SlideShare a Scribd company logo
1 of 3
Download to read offline
14
International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET)
International Journal of Research and Innovation in
Computers and Information Technology (IJRICIT)
PSCSV - PATIENT SELF-DRIVEN MULTI-STAGE CONFIDENTIALITY
SAFEGUARD SUPPORTIVE VERIFICATION SCHEME
Kurra Sambasiva Rao1
, K.Ramesh2
.
1 Research Scholar, Department of Computer Science and Engineering, Chintalapudi Engineering College, Guntur, AP, India.
2 Associate professor, Department of Computer Science and Engineering, Chintalapudi Engineering College, Guntur, AP, India.
*Corresponding Author:
Kurra Sambasiva Rao,
Research Scholar, Department of Computer Science and Engi-
neering, Chintalapudi Engineering College, Guntur, AP, India.
Email: kurrasambasivarao.cec@gmail.com
Year of publication: 2016
Review Type: peer reviewed
Volume: I, Issue : I
Citation: Kurra Sambasiva Rao, Research Scholar, "Pscsv - Pa-
tient Self-Driven Multi-Stage Confidentiality Safeguard Support-
ive Verification Scheme" International Journal of Research and
Innovation on Science, Engineering and Technology (IJRISET)
(2016) 14-16
AIM
The main aim of this paper is a district approved acces-
sible confidential model (AACM) is based on devised by
a new technique of attribute-based designated verifier
signature, a patient self-driven multi-stage confidential-
ity safeguard supportive verification scheme (PSCSV) un-
derstanding three levels of protection and confidentiality
necessity in distributed mobile-healthconcern cloud com-
puting system is anticipated.
INTRODUCTION
In mobile-health concern social networks, the individual
health data is forever shared amongst the patients situat-
ed in relevant social communities affliction from the simi-
lar illness for joint support, and across distributed health
concern contributors prepared with their own cloud serv-
ers for medical specialist. However, it also fetches about
a sequence of challenges, particularly how to make sure
the protection and confidentiality of the patients individ-
ual health data from a variety of assaults in the wireless
communication channel such as eavesdropping and in-
terfering and As to the protection aspect, one of the major
concern is access control of patients personal individual
health data, specifically it is only the approved medical
doctors or organizations that can pull through the pa-
tients individual health data during the data distribution
in the distributed mobile-health concern cloud computing
system.
In practical, most patients are worried about the privacy
of their individual health data since it is probable to make
them in problem for each kind of illegitimate collection
and exposé. Therefore, in distributed mobile-health con-
cern cloud computing schemes, which part of the patients
individual health data should be distributed and which
medical doctors their personal health data should be dis-
tributed with have become two stubborn issues challeng-
ing vital solutions.
EXISTING SYSTEM
In a mobile-healthconcern scheme information privacy is
much significant but in conventional scheme framework
it is not sufficient for to only assurance to data privacy
of the patient’s individual health data in the honest-but-
curious cloud server model since the regular communi-
cation among a patient and a specialized medical doctor
can guide the challenger to conclude that the patient is
tormented from a precise disease with a high possibility.
Regrettably, the difficulty of how to defend both the pa-
tients information privacy and identity confidentiality in
the distributed mobile-health concern cloud computing
situation under the malicious model was left unaffected.
Disadvantages of Existing System:
• Information privacy is short.
• Information redundancy is elevated.
• Infringement data protection.
PROPOSED SYSTEM
Proposed system for a privacy-protecting verification
scheme in unidentified P2P schemes based on Zero-in-
formation Proof. However, the heavy computational over-
head of Zero-Knowledge Proof makes it unrealistic when
straightforwardly related to the distributed mobile-health
concern cloud computing systems where the computa-
Abstract
The dispersed mobile-health concern in cloud computing significantly make easy protected and well-organized patient
treatment for medical discussion by distributional individual health data amongst the health concern contributors. This
scheme should fetch about the confront of maintening both the data privacy and patient’s individuality confidentiality
concurrently. Many conventional access control and unidentified verification methods cannot be directly exploited. To
resolve the trouble proposed a district approved accessible confidential model (AACM) is recognized. Patients can give
permission to physicians by setting an permission tree sustaining bendable threshold predicates. Then related to that,
by formulating a novel procedure of attribute based nominated authenticator signature, a patient self-driven multi-stage
confidentiality safeguard supportive verification scheme (PSCSV) understanding three levels of protection and confi-
dentiality necessity in distributed mobile-health concern cloud computing system is anticipated. The directly approved
physicians, the obliquely approved physicians and the illegitimate persons in medical consultation can correspondingly
decode the personal health data and/or authenticate patient individualities by gratifying the admittance tree with their
own attribute sets.
15
International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET)
tional assert for patients is guarded. Recommended pa-
tients have to approved to treatment and be warned each
time when authorized physicians access their proceed-
ings and also our proposed scheme is a patient-centric
and fine filtered data access control in multi-owner back-
grounds is implemented for protected personal health
proceedings in cloud computing.
Our proposed mobile-health concern scheme primarily
spotlighted on the central cloud computing system which
is not enough for competently handing out the growing
volume of personal health data in mobile-health concern
cloud computing scheme. In scattered mobile-health con-
cern cloud computing schemes, all the associates can be
classified into three groups: the directly approved physi-
cians with green tickets in the local health concern con-
tributor who are approved by the patients and can both
access the patient’s personal health data and verify the
patient’s individuality and the indirectly approved phy-
sicians with yellow ticket in the remote health concern
contributors who are authorized by the directly approved
physicians for medical consultation or some research
reasons. They can only interact with the personal health
data, but not the patient’s individuality. For the unau-
thorized persons with red tickets, nothing could be ac-
quired.
Advantages of proposed system:
• Mobile-health concern scheme is fully prohibited and
protected with encryption platforms.
• Data loss eliminated and data redundancy eradicated.
• scheme contributes full safeguard for patient data and
qualities.
SYSTEM ARCHITECTURE
MODULES
E-healthconcern System Framework:
E-healthconcern System consists of three components:
body area networks (BANs), wireless transmission net-
works and the healthconcern providers equipped with
their own cloud servers. The patient’s personal health
information is securely transmitted to the healthconcern
provider for the authorized physicians to access and per-
form medical treatment. Illustrate the unique character-
istics of distributed mobile-healthconcern cloud comput-
ing systems where all the personal health information can
be shared among patients suffering from the same dis-
ease for mutual support or among the authorized physi-
cians in distributed healthconcern providers and medical
research institutions for medical consultation.
2. Authorized accessible privacy model:
Multi-level privacy-preserving cooperative authentica-
tion is established to allow the patients to authorize cor-
responding privileges to different kinds of physicians lo-
cated in distributed healthconcern providers by setting
an access tree supporting flexible threshold predicates.
Propose a novel authorized accessible privacy model for
distributed mobile-healthconcern cloud computing sys-
tems which consists of the following two components:
an attribute based designated verifier signature scheme
(ADVS) and the corresponding adversary model.
3. Security Verification:
The security and anonymity level of our proposed con-
struction is significantly enhanced by associating it to the
underlying Gap Bilinear Diffie-Hellman (GBDH) problem
and the number of patients’ attributes to deal with the
privacy leakage in patient sparsely distributed scenarios.
More significantly, without the knowledge of which phy-
sician in the healthconcern provider is professional in
treating his illness, the best way for the patient is to en-
crypt his own PHI under a specified access policy rather
than assign each physician a secret key. As a result, the
authorized physicians whose attribute set satisfy the ac-
cess policy can recover the PHI and the access control
management also becomes more efficient.
4.Performance Evaluation:
The efficiency of PSCSV in terms of storage overhead,
computational complexity and communication cost. a pa-
tient-centric and fine-grained data access control using
ABE to secure personal health records in cloud comput-
ing without privacy-preserving authentication. To achieve
the same security, our construction performs more effi-
ciently than the traditional designated verifier signature
for all the directly authorized physicians, where the over-
heads are linear to the number of directly authorized phy-
sicians.
CONCLUSION
Formulating a novel procedure of attribute based nomi-
nated authenticator signature, a patient self-driven mul-
ti-stage confidentiality safeguard supportive verification
scheme (PSCSV) understanding three levels of protec-
tion and confidentiality necessity in distributed mobile-
healthconcern cloud computing system is anticipated.
This PSCSV can resist various kinds of malicious attacks
and far outperforms previous schemes in terms of stor-
age, computational and communication overhead. Our
future work will focus on exploring the relation between
patient mobility and confidentiality under the distributed
system.
REFERENCES
I. J. Misic and V. B. Misic, “Implementation of security
policy for clinical information systems over wireless sen-
sor network,” Ad Hoc Netw., vol. 5, no. 1, pp. 134–144,
Jan. 2007.
II. J. Misic and V. Misic, “Enforcing patient privacy in
healthconcern WSNs through key distribution algo-
rithms,” Security Commun. Netw. J., vol. 1, no. 5, pp.
417–429, 2008
16
International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET)
III. M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal
health records in cloud computing: Patient-centric and
fine-grained data access control in multi-owner settings,”
in Proc. 6th Int. ICST Conf. Security Privacy Comm.
Netw., 2010, pp. 89–106.
AUTHORS
Kurra Sambasiva Rao,
Research Scholar,
Department of Computer Science and Engineering,
Chintalapudi Engineering College, Guntur, AP, India.
K.Ramesh,
Associate professor,
Department of Computer Science and Engineering,
Chintalapudi Engineering College, Guntur, AP, India.

