This document proposes a patient self-driven multi-stage confidentiality safeguard supportive verification scheme (PSCSV) for distributed mobile health care cloud computing systems. The PSCSV allows patients to authorize different access privileges to physicians located across various health care providers. It establishes multi-level privacy-preserving cooperative authentication through an access tree supporting flexible authorization thresholds. The PSCSV enhances security and anonymity by associating it with cryptographic problems and the number of patient attributes. It aims to efficiently manage access control and protect patient privacy and confidentiality at three different authorization levels: directly authorized physicians, indirectly authorized physicians, and unauthorized individuals.
2. 15
International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET)
tional assert for patients is guarded. Recommended pa-
tients have to approved to treatment and be warned each
time when authorized physicians access their proceed-
ings and also our proposed scheme is a patient-centric
and fine filtered data access control in multi-owner back-
grounds is implemented for protected personal health
proceedings in cloud computing.
Our proposed mobile-health concern scheme primarily
spotlighted on the central cloud computing system which
is not enough for competently handing out the growing
volume of personal health data in mobile-health concern
cloud computing scheme. In scattered mobile-health con-
cern cloud computing schemes, all the associates can be
classified into three groups: the directly approved physi-
cians with green tickets in the local health concern con-
tributor who are approved by the patients and can both
access the patient’s personal health data and verify the
patient’s individuality and the indirectly approved phy-
sicians with yellow ticket in the remote health concern
contributors who are authorized by the directly approved
physicians for medical consultation or some research
reasons. They can only interact with the personal health
data, but not the patient’s individuality. For the unau-
thorized persons with red tickets, nothing could be ac-
quired.
Advantages of proposed system:
• Mobile-health concern scheme is fully prohibited and
protected with encryption platforms.
• Data loss eliminated and data redundancy eradicated.
• scheme contributes full safeguard for patient data and
qualities.
SYSTEM ARCHITECTURE
MODULES
E-healthconcern System Framework:
E-healthconcern System consists of three components:
body area networks (BANs), wireless transmission net-
works and the healthconcern providers equipped with
their own cloud servers. The patient’s personal health
information is securely transmitted to the healthconcern
provider for the authorized physicians to access and per-
form medical treatment. Illustrate the unique character-
istics of distributed mobile-healthconcern cloud comput-
ing systems where all the personal health information can
be shared among patients suffering from the same dis-
ease for mutual support or among the authorized physi-
cians in distributed healthconcern providers and medical
research institutions for medical consultation.
2. Authorized accessible privacy model:
Multi-level privacy-preserving cooperative authentica-
tion is established to allow the patients to authorize cor-
responding privileges to different kinds of physicians lo-
cated in distributed healthconcern providers by setting
an access tree supporting flexible threshold predicates.
Propose a novel authorized accessible privacy model for
distributed mobile-healthconcern cloud computing sys-
tems which consists of the following two components:
an attribute based designated verifier signature scheme
(ADVS) and the corresponding adversary model.
3. Security Verification:
The security and anonymity level of our proposed con-
struction is significantly enhanced by associating it to the
underlying Gap Bilinear Diffie-Hellman (GBDH) problem
and the number of patients’ attributes to deal with the
privacy leakage in patient sparsely distributed scenarios.
More significantly, without the knowledge of which phy-
sician in the healthconcern provider is professional in
treating his illness, the best way for the patient is to en-
crypt his own PHI under a specified access policy rather
than assign each physician a secret key. As a result, the
authorized physicians whose attribute set satisfy the ac-
cess policy can recover the PHI and the access control
management also becomes more efficient.
4.Performance Evaluation:
The efficiency of PSCSV in terms of storage overhead,
computational complexity and communication cost. a pa-
tient-centric and fine-grained data access control using
ABE to secure personal health records in cloud comput-
ing without privacy-preserving authentication. To achieve
the same security, our construction performs more effi-
ciently than the traditional designated verifier signature
for all the directly authorized physicians, where the over-
heads are linear to the number of directly authorized phy-
sicians.
CONCLUSION
Formulating a novel procedure of attribute based nomi-
nated authenticator signature, a patient self-driven mul-
ti-stage confidentiality safeguard supportive verification
scheme (PSCSV) understanding three levels of protec-
tion and confidentiality necessity in distributed mobile-
healthconcern cloud computing system is anticipated.
This PSCSV can resist various kinds of malicious attacks
and far outperforms previous schemes in terms of stor-
age, computational and communication overhead. Our
future work will focus on exploring the relation between
patient mobility and confidentiality under the distributed
system.
REFERENCES
I. J. Misic and V. B. Misic, “Implementation of security
policy for clinical information systems over wireless sen-
sor network,” Ad Hoc Netw., vol. 5, no. 1, pp. 134–144,
Jan. 2007.
II. J. Misic and V. Misic, “Enforcing patient privacy in
healthconcern WSNs through key distribution algo-
rithms,” Security Commun. Netw. J., vol. 1, no. 5, pp.
417–429, 2008
3. 16
International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET)
III. M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal
health records in cloud computing: Patient-centric and
fine-grained data access control in multi-owner settings,”
in Proc. 6th Int. ICST Conf. Security Privacy Comm.
Netw., 2010, pp. 89–106.
AUTHORS
Kurra Sambasiva Rao,
Research Scholar,
Department of Computer Science and Engineering,
Chintalapudi Engineering College, Guntur, AP, India.
K.Ramesh,
Associate professor,
Department of Computer Science and Engineering,
Chintalapudi Engineering College, Guntur, AP, India.