Cloud Technologies providing Complete Solution for all
AcademicProjects Final Year/Semester Student Projects
For More Details,
Contact:
Mobile:- +91 8121953811,
whatsapp:- +91 8522991105,
Office:- 040-66411811
Email ID: cloudtechnologiesprojects@gmail.com
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Â
Secure identity-based profile matching and data sharing for mobile healthcare
1. Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social
Networks in Cloud Computing
ABSTRACT
Cloud computing and social networks are changing the way of healthcare by providing real-time
data sharing in a cost-effective manner. However, data security issue is one of the main obstacles
to the wide application of mobile healthcare social networks (MHSN), since health information
is considered to be highly sensitive. In this paper, we introduce a secure data sharing and profile
matching scheme for MHSN in cloud computing. The patients can outsource their encrypted
health records to cloud storage with identity-based broadcast encryption (IBBE) technique, and
share them with a group of doctors in a secure and efficient manner. We then present an
attribute-based conditional data re-encryption construction, which permits the doctors who
satisfy the pre-defined conditions in the ciphertext to authorize the cloud platform to convert a
ciphertext into a new ciphertext of an identity-based encryption scheme for specialist without
leaking any sensitive information. Further, we provide a profile matching mechanism in MHSN
based on identity-based encryption with equality test that helps patients to find friends in a
privacy-preserving way, and achieve flexible authorization on the encrypted health records with
resisting the keywords guessing attack. Moreover, this mechanism reduces the computation cost
on patient side. The security analysis and experimental evaluation show that our scheme is
practical for protecting the data security and privacy in MHSN.
MOTIVATION:
Consequently, mobile healthcare social networks (MHSN) are created for connecting patients so
that they could share healthcare information using their mobile devices, and also connecting
doctors and specialists for better healthcare. For example, people in MHSN can communicate
and interact with each other before making healthcare decision.
INTRODUCTION:
Mobile healthcare is an innovative combination of mobile devices and mobile communication
technologies, for it can provide necessary health information, routine care improvements,
potential infectious disease prevention, health interventions, etc. It is getting more and more
2. widely to apply the emerging cloud computing technology into the fields of mobile healthcare.
By using mobile healthcare system, the electronic health record (EHR) can be transmitted over
the network to the cloud service provider (CSP) for remote storage. Moreover, the healthcare
providers can read it from an end device or access it remotely using a mobile device to provide
real-time medical treatment. Meanwhile, people tend to share and disseminate the healthcare
information via social networks, since social media is an extension of the healthcare professional
and patient relationship.
Existing System:
However, data security issues are the major obstacles to the application of MHSN. As we all
know, health information such as treatment and drug information is considered to be highly
sensitive. If these data are outsourced to the CSP, the patients cannot directly control the
software or hardware platform for storing data. Without careful consideration, patients may
suffer serious medical information leakage from the cloud. For example, millions of EHRs have
been compromised in recent years. Hence, it is significant that the EHRs should be stored in an
encrypted form. Even if the CSP is untrusted or compromised, the data maintains security and
privacy. Simultaneously, the encrypted records should be shared and accessed in a reasonable
way.
Proposed System:
We propose a secure identity-based data sharing scheme for MHSN, which allows patients to
outsource their encrypted health records to CSP with IBBE technique, and share them with a
group of doctors in a secure and efficient manner. We present an attribute-based conditional data
re-encryption construction, which permits doctors who satisfy the pre-defined conditions in the
ciphertext to authorize the CSP to re-encrypt the ciphertext for specialist, without leaking any
sensitive information. We provide an efficient profile matching mechanism in MHSN based on
IBE with equality test (IBEET) that helps patients to find friends in a privacy-preserving manner,
and achieve flexible authorization on the encrypted health records with resisting the keywords
guessing attack.
3. Modules:
(1) Central authority.
The central authority is trusted for initializing the system and generating attribute keys and secret
keys for participating users.
(2) CSP.
The CSP is responsible for data storage and can be acted as a proxy as it is semi-trusted.
Besides, the CSP performs the profile matching for patients.
(3) Patient.
The patients register the system to obtain their secret keys with their identities. They encrypt the
EHRs using IBBE algorithm and outsource the ciphertexts to CSP, hence only authorized doctors
could decrypt them. Simultaneously, patients with the same symptom can generate trapdoors and
form social relationships according to their wills.
(4) Doctor.
The authorized doctors can decrypt the patients’ ciphertext that stored in the CSP. When
encountering a problem that needs to negotiate with a specialist, the doctor can generate a re-
encryption request, thus the CSP converts the ciphertext into an IBE-encrypted data for specialist
if the doctor satisfies the pre-defined conditions in the ciphertext.
(5) Specialist.
The specialist could decrypt the re-encrypted ciphertext with the secret key and then assist
doctors for advice.