More Related Content

What's hot

A framework for secure healthcare systems based on big data analytics in mobi...
A framework for secure healthcare systems based on big data analytics in mobi...A framework for secure healthcare systems based on big data analytics in mobi...
A framework for secure healthcare systems based on big data analytics in mobi...ijasa
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET Journal
 
E health and the future, promise or peril
E health and the future, promise or perilE health and the future, promise or peril
E health and the future, promise or perileduardo guagliardi
 
E hdas e- healthcare diagnosis & advisory system
E  hdas e- healthcare diagnosis & advisory systemE  hdas e- healthcare diagnosis & advisory system
E hdas e- healthcare diagnosis & advisory systemeSAT Publishing House
 
Exploiting multimodal biometrics in e privacy scheme for electronic health re...
Exploiting multimodal biometrics in e privacy scheme for electronic health re...Exploiting multimodal biometrics in e privacy scheme for electronic health re...
Exploiting multimodal biometrics in e privacy scheme for electronic health re...Alexander Decker
 
Patient Locate For Clinical Research
Patient Locate For Clinical ResearchPatient Locate For Clinical Research
Patient Locate For Clinical Researchdhainc
 
IRJET- A Framework for Disease Risk Prediction
IRJET- A Framework for Disease Risk PredictionIRJET- A Framework for Disease Risk Prediction
IRJET- A Framework for Disease Risk PredictionIRJET Journal
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
 
Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
 
Achieve Privacy-Preserving Priority Classification on Patient Health Data in ...
Achieve Privacy-Preserving Priority Classification on Patient Health Data in ...Achieve Privacy-Preserving Priority Classification on Patient Health Data in ...
Achieve Privacy-Preserving Priority Classification on Patient Health Data in ...JAYAPRAKASH JPINFOTECH
 
Clinical information system
Clinical information systemClinical information system
Clinical information systemNUR3563Team1
 
E Healthcare Systems Hb Emr Prep Pp
E Healthcare Systems Hb Emr Prep PpE Healthcare Systems Hb Emr Prep Pp
E Healthcare Systems Hb Emr Prep Pphunterberney
 
IHE / RSNA Image Sharing Project - IHE Colombia Workshop (12/2014) Module 5b
IHE / RSNA Image Sharing Project - IHE Colombia Workshop (12/2014) Module 5bIHE / RSNA Image Sharing Project - IHE Colombia Workshop (12/2014) Module 5b
IHE / RSNA Image Sharing Project - IHE Colombia Workshop (12/2014) Module 5bIHE Brasil
 
Health Prediction System - an Artificial Intelligence Project 2015
Health Prediction System - an Artificial Intelligence Project 2015Health Prediction System - an Artificial Intelligence Project 2015
Health Prediction System - an Artificial Intelligence Project 2015Maruf Abdullah (Rion)
 
Clinical information systems
Clinical information systemsClinical information systems
Clinical information systemsMark Wardle
 
Clinic Reservation System
Clinic Reservation SystemClinic Reservation System
Clinic Reservation Systemijtsrd
 
Integrated clinical information systems
Integrated clinical information systemsIntegrated clinical information systems
Integrated clinical information systemsVijay Raj Yanamala
 
Application of mobile cloud computing in emergency health care
Application of mobile cloud computing in emergency health careApplication of mobile cloud computing in emergency health care
Application of mobile cloud computing in emergency health carejournalBEEI
 
