient Privacy Control for Health Care in Cloud Computing System
 
Protecting Sensitive Data
Protecting Sensitive DataProtecting Sensitive Data
Protecting Sensitive Data
 
Metaverse Paving the way for Health 4.0
Metaverse Paving the way for Health 4.0Metaverse Paving the way for Health 4.0
Metaverse Paving the way for Health 4.0
 
risk management.pptx
risk management.pptxrisk management.pptx
risk management.pptx
 
Proposed Transport Protocols Suite for Wireless Medical Body Area Networks
Proposed Transport Protocols Suite for Wireless Medical Body Area NetworksProposed Transport Protocols Suite for Wireless Medical Body Area Networks
Proposed Transport Protocols Suite for Wireless Medical Body Area Networks
 
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKSPROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
 
Clinical Data Management
Clinical Data ManagementClinical Data Management
Clinical Data Management
 
Framework Architecture for Improving Healthcare Information Systems using Age...
Framework Architecture for Improving Healthcare Information Systems using Age...Framework Architecture for Improving Healthcare Information Systems using Age...
Framework Architecture for Improving Healthcare Information Systems using Age...
 
Health confidence HIS
Health confidence  HISHealth confidence  HIS
Health confidence HIS
 
2016 Guardian TOS Sales Deck RAPT V2
2016 Guardian TOS Sales Deck RAPT V22016 Guardian TOS Sales Deck RAPT V2
2016 Guardian TOS Sales Deck RAPT V2
 
Intelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIntelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosis
 
Healthcare brochure
Healthcare brochureHealthcare brochure
Healthcare brochure
 
A Secure Decision Making Process in Health Care System Using Naive Bayes Clas...
A Secure Decision Making Process in Health Care System Using Naive Bayes Clas...A Secure Decision Making Process in Health Care System Using Naive Bayes Clas...
A Secure Decision Making Process in Health Care System Using Naive Bayes Clas...
 
IRJET - E-Health Chain and Anticipation of Future Disease
IRJET - E-Health Chain and Anticipation of Future DiseaseIRJET - E-Health Chain and Anticipation of Future Disease
IRJET - E-Health Chain and Anticipation of Future Disease
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
 
Hospital AES computer science networks.pptx
Hospital AES computer science networks.pptxHospital AES computer science networks.pptx
Hospital AES computer science networks.pptx
 

More from Venkat Projects

More from Venkat Projects (20)

1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
 
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
 
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
 
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
 
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
 
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docxImage Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
 
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
 
WATERMARKING IMAGES
WATERMARKING IMAGESWATERMARKING IMAGES
WATERMARKING IMAGES
 
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
 
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...
 
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
 
2022 PYTHON MAJOR PROJECTS LIST.docx
2022 PYTHON MAJOR  PROJECTS LIST.docx2022 PYTHON MAJOR  PROJECTS LIST.docx
2022 PYTHON MAJOR PROJECTS LIST.docx
 
2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx
 
2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx
 
2021 python projects list
2021 python projects list2021 python projects list
2021 python projects list
 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni
 
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
 
6.iris recognition using machine learning technique
6.iris recognition using machine learning technique6.iris recognition using machine learning technique
6.iris recognition using machine learning technique
 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster
 

Recently uploaded

Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
Avinash Rai
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
SaadHumayun7
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 

privacy preserving medical treatment system through nondeterministic finite automata

