SlideShare a Scribd company logo
1 of 13
Abstract
 Electronic healthcare (eHealth) systems have replaced paper-based
medical systems due to the attractive features such as universal
accessibility, high accuracy, and low cost.
 As a major component of eHealth systems, mobile healthcare (mHealth)
applies mobile devices, such as smartphones and tablets, to enable patient-
to-physician and patient-to-patient communications for better healthcare
and quality of life (QoL).
 Unfortunately, patients’ concerns on potential leakage of personal health
records (PHRs) is the biggest stumbling block. In current eHealth/mHealth
networks, patients’ medical records are usually associated with a set of
attributes like existing symptoms and undergoing treatments based on the
information collected from portable devices.
 To guarantee the authenticity of those attributes, PHRs should be
verifiable.
 However, due to the link ability between identities and PHRs, existing
mHealth systems fail to preserve patient identity privacy while
providing medical services.
 To solve this problem, we propose a decentralized system that leverages
users’ verifiable attributes to authenticate each other while preserving
attribute and identity privacy.
ABOUT THE SYSTEM
 Here, we endeavor to study the patientcentric, secure sharing of PHRs
stored on semi-trusted servers, and focus on addressing the
complicated and challenging key management issues.
 In order to protect the personal health data stored on a semi-trusted
server, we adopt attribute-based encryption (ABE) as the main
encryption primitive.
 Using ABE, access policies are expressed based on the attributes of
users or data, which enables a patient to selectively share her PHR
among a set of users by encrypting the file under a set of attributes,
without the need to know a complete list of users.
 The complexities per encryption, key generation and decryption are
only linear with the number of attributes involved.
 However, to integrate ABE into a large-scale PHR system, important
issues such as key management scalability, dynamic policy updates,
and efficient on-demand revocation are non-trivial to solve, and
remain largely open up-to-date.
There are several main additional contributions:
 (1) We clarify and extend our usage of MA-ABE in the public domain,
and formally show how and which types of user-defined file access
policies are realized.
 (2) We clarify the proposed revocable MA-ABE scheme, and provide a
formal security proof for it.
 (3) We carry out both real-world experiments and simulations to
evaluate the performance of the proposed solution in this paper.
SYSTEM ARCHITECTURE
 WIDELY deployed electronic healthcare (eHealth) systems have improved
people’s daily life compared with traditional paper-based systems for its
extraordinary advantages, such as higher efficiency, better accuracy, and
broader availability.
 For most mHealth systems, patients use sensors, implantable medical devices
(IMDs), and mobile phones to collect personal health records (PHRs), then
send medical data to the designated healthcare infrastructure to obtain
physicians’ diagnosis via wireless interfaces.
 Possible solution leads us to consider the possibility of separating multiple
attributes from a single identity, and allows users to mutually authenticate each
other using their attributes
SYSTEM DESIGN
A.DATA FLOW DIAGRAM
B.USE CASE DIAGRAM
CONCLUSION
 we have proposed a novel framework of secure sharing of personal
health records in cloud computing.
 Considering partially trustworthy cloud servers, we argue that to fully
realize the patient-centric concept, patients shall have complete
control of their own privacy through encrypting their PHR files to allow
fine-grained access.
 The framework addresses the unique challenges brought by multiple
PHR owners and users, in that we greatly reduce the complexity of key
management while enhance the privacy guarantees compared with
previous works.
 Furthermore, we enhance an existing MA-ABE scheme to handle
efficient and on-demand user revocation, and prove its security.
Through implementation and simulation, we show that our solution is
both scalable and efficient.
THANK YOU

More Related Content

What's hot

Health Application Integration with (Electronic Health Records) EHR systems
Health Application Integration with (Electronic Health Records) EHR systemsHealth Application Integration with (Electronic Health Records) EHR systems
Health Application Integration with (Electronic Health Records) EHR systemsFaichi Solutions
 
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoTIntegration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoTzaman174
 
HITECH Health IT Legislation: Opportunities for the DMAA Community
HITECH Health IT Legislation: Opportunities for the DMAA CommunityHITECH Health IT Legislation: Opportunities for the DMAA Community
HITECH Health IT Legislation: Opportunities for the DMAA CommunityVince Kuraitis
 
CORAnet challenge presentation v2
CORAnet   challenge presentation v2CORAnet   challenge presentation v2
CORAnet challenge presentation v2Jonathan Chashper
 
Universal Identity Management Model Based on Anonymous Credentilals
Universal Identity Management Model Based on Anonymous CredentilalsUniversal Identity Management Model Based on Anonymous Credentilals
Universal Identity Management Model Based on Anonymous CredentilalsRatheesh Kumar R
 
FHIR Adoption Framework for Payers
FHIR Adoption Framework for PayersFHIR Adoption Framework for Payers
FHIR Adoption Framework for PayersCitiusTech
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health recordsHealth62
 