Vaccine Stock Management Tool - System documentation
Vaccine Stock Management Tool - System documentationVaccine Stock Management Tool - System documentation
Vaccine Stock Management Tool - System documentationOtieno Julie
 

What's hot (19)

A framework for secure healthcare systems based on big data analytics in mobi...
A framework for secure healthcare systems based on big data analytics in mobi...A framework for secure healthcare systems based on big data analytics in mobi...
A framework for secure healthcare systems based on big data analytics in mobi...
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
 
E health and the future, promise or peril
E health and the future, promise or perilE health and the future, promise or peril
E health and the future, promise or peril
 
E hdas e- healthcare diagnosis & advisory system
E  hdas e- healthcare diagnosis & advisory systemE  hdas e- healthcare diagnosis & advisory system
E hdas e- healthcare diagnosis & advisory system
 
Exploiting multimodal biometrics in e privacy scheme for electronic health re...
Exploiting multimodal biometrics in e privacy scheme for electronic health re...Exploiting multimodal biometrics in e privacy scheme for electronic health re...
Exploiting multimodal biometrics in e privacy scheme for electronic health re...
 
Patient Locate For Clinical Research
Patient Locate For Clinical ResearchPatient Locate For Clinical Research
Patient Locate For Clinical Research
 
IRJET- A Framework for Disease Risk Prediction
IRJET- A Framework for Disease Risk PredictionIRJET- A Framework for Disease Risk Prediction
IRJET- A Framework for Disease Risk Prediction
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
 
Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...
 
Achieve Privacy-Preserving Priority Classification on Patient Health Data in ...
Achieve Privacy-Preserving Priority Classification on Patient Health Data in ...Achieve Privacy-Preserving Priority Classification on Patient Health Data in ...
Achieve Privacy-Preserving Priority Classification on Patient Health Data in ...
 
Clinical information system
Clinical information systemClinical information system
Clinical information system
 
E Healthcare Systems Hb Emr Prep Pp
E Healthcare Systems Hb Emr Prep PpE Healthcare Systems Hb Emr Prep Pp
E Healthcare Systems Hb Emr Prep Pp
 
IHE / RSNA Image Sharing Project - IHE Colombia Workshop (12/2014) Module 5b
IHE / RSNA Image Sharing Project - IHE Colombia Workshop (12/2014) Module 5bIHE / RSNA Image Sharing Project - IHE Colombia Workshop (12/2014) Module 5b
IHE / RSNA Image Sharing Project - IHE Colombia Workshop (12/2014) Module 5b
 
Health Prediction System - an Artificial Intelligence Project 2015
Health Prediction System - an Artificial Intelligence Project 2015Health Prediction System - an Artificial Intelligence Project 2015
Health Prediction System - an Artificial Intelligence Project 2015
 
Clinical information systems
Clinical information systemsClinical information systems
Clinical information systems
 
Clinic Reservation System
Clinic Reservation SystemClinic Reservation System
Clinic Reservation System
 
Integrated clinical information systems
Integrated clinical information systemsIntegrated clinical information systems
Integrated clinical information systems
 
Application of mobile cloud computing in emergency health care
Application of mobile cloud computing in emergency health careApplication of mobile cloud computing in emergency health care
Application of mobile cloud computing in emergency health care
 
Vaccine Stock Management Tool - System documentation
Vaccine Stock Management Tool - System documentationVaccine Stock Management Tool - System documentation
Vaccine Stock Management Tool - System documentation
 

Viewers also liked

VALIDATION OF COMPOSITE DRAWER USING FEA AT CREO-GENIC TEMPERATURE
VALIDATION OF COMPOSITE DRAWER USING FEA AT CREO-GENIC TEMPERATUREVALIDATION OF COMPOSITE DRAWER USING FEA AT CREO-GENIC TEMPERATURE
VALIDATION OF COMPOSITE DRAWER USING FEA AT CREO-GENIC TEMPERATUREIjripublishers Ijri
 
THERMAL INVESTIGATION (PRESSURE DISTRIBUTION) ON BOX TYPE CYLINDER HEAD OF A ...
THERMAL INVESTIGATION (PRESSURE DISTRIBUTION) ON BOX TYPE CYLINDER HEAD OF A ...THERMAL INVESTIGATION (PRESSURE DISTRIBUTION) ON BOX TYPE CYLINDER HEAD OF A ...
THERMAL INVESTIGATION (PRESSURE DISTRIBUTION) ON BOX TYPE CYLINDER HEAD OF A ...Ijripublishers Ijri
 
INVESTIGATION ON MECHANICAL PROPERTIES OF BACTERIAL CONCRETE WITH FLYASH PART...
INVESTIGATION ON MECHANICAL PROPERTIES OF BACTERIAL CONCRETE WITH FLYASH PART...INVESTIGATION ON MECHANICAL PROPERTIES OF BACTERIAL CONCRETE WITH FLYASH PART...
INVESTIGATION ON MECHANICAL PROPERTIES OF BACTERIAL CONCRETE WITH FLYASH PART...Ijripublishers Ijri
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijripublishers Ijri
 
Ijricit 01-002 enhanced replica detection in short time for large data sets
Ijricit 01-002 enhanced replica detection in  short time for large data setsIjricit 01-002 enhanced replica detection in  short time for large data sets
Ijricit 01-002 enhanced replica detection in short time for large data setsIjripublishers Ijri
 
THERMAL INVESTIGATION ON OPEN CYCLE DESICCANT COOLING AIR CONDITIONING
THERMAL INVESTIGATION ON OPEN CYCLE DESICCANT COOLING AIR CONDITIONINGTHERMAL INVESTIGATION ON OPEN CYCLE DESICCANT COOLING AIR CONDITIONING
THERMAL INVESTIGATION ON OPEN CYCLE DESICCANT COOLING AIR CONDITIONINGIjripublishers Ijri
 
ASSESSMENT OF SELF COMPACTING CONCRETE IMMERSED IN ACIDIC SOLUTIONS WITH PART...
ASSESSMENT OF SELF COMPACTING CONCRETE IMMERSED IN ACIDIC SOLUTIONS WITH PART...ASSESSMENT OF SELF COMPACTING CONCRETE IMMERSED IN ACIDIC SOLUTIONS WITH PART...
ASSESSMENT OF SELF COMPACTING CONCRETE IMMERSED IN ACIDIC SOLUTIONS WITH PART...Ijripublishers Ijri
 