  • 1. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata Abstract: Abstract—In this paper, we propose a privacy-preserving medical treatment system using nondeterministic finite automata (NFA), hereafter referred to as P-Med, designed for remote medical environment. P-Med makes use of the nondeterministic transition characteristic of NFA to flexibly represent medical model, which includes illness states, treatment methods and state transitions caused by exerting different treatment methods. A medical model is encrypted and outsourced to cloud to deliver telemedicine service. Using P-Med, patient-centric diagnosis and treatment can be made on-the-fly while protecting the confidentiality of patient’s illness states and treatment recommendation results. Moreover, a new privacy-preserving NFA evaluation method is given in P-Med to get a confidential match result for the evaluation of an encrypted NFA and an encrypted data set, which avoids the cumbersome inner state transition determination. We demonstrate that P-Med realizes treatment procedure recommendation without privacy leakage to unauthorized parties. We conduct extensive experiments and analysis to evaluate the efficiency. Index Terms—Data security and privacy, medical treatment, nondeterministic finite automata, secure outsourced computing. Existing System: The medical Internet of Things (mIoT) plays a critical role in distant medical diagnosis and treatment by deploying wireless wearable (or implantable) sensors on a patient to collect the vital signs and physiological data [2], [3]. The monitored physiological parameters are sent to hospital for medical diagnosis, which supplies rich longitudinal health records than the brief illness description. Using the detailed monitoring data, physicians can make a much better prognosis for the patient and recommend treatment, early intervention and drug adjustment that are effective for disease recovery. The key factor for the accuracy of remote medical diagnosis and treatment is the physician’s expertise and professional experience. A medical model is designed in accordance with objective
  • 2. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com and measurable observation to provide clinically useful information about the course of the illness over time and direct specific treatments for the condition, which plays a significant role in regulating the treatment process and providing premium rate healthcare services. Finite automata (FA) [4] is one of the mainstream technologies that can be used to represent medical models. Compared with the flow diagram or block diagram based model, a FA-based medical model has the advantage of regularized representation, flexibility in illness state evaluation and good expansibility [5], [6]. FA can be categorized into two types: deterministic finite automata (DFA) and nondeterministic finite automata (NFA). The term “deterministic” in DFA means that it can only transit to one state at a time (i.e. for some given input); “nondeterministic” in NFA means it can transit to multiple states at once. Hence, DFA can be regarded as a special case of NFA; NFA is powerful to represent the nondeterministic state transitions and allows empty string input (-move), which is more practical. NFA is a competent modeling tool and applicable to various fields in practice, such as regular language processing, program lexer, and medical modeling. Proposed System: we propose a privacy-preserving medical treatment system using NFA-based medical model, hereafter referred to as P-Med. In a medical model, the illness states are expressed as the NFA states; an illness state transition caused by a therapeutic intervention is expressed as an NFA state transition; the diversity of therapeutic responses is expressed by exploring the nondeterministic characteristic of NFA. To protect the privacy of the medical model, the NFA- based model is encrypted and before it is outsourced to a cloud server for remote medical service. In order to perform privacypreserving diagnosis and treatment, a patient uploads his or her recent (e. g. several days of) illness states in encrypted form to the cloud server which performs computations over encrypted data. Specifically, the proposed system achieves the following Privacy-preserving NFA evaluation. Privacy-preserving NFA evaluation is essential to realize outsourced regular expression matching and pattern matching while without privacy leakage to the cloud server which performs the computation: given an encrypted NFA model and an encrypted set of symbols, the encrypted matching result is obtained through secure computation over encrypted data. Since NFA may contain many states, transitions, loops and self-loops, the challenge is to determine the inner state transitions caused by the input symbols in a privacy- preserving way.
  • 3. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com To overcome this disadvantage, we propose, for the first time, a secure NFA evaluation method to eliminate the client-server interaction such that the inner state transition can be computed by the server alone in a privacy-preserving way. P-Med converts the state transition problem into string matching. It firstly traverses the NFA model to find the regular language. Then, an elegant protocol is designed for privacy-preserving string matching and weight calculation (for weighted NFA). Secure automatic medical diagnosis on-the-fly. P-Med leverages privacy-preserving protocols to calculate on patient’s encrypted illness states and healthcare provider’s encrypted NFA-based medical model. Illness state match protocol helps to find the match state in the NFA-based medical model according to patient’s multi-dimension quantitative physiological data monitored by mIoT. Based on patient’s successive illness states, the condition of disease is diagnosed in the cloud through secure outsourced computation. Secure treatment procedure recommendation. In an NFA-based medical model, we assign a weight to each state transition according to the therapeutic effect of the corresponding treatment method, which is also encrypted before outsourcing. Based on the diagnosis result, P-Med traverses all the possible treatment procedures and calculates a weighted recommendation for each of them. Our secure best treatment procedure selection protocol chooses the top-k recommended procedures, which preserves data privacy throughout the selection process. Transparent operation for patient. P-Med does not require a patient to perform any complex pre- processing before requesting remote medical service. The interaction between a patient and a cloud server is simply a single round - the patient only needs to submit his or her illness states in encrypted form and wait to get the best treatment procedure recommendation also in encrypted form. System Architecture:
  • 4. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • PROCESSOR : I3. • Hard Disk : 40 GB. • Ram : 2 GB. SOFTWARE REQUIREMENTS: • Operating system : Windows. • Coding Language : JAVA/J2EE • Data Base : MYSQL • IDE :Netbeans8.1