7 PROVEN REASONS THAT SHOWS YOU WHY FHIR IS BETTER
7 PROVEN REASONS THAT SHOWS YOU WHY FHIR IS BETTER7 PROVEN REASONS THAT SHOWS YOU WHY FHIR IS BETTER
7 PROVEN REASONS THAT SHOWS YOU WHY FHIR IS BETTERThiyagu2
 
EMR and EDC Integration
EMR and EDC IntegrationEMR and EDC Integration
EMR and EDC IntegrationClinCapture
 
Mobile monday mhealth
Mobile monday mhealthMobile monday mhealth
Mobile monday mhealthJoe Drumgoole
 
SureScripts PowerPoint Template and Network Diagram
SureScripts PowerPoint Template and Network DiagramSureScripts PowerPoint Template and Network Diagram
SureScripts PowerPoint Template and Network DiagramModicum
 
Patient Data Exchange Server
Patient Data Exchange ServerPatient Data Exchange Server
Patient Data Exchange Serverwatchdog
 
BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf Mark Scrimshire
 
Medical management system brochure
Medical management system brochureMedical management system brochure
Medical management system brochureMai Mahfouz
 
CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...
CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...
CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...Mark Scrimshire
 
Scalable and secure sharing of personal health
Scalable and secure sharing of personal healthScalable and secure sharing of personal health
Scalable and secure sharing of personal healthIMPULSE_TECHNOLOGY
 
Enhancing EMR Systems Using Cloud
Enhancing EMR Systems Using CloudEnhancing EMR Systems Using Cloud
Enhancing EMR Systems Using CloudEMMAIntl
 

What's hot (20)

Health Application Integration with (Electronic Health Records) EHR systems
Health Application Integration with (Electronic Health Records) EHR systemsHealth Application Integration with (Electronic Health Records) EHR systems
Health Application Integration with (Electronic Health Records) EHR systems
 
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoTIntegration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
 
MU3 Certification Handbook - Nalashaa Experiences
MU3 Certification Handbook - Nalashaa ExperiencesMU3 Certification Handbook - Nalashaa Experiences
MU3 Certification Handbook - Nalashaa Experiences
 
HITECH Health IT Legislation: Opportunities for the DMAA Community
HITECH Health IT Legislation: Opportunities for the DMAA CommunityHITECH Health IT Legislation: Opportunities for the DMAA Community
HITECH Health IT Legislation: Opportunities for the DMAA Community
 
CORAnet challenge presentation v2
CORAnet   challenge presentation v2CORAnet   challenge presentation v2
CORAnet challenge presentation v2
 
Universal Identity Management Model Based on Anonymous Credentilals
Universal Identity Management Model Based on Anonymous CredentilalsUniversal Identity Management Model Based on Anonymous Credentilals
Universal Identity Management Model Based on Anonymous Credentilals
 
Aligning it
Aligning itAligning it
Aligning it
 
FHIR Adoption Framework for Payers
FHIR Adoption Framework for PayersFHIR Adoption Framework for Payers
FHIR Adoption Framework for Payers
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health records
 
7 PROVEN REASONS THAT SHOWS YOU WHY FHIR IS BETTER
7 PROVEN REASONS THAT SHOWS YOU WHY FHIR IS BETTER7 PROVEN REASONS THAT SHOWS YOU WHY FHIR IS BETTER
7 PROVEN REASONS THAT SHOWS YOU WHY FHIR IS BETTER
 
EMR and EDC Integration
EMR and EDC IntegrationEMR and EDC Integration
EMR and EDC Integration
 
Mobile monday mhealth
Mobile monday mhealthMobile monday mhealth
Mobile monday mhealth
 
SureScripts PowerPoint Template and Network Diagram
SureScripts PowerPoint Template and Network DiagramSureScripts PowerPoint Template and Network Diagram
SureScripts PowerPoint Template and Network Diagram
 
arocya.com - Healthcare USP
arocya.com - Healthcare USParocya.com - Healthcare USP
arocya.com - Healthcare USP
 
Patient Data Exchange Server
Patient Data Exchange ServerPatient Data Exchange Server
Patient Data Exchange Server
 
BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf
 
Medical management system brochure
Medical management system brochureMedical management system brochure
Medical management system brochure
 
CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...
CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...
CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...
 
Scalable and secure sharing of personal health
Scalable and secure sharing of personal healthScalable and secure sharing of personal health
Scalable and secure sharing of personal health
 
Enhancing EMR Systems Using Cloud
Enhancing EMR Systems Using CloudEnhancing EMR Systems Using Cloud
Enhancing EMR Systems Using Cloud
 

Similar to Protecting Sensitive Data

Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...ecway
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...ecway
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Ecway Technologies
 
Dotnet scalable and secure sharing of personal health records in cloud compu...
Dotnet  scalable and secure sharing of personal health records in cloud compu...Dotnet  scalable and secure sharing of personal health records in cloud compu...
Dotnet scalable and secure sharing of personal health records in cloud compu...Ecway Technologies
 