Experimental Investigation on Heat Transfer By Natural Convection Over A Cyli...
Experimental Investigation on Heat Transfer By Natural Convection Over A Cyli...Experimental Investigation on Heat Transfer By Natural Convection Over A Cyli...
Experimental Investigation on Heat Transfer By Natural Convection Over A Cyli...Ijripublishers Ijri
 
DEVELOPMENT AND CHARACTERISATION OF HIBISCUS LAMPAS (ADAVI BENDA) SHORT FIBER...
DEVELOPMENT AND CHARACTERISATION OF HIBISCUS LAMPAS (ADAVI BENDA) SHORT FIBER...DEVELOPMENT AND CHARACTERISATION OF HIBISCUS LAMPAS (ADAVI BENDA) SHORT FIBER...
DEVELOPMENT AND CHARACTERISATION OF HIBISCUS LAMPAS (ADAVI BENDA) SHORT FIBER...Ijripublishers Ijri
 
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Ijripublishers Ijri
 
fatigue failure analysis of steam turbine shaft using fem technique
 fatigue failure analysis of steam turbine shaft using fem technique fatigue failure analysis of steam turbine shaft using fem technique
fatigue failure analysis of steam turbine shaft using fem techniqueIjripublishers Ijri
 
DESIGN AND ANALYSIS OF MULTI- STAGE STEAM TURBINE BLADE AND SHAFT ASSEMBLY
DESIGN AND ANALYSIS OF MULTI- STAGE STEAM TURBINE BLADE AND SHAFT ASSEMBLYDESIGN AND ANALYSIS OF MULTI- STAGE STEAM TURBINE BLADE AND SHAFT ASSEMBLY
DESIGN AND ANALYSIS OF MULTI- STAGE STEAM TURBINE BLADE AND SHAFT ASSEMBLYIjripublishers Ijri
 
DYNAMIC ANALYSIS OF ENGINE BLOCK FOR SELECTION OF SUITABLE MATERIAL FOR COST ...
DYNAMIC ANALYSIS OF ENGINE BLOCK FOR SELECTION OF SUITABLE MATERIAL FOR COST ...DYNAMIC ANALYSIS OF ENGINE BLOCK FOR SELECTION OF SUITABLE MATERIAL FOR COST ...
DYNAMIC ANALYSIS OF ENGINE BLOCK FOR SELECTION OF SUITABLE MATERIAL FOR COST ...Ijripublishers Ijri
 
INVESTIGATION OF COMPOSITE TORSION SHAFT USING MATERIAL MATRIX IN FEA
INVESTIGATION OF COMPOSITE TORSION SHAFT USING MATERIAL MATRIX IN FEAINVESTIGATION OF COMPOSITE TORSION SHAFT USING MATERIAL MATRIX IN FEA
INVESTIGATION OF COMPOSITE TORSION SHAFT USING MATERIAL MATRIX IN FEAIjripublishers Ijri
 
DESIGN AND ANALYSIS OF MULTI STORIED STRUCTURES USING STATIC NON LINEAR ANALYSIS
DESIGN AND ANALYSIS OF MULTI STORIED STRUCTURES USING STATIC NON LINEAR ANALYSISDESIGN AND ANALYSIS OF MULTI STORIED STRUCTURES USING STATIC NON LINEAR ANALYSIS
DESIGN AND ANALYSIS OF MULTI STORIED STRUCTURES USING STATIC NON LINEAR ANALYSISIjripublishers Ijri
 
Ijri te-03-009 thermal investigation (pressure distribution) on box type cyli...
Ijri te-03-009 thermal investigation (pressure distribution) on box type cyli...Ijri te-03-009 thermal investigation (pressure distribution) on box type cyli...
Ijri te-03-009 thermal investigation (pressure distribution) on box type cyli...Ijripublishers Ijri
 
COMPARISON OF ALUMINUM & COMPOSITE MATERIALS FOR SHIP PROPELLER USING FEA
COMPARISON OF ALUMINUM & COMPOSITE MATERIALS FOR SHIP PROPELLER USING FEACOMPARISON OF ALUMINUM & COMPOSITE MATERIALS FOR SHIP PROPELLER USING FEA
COMPARISON OF ALUMINUM & COMPOSITE MATERIALS FOR SHIP PROPELLER USING FEAIjripublishers Ijri
 
ANALYSIS OF SOFT STOREY FOR MULTI STORYED BUILDING IN ZONE-4
ANALYSIS OF SOFT STOREY FOR MULTI STORYED BUILDING IN ZONE-4ANALYSIS OF SOFT STOREY FOR MULTI STORYED BUILDING IN ZONE-4
ANALYSIS OF SOFT STOREY FOR MULTI STORYED BUILDING IN ZONE-4Ijripublishers Ijri
 
OPTIMIZED DIE STRUCTURE DESIGN OF PLASTIC INJECTION MOULD USING FEM TECHNIQUE
OPTIMIZED DIE STRUCTURE DESIGN OF PLASTIC INJECTION MOULD USING FEM TECHNIQUEOPTIMIZED DIE STRUCTURE DESIGN OF PLASTIC INJECTION MOULD USING FEM TECHNIQUE
OPTIMIZED DIE STRUCTURE DESIGN OF PLASTIC INJECTION MOULD USING FEM TECHNIQUEIjripublishers Ijri
 
Over the digital counter
Over the digital counterOver the digital counter
Over the digital counterVanksen
 

Viewers also liked (20)

VALIDATION OF COMPOSITE DRAWER USING FEA AT CREO-GENIC TEMPERATURE
VALIDATION OF COMPOSITE DRAWER USING FEA AT CREO-GENIC TEMPERATUREVALIDATION OF COMPOSITE DRAWER USING FEA AT CREO-GENIC TEMPERATURE
VALIDATION OF COMPOSITE DRAWER USING FEA AT CREO-GENIC TEMPERATURE
 
THERMAL INVESTIGATION (PRESSURE DISTRIBUTION) ON BOX TYPE CYLINDER HEAD OF A ...
THERMAL INVESTIGATION (PRESSURE DISTRIBUTION) ON BOX TYPE CYLINDER HEAD OF A ...THERMAL INVESTIGATION (PRESSURE DISTRIBUTION) ON BOX TYPE CYLINDER HEAD OF A ...
THERMAL INVESTIGATION (PRESSURE DISTRIBUTION) ON BOX TYPE CYLINDER HEAD OF A ...
 
