Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Scalable and secure sharing of personal health records

1,196 views

Published on

Scalable and Secure sharing of personal health records

Published in: Engineering
  • HI, Can you please send me this project to sheth.khushal@gmail.com ?
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • HI, Can you please send me this project to chethanak111@gmail.com .... plz its very important
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • HI, Can you please send me this project to upendrag020@gmail.com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Scalable and secure sharing of personal health records

  1. 1. OUTLINE • What is Cloud Computing? • What is the use of it? • What is attribute-based encryption? • Introduction. • Existing system and its disadvantages. • Proposed system and its advantages. • Hardware requirements. • Software requirements. • Use case diagrams. • Conclusion.
  2. 2. • There are a number of reasons why cloud computing is so widely used among businesses today some are:  Reduction of cost.  Universal access.  Flexibility.
  3. 3. • It is a type of public - key encryption in which the secret key of a user and the cipher text are dependent upon attributes (e.g. the country he lives, the subscriber he uses). • In such a system , the decryption of a cipher text is possible only if the set of attributes of the user key matches the attributes of the cipher text.
  4. 4. This webpage is to secure the personal and medical information of the patient using encryption. • Here we have an option of visibility... that means we can access the permission for particular member to visit or to see the status of the person(patient), that is nothing but
  5. 5. • The existing system stores the information in files. • That is personal and medical information. • The entire details about the user or patient are stored, in written type or any printed papers. • By this we may face many.
  6. 6. • By storing the information in files it can be exposed to the third party or unauthorized parties. • By secretly any one can access it this is the main disadvantage of the existing system. • It occupies more space. • High cost as it requires more space to store the files.
  7. 7. • Here we use system memory to store the personal and medical information of the person. • Here we use one technique to avoid risk like accessing the information of the particular person via network analysis and that is ATTRIBUTE –BASED ENCRYPTION.
  8. 8. • No can access the information of a person as it is encrypted by a secret key. • To see any report about the person … him self should login into the webpage and access the information. • Every user as unique user name and password that is known only to him. •User as an option to access the information for whom ever he needed.
  9. 9.  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Floppy Drive - 1.44 MB  Processor - Pentium-III  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  10. 10. Operating System :Windows95 /98/2000/XP Application Server : Tomcat5.0 Front End : Java, JSP Database : MYSQL
  11. 11. registration login view old treatments patients enter disease details
  12. 12. login view patient details Doctors enter treatment details
  13. 13. admin doctor patient users treatments add doctors view doctors view patient details view user details enter treatments search and view treatments search and view treatments
  14. 14.  All patient data should be gathered and accessible through one system.  A PHR applies health information technology to your personal life to improve safety, reduces medical errors, reduces gaps in communication and reduce delays in receiving proper care.

×