SlideShare a Scribd company logo
1 of 7
PSMPA: Patient Self-Controllable and Multi-Level Privacy-
Preserving Cooperative Authentication in Distributed m-
Healthcare Cloud Computing System
ABSTRACT:
Distributed m-healthcare cloud computing system significantly facilitates efficient
patient treatment for medical consultation by sharing personal health information
among healthcare providers. However, it brings about the challenge of keeping
both the data confidentiality and patients’ identity privacy simultaneously. Many
existing access control and anonymous authentication schemes cannot be
straightforwardly exploited. To solve the problem, in this paper, a novel authorized
accessible privacy model (AAPM) is established. Patients can authorize physicians
by setting an access tree supporting flexible threshold predicates. Then, based on it,
by devising a new technique of attribute-based designated verifier signature, a
patient self-controllable multi-level privacy-preserving cooperative authentication
scheme (PSMPA) realizing three levels of security and privacy requirement in
distributed m-healthcare cloud computing system is proposed. The directly
authorized physicians, the indirectly authorized physicians and the unauthorized
persons in medical consultation can respectively decipher the personal health
information and/or verify patients’ identities by satisfying the access tree with their
own attribute sets. Finally, the formal security proof and simulation results
illustrate our scheme can resist various kinds of attacks and far outperforms the
previous ones in terms of computational, communication and storage overhead.
EXISTING SYSTEM:
īļ A fine-grained distributed data access control scheme is proposed using the
technique of attribute based encryption (ABE). A rendezvous-based access
control method provides access privilege if and only if the patient and the
physician meet in the physical world.
īļ Recently, a patient-centric and fine-grained data access control in multi-
owner settings is constructed for securing personal health records in cloud
computing.
īļ Lin et. al. proposed SAGE achieving not only the content-oriented privacy
but also the contextual privacy against a strong global adversary.
īļ Sun et al. proposed a solution to privacy and emergency responses based on
anonymous credential, pseudorandom number generator and proof of
knowledge.
īļ Lu et al. proposed a privacy-preserving authentication scheme in anonymous
P2P systems based on Zero-Knowledge Proof.
DISADVANTAGES OF EXISTING SYSTEM:
īļ It mainly focuses on the central cloud computing system which is not
sufficient for efficiently processing the increasing volume of personal health
information in m-healthcare cloud computing system.
īļ Moreover, it is not enough to only guarantee the data confidentiality of the
patient’s personal health information in the honest-but-curious cloud server
model since the frequent communication between a patient and a
professional physician can lead the adversary to conclude that the patient is
suffering from a specific disease with a high probability.
īļ The heavy computational overhead of Zero-Knowledge Proof makes it
impractical when directly applied to the distributed m-healthcare cloud
computing systems where the computational resource for patients is
constrained.
PROPOSED SYSTEM:
īļ In this paper, we consider simultaneously achieving data confidentiality and
identity privacy with high efficiency. In distributed m-healthcare cloud
computing systems, all the members can be classified into three categories:
the directly authorized physicians with green labels in the local healthcare
provider who are authorized by the patients and can both access the patient’s
personal health information and verify the patient’s identity and the
indirectly authorized physicians with yellow labels in the remote healthcare
providers who are authorized by the directly authorized physicians for
medical consultant or some research purposes (i.e., since they are not
authorized by the patients, we use the term ‘indirectly authorized’ instead).
īļ They can only access the personal health information, but not the patient’s
identity. For the unauthorized persons with red labels, nothing could be
obtained. By extending the techniques of attribute based access control and
designated verifier signatures (DVS) on de-identified health information, we
realize three different levels of privacy-preserving requirement mentioned
above.
ADVANTAGES OF PROPOSED SYSTEM:
īļ A novel authorized accessible privacy model (AAPM) for the multi-level
privacy-preserving cooperative authentication is established to allow the
patients to authorize corresponding privileges to different kinds of
physicians located in distributed healthcare providers by setting an access
tree supporting flexible threshold predicates.
īļ Based on AAPM, a patient self-controllable multilevel privacy-preserving
cooperative authentication scheme (PSMPA) in the distributed m-healthcare
cloud computing system is proposed, realizing three different levels of
security and privacy requirement for the patients.
īļ The formal security proof and simulation results show that our scheme far
outperforms the previous constructions in terms of privacy-preserving
capability, computational, communication and storage overhead.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
īƒ˜ System : Pentium IV 2.4 GHz.
īƒ˜ Hard Disk : 40 GB.
īƒ˜ Floppy Drive : 1.44 Mb.
īƒ˜ Monitor : 15 VGA Colour.
īƒ˜ Mouse : Logitech.
īƒ˜ Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
īƒ˜ Operating system : Windows XP/7.
īƒ˜ Coding Language : ASP.net, C#.net
īƒ˜ Tool : Visual Studio 2010
īƒ˜ Database : SQL SERVER 2008
REFERENCE:
Jun Zhou, Xiaodong Lin, Senior Member, IEEE, Xiaolei Dong, and Zhenfu Cao,
Senior Member, IEEE, “PSMPA: Patient Self-Controllable and Multi-Level
Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud
Computing System”, IEEE TRANSACTIONS ON PARALLEL AND
DISTRIBUTED SYSTEMS,VOL. 26, NO. 6, JUNE 2015.