INVESTIGATION ON MECHANICAL PROPERTIES OF BACTERIAL CONCRETE WITH FLYASH PART...
INVESTIGATION ON MECHANICAL PROPERTIES OF BACTERIAL CONCRETE WITH FLYASH PART...INVESTIGATION ON MECHANICAL PROPERTIES OF BACTERIAL CONCRETE WITH FLYASH PART...
INVESTIGATION ON MECHANICAL PROPERTIES OF BACTERIAL CONCRETE WITH FLYASH PART...
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
 
Ijricit 01-002 enhanced replica detection in short time for large data sets
Ijricit 01-002 enhanced replica detection in  short time for large data setsIjricit 01-002 enhanced replica detection in  short time for large data sets
Ijricit 01-002 enhanced replica detection in short time for large data sets
 
THERMAL INVESTIGATION ON OPEN CYCLE DESICCANT COOLING AIR CONDITIONING
THERMAL INVESTIGATION ON OPEN CYCLE DESICCANT COOLING AIR CONDITIONINGTHERMAL INVESTIGATION ON OPEN CYCLE DESICCANT COOLING AIR CONDITIONING
THERMAL INVESTIGATION ON OPEN CYCLE DESICCANT COOLING AIR CONDITIONING
 
ASSESSMENT OF SELF COMPACTING CONCRETE IMMERSED IN ACIDIC SOLUTIONS WITH PART...
ASSESSMENT OF SELF COMPACTING CONCRETE IMMERSED IN ACIDIC SOLUTIONS WITH PART...ASSESSMENT OF SELF COMPACTING CONCRETE IMMERSED IN ACIDIC SOLUTIONS WITH PART...
ASSESSMENT OF SELF COMPACTING CONCRETE IMMERSED IN ACIDIC SOLUTIONS WITH PART...
 
Experimental Investigation on Heat Transfer By Natural Convection Over A Cyli...
Experimental Investigation on Heat Transfer By Natural Convection Over A Cyli...Experimental Investigation on Heat Transfer By Natural Convection Over A Cyli...
Experimental Investigation on Heat Transfer By Natural Convection Over A Cyli...
 
DEVELOPMENT AND CHARACTERISATION OF HIBISCUS LAMPAS (ADAVI BENDA) SHORT FIBER...
DEVELOPMENT AND CHARACTERISATION OF HIBISCUS LAMPAS (ADAVI BENDA) SHORT FIBER...DEVELOPMENT AND CHARACTERISATION OF HIBISCUS LAMPAS (ADAVI BENDA) SHORT FIBER...
DEVELOPMENT AND CHARACTERISATION OF HIBISCUS LAMPAS (ADAVI BENDA) SHORT FIBER...
 
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
 
fatigue failure analysis of steam turbine shaft using fem technique
 fatigue failure analysis of steam turbine shaft using fem technique fatigue failure analysis of steam turbine shaft using fem technique
fatigue failure analysis of steam turbine shaft using fem technique
 
DESIGN AND ANALYSIS OF MULTI- STAGE STEAM TURBINE BLADE AND SHAFT ASSEMBLY
DESIGN AND ANALYSIS OF MULTI- STAGE STEAM TURBINE BLADE AND SHAFT ASSEMBLYDESIGN AND ANALYSIS OF MULTI- STAGE STEAM TURBINE BLADE AND SHAFT ASSEMBLY
DESIGN AND ANALYSIS OF MULTI- STAGE STEAM TURBINE BLADE AND SHAFT ASSEMBLY
 
DYNAMIC ANALYSIS OF ENGINE BLOCK FOR SELECTION OF SUITABLE MATERIAL FOR COST ...
DYNAMIC ANALYSIS OF ENGINE BLOCK FOR SELECTION OF SUITABLE MATERIAL FOR COST ...DYNAMIC ANALYSIS OF ENGINE BLOCK FOR SELECTION OF SUITABLE MATERIAL FOR COST ...
DYNAMIC ANALYSIS OF ENGINE BLOCK FOR SELECTION OF SUITABLE MATERIAL FOR COST ...
 
INVESTIGATION OF COMPOSITE TORSION SHAFT USING MATERIAL MATRIX IN FEA
INVESTIGATION OF COMPOSITE TORSION SHAFT USING MATERIAL MATRIX IN FEAINVESTIGATION OF COMPOSITE TORSION SHAFT USING MATERIAL MATRIX IN FEA
INVESTIGATION OF COMPOSITE TORSION SHAFT USING MATERIAL MATRIX IN FEA
 
DESIGN AND ANALYSIS OF MULTI STORIED STRUCTURES USING STATIC NON LINEAR ANALYSIS
DESIGN AND ANALYSIS OF MULTI STORIED STRUCTURES USING STATIC NON LINEAR ANALYSISDESIGN AND ANALYSIS OF MULTI STORIED STRUCTURES USING STATIC NON LINEAR ANALYSIS
DESIGN AND ANALYSIS OF MULTI STORIED STRUCTURES USING STATIC NON LINEAR ANALYSIS
 
Ijri te-03-009 thermal investigation (pressure distribution) on box type cyli...
Ijri te-03-009 thermal investigation (pressure distribution) on box type cyli...Ijri te-03-009 thermal investigation (pressure distribution) on box type cyli...
Ijri te-03-009 thermal investigation (pressure distribution) on box type cyli...
 
COMPARISON OF ALUMINUM & COMPOSITE MATERIALS FOR SHIP PROPELLER USING FEA
COMPARISON OF ALUMINUM & COMPOSITE MATERIALS FOR SHIP PROPELLER USING FEACOMPARISON OF ALUMINUM & COMPOSITE MATERIALS FOR SHIP PROPELLER USING FEA
COMPARISON OF ALUMINUM & COMPOSITE MATERIALS FOR SHIP PROPELLER USING FEA
 
ANALYSIS OF SOFT STOREY FOR MULTI STORYED BUILDING IN ZONE-4
ANALYSIS OF SOFT STOREY FOR MULTI STORYED BUILDING IN ZONE-4ANALYSIS OF SOFT STOREY FOR MULTI STORYED BUILDING IN ZONE-4
ANALYSIS OF SOFT STOREY FOR MULTI STORYED BUILDING IN ZONE-4
 
OPTIMIZED DIE STRUCTURE DESIGN OF PLASTIC INJECTION MOULD USING FEM TECHNIQUE
OPTIMIZED DIE STRUCTURE DESIGN OF PLASTIC INJECTION MOULD USING FEM TECHNIQUEOPTIMIZED DIE STRUCTURE DESIGN OF PLASTIC INJECTION MOULD USING FEM TECHNIQUE
OPTIMIZED DIE STRUCTURE DESIGN OF PLASTIC INJECTION MOULD USING FEM TECHNIQUE
 