Dotnet scalable and secure sharing of personal health records in cloud compu...
Dotnet  scalable and secure sharing of personal health records in cloud compu...Dotnet  scalable and secure sharing of personal health records in cloud compu...
Dotnet scalable and secure sharing of personal health records in cloud compu...Ecway Technologies
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...Ecway Technologies
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...ecway
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...ecwayerode
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...ecwayerode
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...Ecway2004
 
Dotnet scalable and secure sharing of personal health records in cloud compu...
Dotnet  scalable and secure sharing of personal health records in cloud compu...Dotnet  scalable and secure sharing of personal health records in cloud compu...
Dotnet scalable and secure sharing of personal health records in cloud compu...Ecwaytech
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...Ecwaytechnoz
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...Ecwayt
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Ecwayt
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...Ecwaytech
 

Similar to Protecting Sensitive Data (20)

Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Dotnet scalable and secure sharing of personal health records in cloud compu...
Dotnet  scalable and secure sharing of personal health records in cloud compu...Dotnet  scalable and secure sharing of personal health records in cloud compu...
Dotnet scalable and secure sharing of personal health records in cloud compu...
 
Dotnet scalable and secure sharing of personal health records in cloud compu...
Dotnet  scalable and secure sharing of personal health records in cloud compu...Dotnet  scalable and secure sharing of personal health records in cloud compu...
Dotnet scalable and secure sharing of personal health records in cloud compu...
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Dotnet scalable and secure sharing of personal health records in cloud compu...
Dotnet  scalable and secure sharing of personal health records in cloud compu...Dotnet  scalable and secure sharing of personal health records in cloud compu...
Dotnet scalable and secure sharing of personal health records in cloud compu...
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 

Recently uploaded

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

Protecting Sensitive Data

  • 1.
  • 2.
  • 3. Abstract  Electronic healthcare (eHealth) systems have replaced paper-based medical systems due to the attractive features such as universal accessibility, high accuracy, and low cost.  As a major component of eHealth systems, mobile healthcare (mHealth) applies mobile devices, such as smartphones and tablets, to enable patient- to-physician and patient-to-patient communications for better healthcare and quality of life (QoL).  Unfortunately, patients’ concerns on potential leakage of personal health records (PHRs) is the biggest stumbling block. In current eHealth/mHealth networks, patients’ medical records are usually associated with a set of attributes like existing symptoms and undergoing treatments based on the information collected from portable devices.
  • 4.  To guarantee the authenticity of those attributes, PHRs should be verifiable.  However, due to the link ability between identities and PHRs, existing mHealth systems fail to preserve patient identity privacy while providing medical services.  To solve this problem, we propose a decentralized system that leverages users’ verifiable attributes to authenticate each other while preserving attribute and identity privacy.
  • 5. ABOUT THE SYSTEM  Here, we endeavor to study the patientcentric, secure sharing of PHRs stored on semi-trusted servers, and focus on addressing the complicated and challenging key management issues.  In order to protect the personal health data stored on a semi-trusted server, we adopt attribute-based encryption (ABE) as the main encryption primitive.  Using ABE, access policies are expressed based on the attributes of users or data, which enables a patient to selectively share her PHR among a set of users by encrypting the file under a set of attributes, without the need to know a complete list of users.
  • 6.  The complexities per encryption, key generation and decryption are only linear with the number of attributes involved.  However, to integrate ABE into a large-scale PHR system, important issues such as key management scalability, dynamic policy updates, and efficient on-demand revocation are non-trivial to solve, and remain largely open up-to-date.
  • 7. There are several main additional contributions:  (1) We clarify and extend our usage of MA-ABE in the public domain, and formally show how and which types of user-defined file access policies are realized.  (2) We clarify the proposed revocable MA-ABE scheme, and provide a formal security proof for it.  (3) We carry out both real-world experiments and simulations to evaluate the performance of the proposed solution in this paper.
  • 9.  WIDELY deployed electronic healthcare (eHealth) systems have improved people’s daily life compared with traditional paper-based systems for its extraordinary advantages, such as higher efficiency, better accuracy, and broader availability.  For most mHealth systems, patients use sensors, implantable medical devices (IMDs), and mobile phones to collect personal health records (PHRs), then send medical data to the designated healthcare infrastructure to obtain physicians’ diagnosis via wireless interfaces.  Possible solution leads us to consider the possibility of separating multiple attributes from a single identity, and allows users to mutually authenticate each other using their attributes
  • 12. CONCLUSION  we have proposed a novel framework of secure sharing of personal health records in cloud computing.  Considering partially trustworthy cloud servers, we argue that to fully realize the patient-centric concept, patients shall have complete control of their own privacy through encrypting their PHR files to allow fine-grained access.  The framework addresses the unique challenges brought by multiple PHR owners and users, in that we greatly reduce the complexity of key management while enhance the privacy guarantees compared with previous works.  Furthermore, we enhance an existing MA-ABE scheme to handle efficient and on-demand user revocation, and prove its security. Through implementation and simulation, we show that our solution is both scalable and efficient.