More Related Content

What's hot

automated doctor appointment and prescription management system
automated doctor appointment and prescription management systemautomated doctor appointment and prescription management system
automated doctor appointment and prescription management systemluckymoni76
 
Health Application Integration with (Electronic Health Records) EHR systems
Health Application Integration with (Electronic Health Records) EHR systemsHealth Application Integration with (Electronic Health Records) EHR systems
Health Application Integration with (Electronic Health Records) EHR systemsFaichi Solutions
 
Universal Identity Management Model Based on Anonymous Credentilals
Universal Identity Management Model Based on Anonymous CredentilalsUniversal Identity Management Model Based on Anonymous Credentilals
Universal Identity Management Model Based on Anonymous CredentilalsRatheesh Kumar R
 
Achieve Privacy-Preserving Priority Classification on Patient Health Data in ...
Achieve Privacy-Preserving Priority Classification on Patient Health Data in ...Achieve Privacy-Preserving Priority Classification on Patient Health Data in ...
Achieve Privacy-Preserving Priority Classification on Patient Health Data in ...JAYAPRAKASH JPINFOTECH
 
Online doctor appointment and emr system
Online doctor appointment and emr systemOnline doctor appointment and emr system
Online doctor appointment and emr systemAnjelika Parasar
 
Paper id 37201535
Paper id 37201535Paper id 37201535
Paper id 37201535IJRAT
 
"Hospital Management"
"Hospital Management""Hospital Management"
"Hospital Management"vivek kct
 
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATIONCLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATIONijdpsjournal
 
Java presentation
Java presentationJava presentation
Java presentationShaikat Saha
 
Clinic Management System
Clinic Management SystemClinic Management System
Clinic Management SystemJayant Velichety
 
Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...Papitha Velumani
 
Online doctor appointment
Online doctor appointmentOnline doctor appointment
Online doctor appointmentAmna Nawazish
 
Confidentiality
ConfidentialityConfidentiality
Confidentialitymshaner
 

What's hot (18)

automated doctor appointment and prescription management system
automated doctor appointment and prescription management systemautomated doctor appointment and prescription management system
automated doctor appointment and prescription management system
 
VEPSER
VEPSERVEPSER
VEPSER
 
Use of Automated Tablet based clinic appointment system
Use of Automated Tablet based clinic  appointment systemUse of Automated Tablet based clinic  appointment system
Use of Automated Tablet based clinic appointment system
 
Health Application Integration with (Electronic Health Records) EHR systems
Health Application Integration with (Electronic Health Records) EHR systemsHealth Application Integration with (Electronic Health Records) EHR systems
Health Application Integration with (Electronic Health Records) EHR systems
 
Universal Identity Management Model Based on Anonymous Credentilals
Universal Identity Management Model Based on Anonymous CredentilalsUniversal Identity Management Model Based on Anonymous Credentilals
Universal Identity Management Model Based on Anonymous Credentilals
 
Achieve Privacy-Preserving Priority Classification on Patient Health Data in ...
Achieve Privacy-Preserving Priority Classification on Patient Health Data in ...Achieve Privacy-Preserving Priority Classification on Patient Health Data in ...
Achieve Privacy-Preserving Priority Classification on Patient Health Data in ...
 
Online doctor appointment and emr system
Online doctor appointment and emr systemOnline doctor appointment and emr system
Online doctor appointment and emr system
 
Project report-482
Project report-482Project report-482
Project report-482
 
Paper id 37201535
Paper id 37201535Paper id 37201535
Paper id 37201535
 
"Hospital Management"
"Hospital Management""Hospital Management"
"Hospital Management"
 
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATIONCLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION
 
Book Cover - Zaleski
Book Cover - ZaleskiBook Cover - Zaleski
Book Cover - Zaleski
 
Java presentation
Java presentationJava presentation
Java presentation
 
Clinic Management System
Clinic Management SystemClinic Management System
Clinic Management System
 
Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...
 