Over the digital counter
Over the digital counterOver the digital counter
Over the digital counter
 

Similar to PSCSV Patient Self-Driven Multi-Stage Confidentiality Scheme

PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperati...
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperati...PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperati...
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperati...1crore projects
 
2015-16 IEEE final Year Projects@Dreamweb TechnoSolution
2015-16 IEEE final Year Projects@Dreamweb TechnoSolution2015-16 IEEE final Year Projects@Dreamweb TechnoSolution
2015-16 IEEE final Year Projects@Dreamweb TechnoSolutionsubhu8430
 
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...paperpublications3
 
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...IJERA Editor
 
Protecting Sensitive Data
Protecting Sensitive DataProtecting Sensitive Data
Protecting Sensitive Dataaishvarya rathnam
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxAmanBora5
 
Smart Contracts in E-Health records using Blockchain
Smart Contracts in E-Health records using BlockchainSmart Contracts in E-Health records using Blockchain
Smart Contracts in E-Health records using BlockchainIRJET Journal
 
Efficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingEfficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingNaveena N
 
Framework architecture for improving
Framework architecture for improvingFramework architecture for improving
Framework architecture for improvingIJMIT JOURNAL
 
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...IRJET Journal
 
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...IRJET Journal
 
Scalable and secure sharing of personal health records in cloud computing us...
Scalable and secure sharing of personal health
records in cloud computing us...Scalable and secure sharing of personal health
records in cloud computing us...
Scalable and secure sharing of personal health records in cloud computing us...Duraiyarasan S
 
Conceptual model final
Conceptual model finalConceptual model final
Conceptual model finaltomcook8
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...IEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Spoc a secure and privacy preserv...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Spoc a secure and privacy preserv...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Spoc a secure and privacy preserv...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Spoc a secure and privacy preserv...IEEEGLOBALSOFTTECHNOLOGIES
 
Paper id 37201535
Paper id 37201535Paper id 37201535
Paper id 37201535IJRAT
 
Systematic review of quality standards for medical devices and practice measu...
Systematic review of quality standards for medical devices and practice measu...Systematic review of quality standards for medical devices and practice measu...
Systematic review of quality standards for medical devices and practice measu...Pubrica
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Naveena N
 

Similar to PSCSV Patient Self-Driven Multi-Stage Confidentiality Scheme (20)

PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperati...
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperati...PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperati...
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperati...
 
2015-16 IEEE final Year Projects@Dreamweb TechnoSolution
2015-16 IEEE final Year Projects@Dreamweb TechnoSolution2015-16 IEEE final Year Projects@Dreamweb TechnoSolution
2015-16 IEEE final Year Projects@Dreamweb TechnoSolution
 
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...
 
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
 
journal papers.pdf
journal papers.pdfjournal papers.pdf
journal papers.pdf
 
Protecting Sensitive Data
Protecting Sensitive DataProtecting Sensitive Data
Protecting Sensitive Data
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Smart Contracts in E-Health records using Blockchain
Smart Contracts in E-Health records using BlockchainSmart Contracts in E-Health records using Blockchain
Smart Contracts in E-Health records using Blockchain
 
Efficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingEfficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computing
 
Framework architecture for improving
Framework architecture for improvingFramework architecture for improving
Framework architecture for improving
 
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
 
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
 
Scalable and secure sharing of personal health records in cloud computing us...
Scalable and secure sharing of personal health
records in cloud computing us...Scalable and secure sharing of personal health
records in cloud computing us...
Scalable and secure sharing of personal health records in cloud computing us...
 
Conceptual model final
Conceptual model finalConceptual model final
Conceptual model final
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Spoc a secure and privacy preserv...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Spoc a secure and privacy preserv...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Spoc a secure and privacy preserv...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Spoc a secure and privacy preserv...
 
Paper id 37201535
Paper id 37201535Paper id 37201535
Paper id 37201535
 
MEDBLOCK
MEDBLOCKMEDBLOCK
MEDBLOCK
 
Systematic review of quality standards for medical devices and practice measu...
Systematic review of quality standards for medical devices and practice measu...Systematic review of quality standards for medical devices and practice measu...
Systematic review of quality standards for medical devices and practice measu...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 

More from Ijripublishers Ijri

structural and modal analysis of an engine block by varying materials
 structural and modal analysis of an engine block by varying materials structural and modal analysis of an engine block by varying materials
structural and modal analysis of an engine block by varying materialsIjripublishers Ijri
 
life prediction analysis of tweel for the replacement of traditional wheels
 life prediction analysis of tweel for the replacement of traditional wheels life prediction analysis of tweel for the replacement of traditional wheels
life prediction analysis of tweel for the replacement of traditional wheelsIjripublishers Ijri
 
simulation and analysis of 4 stroke single cylinder direct injection diesel e...
simulation and analysis of 4 stroke single cylinder direct injection diesel e...simulation and analysis of 4 stroke single cylinder direct injection diesel e...
simulation and analysis of 4 stroke single cylinder direct injection diesel e...Ijripublishers Ijri
 
investigation on thermal properties of epoxy composites filled with pine app...
 investigation on thermal properties of epoxy composites filled with pine app... investigation on thermal properties of epoxy composites filled with pine app...
investigation on thermal properties of epoxy composites filled with pine app...Ijripublishers Ijri
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijripublishers Ijri
 
public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...Ijripublishers Ijri
 
Ijricit 01-006 a secluded approval on clould storage proceedings
Ijricit 01-006 a secluded approval on clould storage proceedingsIjricit 01-006 a secluded approval on clould storage proceedings
Ijricit 01-006 a secluded approval on clould storage proceedingsIjripublishers Ijri
 
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Ijripublishers Ijri
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijripublishers Ijri
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
 
Ijri te-03-011 performance testing of vortex tubes with variable parameters
Ijri te-03-011 performance testing of vortex tubes with variable parametersIjri te-03-011 performance testing of vortex tubes with variable parameters
Ijri te-03-011 performance testing of vortex tubes with variable parametersIjripublishers Ijri
 
a prediction of thermal properties of epoxy composites filled with pine appl...
 a prediction of thermal properties of epoxy composites filled with pine appl... a prediction of thermal properties of epoxy composites filled with pine appl...
a prediction of thermal properties of epoxy composites filled with pine appl...Ijripublishers Ijri
 