4. SYSTEM CONFIGURATION:
Hardware requirements:
Processer : Any Update Processer
Ram : Min 1 GB
Hard Disk : Min 100 GB
Software requirements:
Operating System : Windows family
Technology : Java (1.7/1.8)
Front-End Technologies : Html, Html-5, JavaScript, CSS.
Web Server : Tomcat 7/8
Database (Back – End) : My SQL5.5
IDE : EditPlus
LITERATURE SERVEY
Survey on “Scalable and secure sharing of personal health records in cloud computing
using attribute-based encryption”:
The Personal Health Record (PHR) is an emerging framework of health information exchange,
which is often stored at cloud servers. But there are still various privacy problems as personal
health information could be discovered to unauthorized people. To guarantee the patients control
over to their own PHRs, it is a method to encrypt the PHRs before storing on cloud. But still
issues such as risks of privacy, efficiency in key administration, flexible access and efficient user
administration, have still remained the important challenges toward achieving better,
cryptographically imposed data access control. Here in this research paper, we develop a model
and mechanism for control of data access to PHRs stored in cloud servers. To achieve efficient
5. and modular data access control for PHRs, we provide ABE encryption approach to encrypt each
PHR file. In this system we try to focus on the multiple data owner scheme, and divide the users
into security domains that highly reduce the key management complication for owners and users.
In this system patient privacy is guaranteed by exploiting multi-authority ABE. Our system’s
scheme also enables modification of access policies or file attributes, and break-glass access
under emergency situations. Extensive analysis and experimental results are presented which
shows the security and efficiency of our proposed scheme.
Survey on “Lightweight sharable and traceable secure mobile health system”:
Mobile health (mHealth) has emerged as a new patient centric model which allows real-time
collection of patient data via wearable sensors, aggregation and encryption of these data at
mobile devices, and then uploading the encrypted data to the cloud for storage and access by
healthcare staff and researchers. However, efficient and scalable sharing of encrypted data has
been a very challenging problem. In this paper, we propose a Lightweight Sharable and
Traceable (LiST) secure mobile health system in which patient data are encrypted end-to-end
from a patient’s mobile device to data users. LiST enables efficient keyword search and fine-
grained access control of encrypted data, supports tracing of traitors who sell their search and
access privileges for monetary gain, and allows on-demand user revocation. LiST is lightweight
in the sense that it offloads most of the heavy cryptographic computations to the cloud while
only lightweight operations are performed at the end user devices. We formally define the
security of LiST and prove that it is secure without random oracle. We also conduct extensive
experiments to access the system’s performance.
Survey on “Proxy re-encryption systems for identity-based encryption”:
A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice’s
public key into the different ciphertexts that can be decrypted by Bob’s secret key. In this paper,
we propose new proxy re-encryption systems; one for the transformation from ciphertexts
encrypted under a traditional certificate-based public key into the ciphertexts that can be
decrypted by an secret key for Identity-Based Encryption, and the other one for the
transformation from ciphertexts encrypted in IBE manner into the different ciphertexts that can
6. be decrypted by the other secret key for the IBE.
Survey on “Conditional proxy re-encryption secure against chosen-ciphertext attack”:
In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a ciphertext
for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has found many
practical applications requiring delegation. However, it is inadequate to handle scenarios where a
fine-grained delegation is demanded. To overcome the limitation of existing PRE systems, we
introduce the notion of conditional proxy re-encryption (C-PRE), whereby only ci-phertext
satisfying a specific condition set by Alice can be transformed by the proxy and then decrypted
by Bob. We formalize its security model and propose an efficient C-PRE scheme, whose chosen-
ciphertext security is proven under the 3-quotient bilinear Diffie-Hellman assumption. We
further extend the construction to allow multiple conditions with a slightly higher overhead.
Survey on “Ciphertext-policy attribute-based encryption”:
In several distributed systems a user should only be able to access data if a user posses a certain
set of credentials or attributes. Currently, the only method for enforcing such policies is to
employ a trusted server to store the data and mediate access control. However, if any server
storing the data is compromised, then the confidentiality of the data will be compromised. In this
paper we present a system for realizing complex access control on encrypted data that we call
Ciphertext-Policy Attribute-Based Encryption. By using our techniques encrypted data can be
kept confidential even if the storage server is untrusted; moreover, our methods are secure
against collusion attacks. Previous AttributeBased Encryption systems used attributes to describe
the encrypted data and built policies into user’s keys; while in our system attributes are used to
describe a user’s credentials, and a party encrypting data determines a policy for who can
decrypt. Thus, our methods are conceptually closer to traditional access control methods such as
Role-Based Access Control (RBAC). In addition, we provide an implementation of our system
and give performance measurements.
8. [10] Y. Yang, X. Liu, R. Deng and Y. Li, “Lightweight sharable and traceable secure mobile
health system,” IEEE Trans. Depend. Sec Comput., Jul. 2017. [Online].