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporator
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporatorIjri te-03-013 modeling and thermal analysis of air-conditioner evaporator
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporatorIjripublishers Ijri
 
Ijri te-03-012 design and optimization of water cool condenser for central ai...
Ijri te-03-012 design and optimization of water cool condenser for central ai...Ijri te-03-012 design and optimization of water cool condenser for central ai...
Ijri te-03-012 design and optimization of water cool condenser for central ai...Ijripublishers Ijri
 
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...Ijripublishers Ijri
 
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...Ijripublishers Ijri
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjripublishers Ijri
 
cfd analysis on ejector cooling system with variable throat geometry
 cfd analysis on ejector cooling system with variable throat geometry cfd analysis on ejector cooling system with variable throat geometry
cfd analysis on ejector cooling system with variable throat geometryIjripublishers Ijri
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijripublishers Ijri
 
Ijri te-03-010 cfd analysis on ejector cooling system with variable throat ge...
Ijri te-03-010 cfd analysis on ejector cooling system with variable throat ge...Ijri te-03-010 cfd analysis on ejector cooling system with variable throat ge...
Ijri te-03-010 cfd analysis on ejector cooling system with variable throat ge...Ijripublishers Ijri
 

More from Ijripublishers Ijri (20)

structural and modal analysis of an engine block by varying materials
 structural and modal analysis of an engine block by varying materials structural and modal analysis of an engine block by varying materials
structural and modal analysis of an engine block by varying materials
 
life prediction analysis of tweel for the replacement of traditional wheels
 life prediction analysis of tweel for the replacement of traditional wheels life prediction analysis of tweel for the replacement of traditional wheels
life prediction analysis of tweel for the replacement of traditional wheels
 
simulation and analysis of 4 stroke single cylinder direct injection diesel e...
simulation and analysis of 4 stroke single cylinder direct injection diesel e...simulation and analysis of 4 stroke single cylinder direct injection diesel e...
simulation and analysis of 4 stroke single cylinder direct injection diesel e...
 
investigation on thermal properties of epoxy composites filled with pine app...
 investigation on thermal properties of epoxy composites filled with pine app... investigation on thermal properties of epoxy composites filled with pine app...
investigation on thermal properties of epoxy composites filled with pine app...
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
 
public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...
 
Ijricit 01-006 a secluded approval on clould storage proceedings
Ijricit 01-006 a secluded approval on clould storage proceedingsIjricit 01-006 a secluded approval on clould storage proceedings
Ijricit 01-006 a secluded approval on clould storage proceedings
 
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
 
Ijri te-03-011 performance testing of vortex tubes with variable parameters
Ijri te-03-011 performance testing of vortex tubes with variable parametersIjri te-03-011 performance testing of vortex tubes with variable parameters
Ijri te-03-011 performance testing of vortex tubes with variable parameters
 
a prediction of thermal properties of epoxy composites filled with pine appl...
 a prediction of thermal properties of epoxy composites filled with pine appl... a prediction of thermal properties of epoxy composites filled with pine appl...
a prediction of thermal properties of epoxy composites filled with pine appl...
 
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporator
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporatorIjri te-03-013 modeling and thermal analysis of air-conditioner evaporator
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporator
 
Ijri te-03-012 design and optimization of water cool condenser for central ai...
Ijri te-03-012 design and optimization of water cool condenser for central ai...Ijri te-03-012 design and optimization of water cool condenser for central ai...
Ijri te-03-012 design and optimization of water cool condenser for central ai...
 
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...
 
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individuality
 
cfd analysis on ejector cooling system with variable throat geometry
 cfd analysis on ejector cooling system with variable throat geometry cfd analysis on ejector cooling system with variable throat geometry
cfd analysis on ejector cooling system with variable throat geometry
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
 
Ijri te-03-010 cfd analysis on ejector cooling system with variable throat ge...
Ijri te-03-010 cfd analysis on ejector cooling system with variable throat ge...Ijri te-03-010 cfd analysis on ejector cooling system with variable throat ge...
Ijri te-03-010 cfd analysis on ejector cooling system with variable throat ge...
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

PSCSV Patient Self-Driven Multi-Stage Confidentiality Scheme

  • 1. 14 International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET) International Journal of Research and Innovation in Computers and Information Technology (IJRICIT) PSCSV - PATIENT SELF-DRIVEN MULTI-STAGE CONFIDENTIALITY SAFEGUARD SUPPORTIVE VERIFICATION SCHEME Kurra Sambasiva Rao1 , K.Ramesh2 . 1 Research Scholar, Department of Computer Science and Engineering, Chintalapudi Engineering College, Guntur, AP, India. 2 Associate professor, Department of Computer Science and Engineering, Chintalapudi Engineering College, Guntur, AP, India. *Corresponding Author: Kurra Sambasiva Rao, Research Scholar, Department of Computer Science and Engi- neering, Chintalapudi Engineering College, Guntur, AP, India. Email: kurrasambasivarao.cec@gmail.com Year of publication: 2016 Review Type: peer reviewed Volume: I, Issue : I Citation: Kurra Sambasiva Rao, Research Scholar, "Pscsv - Pa- tient Self-Driven Multi-Stage Confidentiality Safeguard Support- ive Verification Scheme" International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET) (2016) 14-16 AIM The main aim of this paper is a district approved acces- sible confidential model (AACM) is based on devised by a new technique of attribute-based designated verifier signature, a patient self-driven multi-stage confidential- ity safeguard supportive verification scheme (PSCSV) un- derstanding three levels of protection and confidentiality necessity in distributed mobile-healthconcern cloud com- puting system is anticipated. INTRODUCTION In mobile-health concern social networks, the individual health data is forever shared amongst the patients situat- ed in relevant social communities affliction from the simi- lar illness for joint support, and across distributed health concern contributors prepared with their own cloud serv- ers for medical specialist. However, it also fetches about a sequence of challenges, particularly how to make sure the protection and confidentiality of the patients individ- ual health data from a variety of assaults in the wireless communication channel such as eavesdropping and in- terfering and As to the protection aspect, one of the major concern is access control of patients personal individual health data, specifically it is only the approved medical doctors or organizations that can pull through the pa- tients individual health data during the data distribution in the distributed mobile-health concern cloud computing system. In practical, most patients are worried about the privacy of their individual health data since it is probable to make them in problem for each kind of illegitimate collection and exposĂ©. Therefore, in distributed mobile-health con- cern cloud computing schemes, which part of the patients individual health data should be distributed and which medical doctors their personal health data should be dis- tributed with have become two stubborn issues challeng- ing vital solutions. EXISTING SYSTEM In a mobile-healthconcern scheme information privacy is much significant but in conventional scheme framework it is not sufficient for to only assurance to data privacy of the patient’s individual health data in the honest-but- curious cloud server model since the regular communi- cation among a patient and a specialized medical doctor can guide the challenger to conclude that the patient is tormented from a precise disease with a high possibility. Regrettably, the difficulty of how to defend both the pa- tients information privacy and identity confidentiality in the distributed mobile-health concern cloud computing situation under the malicious model was left unaffected. Disadvantages of Existing System: • Information privacy is short. • Information redundancy is elevated. • Infringement data protection. PROPOSED SYSTEM Proposed system for a privacy-protecting verification scheme in unidentified P2P schemes based on Zero-in- formation Proof. However, the heavy computational over- head of Zero-Knowledge Proof makes it unrealistic when straightforwardly related to the distributed mobile-health concern cloud computing systems where the computa- Abstract The dispersed mobile-health concern in cloud computing significantly make easy protected and well-organized patient treatment for medical discussion by distributional individual health data amongst the health concern contributors. This scheme should fetch about the confront of maintening both the data privacy and patient’s individuality confidentiality concurrently. Many conventional access control and unidentified verification methods cannot be directly exploited. To resolve the trouble proposed a district approved accessible confidential model (AACM) is recognized. Patients can give permission to physicians by setting an permission tree sustaining bendable threshold predicates. Then related to that, by formulating a novel procedure of attribute based nominated authenticator signature, a patient self-driven multi-stage confidentiality safeguard supportive verification scheme (PSCSV) understanding three levels of protection and confi- dentiality necessity in distributed mobile-health concern cloud computing system is anticipated. The directly approved physicians, the obliquely approved physicians and the illegitimate persons in medical consultation can correspondingly decode the personal health data and/or authenticate patient individualities by gratifying the admittance tree with their own attribute sets.
  • 2. 15 International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET) tional assert for patients is guarded. Recommended pa- tients have to approved to treatment and be warned each time when authorized physicians access their proceed- ings and also our proposed scheme is a patient-centric and fine filtered data access control in multi-owner back- grounds is implemented for protected personal health proceedings in cloud computing. Our proposed mobile-health concern scheme primarily spotlighted on the central cloud computing system which is not enough for competently handing out the growing volume of personal health data in mobile-health concern cloud computing scheme. In scattered mobile-health con- cern cloud computing schemes, all the associates can be classified into three groups: the directly approved physi- cians with green tickets in the local health concern con- tributor who are approved by the patients and can both access the patient’s personal health data and verify the patient’s individuality and the indirectly approved phy- sicians with yellow ticket in the remote health concern contributors who are authorized by the directly approved physicians for medical consultation or some research reasons. They can only interact with the personal health data, but not the patient’s individuality. For the unau- thorized persons with red tickets, nothing could be ac- quired. Advantages of proposed system: • Mobile-health concern scheme is fully prohibited and protected with encryption platforms. • Data loss eliminated and data redundancy eradicated. • scheme contributes full safeguard for patient data and qualities. SYSTEM ARCHITECTURE MODULES E-healthconcern System Framework: E-healthconcern System consists of three components: body area networks (BANs), wireless transmission net- works and the healthconcern providers equipped with their own cloud servers. The patient’s personal health information is securely transmitted to the healthconcern provider for the authorized physicians to access and per- form medical treatment. Illustrate the unique character- istics of distributed mobile-healthconcern cloud comput- ing systems where all the personal health information can be shared among patients suffering from the same dis- ease for mutual support or among the authorized physi- cians in distributed healthconcern providers and medical research institutions for medical consultation. 2. Authorized accessible privacy model: Multi-level privacy-preserving cooperative authentica- tion is established to allow the patients to authorize cor- responding privileges to different kinds of physicians lo- cated in distributed healthconcern providers by setting an access tree supporting flexible threshold predicates. Propose a novel authorized accessible privacy model for distributed mobile-healthconcern cloud computing sys- tems which consists of the following two components: an attribute based designated verifier signature scheme (ADVS) and the corresponding adversary model. 3. Security Verification: The security and anonymity level of our proposed con- struction is significantly enhanced by associating it to the underlying Gap Bilinear Diffie-Hellman (GBDH) problem and the number of patients’ attributes to deal with the privacy leakage in patient sparsely distributed scenarios. More significantly, without the knowledge of which phy- sician in the healthconcern provider is professional in treating his illness, the best way for the patient is to en- crypt his own PHI under a specified access policy rather than assign each physician a secret key. As a result, the authorized physicians whose attribute set satisfy the ac- cess policy can recover the PHI and the access control management also becomes more efficient. 4.Performance Evaluation: The efficiency of PSCSV in terms of storage overhead, computational complexity and communication cost. a pa- tient-centric and fine-grained data access control using ABE to secure personal health records in cloud comput- ing without privacy-preserving authentication. To achieve the same security, our construction performs more effi- ciently than the traditional designated verifier signature for all the directly authorized physicians, where the over- heads are linear to the number of directly authorized phy- sicians. CONCLUSION Formulating a novel procedure of attribute based nomi- nated authenticator signature, a patient self-driven mul- ti-stage confidentiality safeguard supportive verification scheme (PSCSV) understanding three levels of protec- tion and confidentiality necessity in distributed mobile- healthconcern cloud computing system is anticipated. This PSCSV can resist various kinds of malicious attacks and far outperforms previous schemes in terms of stor- age, computational and communication overhead. Our future work will focus on exploring the relation between patient mobility and confidentiality under the distributed system. REFERENCES I. J. Misic and V. B. Misic, “Implementation of security policy for clinical information systems over wireless sen- sor network,” Ad Hoc Netw., vol. 5, no. 1, pp. 134–144, Jan. 2007. II. J. Misic and V. Misic, “Enforcing patient privacy in healthconcern WSNs through key distribution algo- rithms,” Security Commun. Netw. J., vol. 1, no. 5, pp. 417–429, 2008
  • 3. 16 International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET) III. M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings,” in Proc. 6th Int. ICST Conf. Security Privacy Comm. Netw., 2010, pp. 89–106. AUTHORS Kurra Sambasiva Rao, Research Scholar, Department of Computer Science and Engineering, Chintalapudi Engineering College, Guntur, AP, India. K.Ramesh, Associate professor, Department of Computer Science and Engineering, Chintalapudi Engineering College, Guntur, AP, India.