Chkbck demo
Chkbck demoChkbck demo
Chkbck demo
 
Online doctor appointment
Online doctor appointmentOnline doctor appointment
Online doctor appointment
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 

Similar to PSMPA: Patient Self-Controllable Multi-Level Privacy Scheme

Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...Ijripublishers Ijri
 
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperati...
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperati...PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperati...
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperati...1crore projects
 
2015-16 IEEE final Year Projects@Dreamweb TechnoSolution
2015-16 IEEE final Year Projects@Dreamweb TechnoSolution2015-16 IEEE final Year Projects@Dreamweb TechnoSolution
2015-16 IEEE final Year Projects@Dreamweb TechnoSolutionsubhu8430
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
 
Efficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingEfficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingNaveena N
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Naveena N
 
Conceptual model final
Conceptual model finalConceptual model final
Conceptual model finaltomcook8
 
Patient Privacy Control for Health Care in Cloud Computing System
Patient Privacy Control for Health Care in Cloud Computing  SystemPatient Privacy Control for Health Care in Cloud Computing  System
Patient Privacy Control for Health Care in Cloud Computing SystemIRJET Journal
 
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...CloudTechnologies
 
Medical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdfMedical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdfVishalSoni95234
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...ZTech Proje
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...JPINFOTECH JAYAPRAKASH
 
Iaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd cplm cloud facilitated privacy shielding leakageIaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd cplm cloud facilitated privacy shielding leakageIaetsd Iaetsd
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxAmanBora5
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...eSAT Journals
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET Journal
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataIRJET Journal
 
amit.pj2.pptx
amit.pj2.pptxamit.pj2.pptx
amit.pj2.pptxAryanVk
 
Scalable and secure sharing of personal health records in cloud computing us...
Scalable and secure sharing of personal health
records in cloud computing us...Scalable and secure sharing of personal health
records in cloud computing us...
Scalable and secure sharing of personal health records in cloud computing us...Duraiyarasan S
 

Similar to PSMPA: Patient Self-Controllable Multi-Level Privacy Scheme (20)

Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
 
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperati...
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperati...PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperati...
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperati...
 
2015-16 IEEE final Year Projects@Dreamweb TechnoSolution
2015-16 IEEE final Year Projects@Dreamweb TechnoSolution2015-16 IEEE final Year Projects@Dreamweb TechnoSolution
2015-16 IEEE final Year Projects@Dreamweb TechnoSolution
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
Efficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingEfficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computing
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Conceptual model final
Conceptual model finalConceptual model final
Conceptual model final
 
Patient Privacy Control for Health Care in Cloud Computing System
Patient Privacy Control for Health Care in Cloud Computing  SystemPatient Privacy Control for Health Care in Cloud Computing  System
Patient Privacy Control for Health Care in Cloud Computing System
 
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...
 
Medical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdfMedical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdf
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...
 
Iaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd cplm cloud facilitated privacy shielding leakageIaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd cplm cloud facilitated privacy shielding leakage
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
 
amit.pj2.pptx
amit.pj2.pptxamit.pj2.pptx
amit.pj2.pptx
 
Scalable and secure sharing of personal health records in cloud computing us...
Scalable and secure sharing of personal health
records in cloud computing us...Scalable and secure sharing of personal health
records in cloud computing us...
Scalable and secure sharing of personal health records in cloud computing us...
 

More from jpstudcorner

Variable length signature for near-duplicate
Variable length signature for near-duplicateVariable length signature for near-duplicate
Variable length signature for near-duplicatejpstudcorner
 
Robust representation and recognition of facial
Robust representation and recognition of facialRobust representation and recognition of facial
Robust representation and recognition of facialjpstudcorner
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpegjpstudcorner
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpegjpstudcorner
 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievalPareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievaljpstudcorner
 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsctMultifocus image fusion based on nsct
Multifocus image fusion based on nsctjpstudcorner
 
Image super resolution based on
Image super resolution based onImage super resolution based on
Image super resolution based onjpstudcorner
 
Fractal analysis for reduced reference
Fractal analysis for reduced referenceFractal analysis for reduced reference
Fractal analysis for reduced referencejpstudcorner
 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchFace sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchjpstudcorner
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motionjpstudcorner
 
Combining left and right palmprint images for
Combining left and right palmprint images forCombining left and right palmprint images for
Combining left and right palmprint images forjpstudcorner
 
A probabilistic approach for color correction
A probabilistic approach for color correctionA probabilistic approach for color correction
A probabilistic approach for color correctionjpstudcorner
 
A no reference texture regularity metric
A no reference texture regularity metricA no reference texture regularity metric
A no reference texture regularity metricjpstudcorner
 
A feature enriched completely blind image
A feature enriched completely blind imageA feature enriched completely blind image
A feature enriched completely blind imagejpstudcorner
 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitatejpstudcorner
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertainjpstudcorner
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detectionjpstudcorner
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploadedjpstudcorner
 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware enginejpstudcorner
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of networkjpstudcorner
 

More from jpstudcorner (20)

Variable length signature for near-duplicate
Variable length signature for near-duplicateVariable length signature for near-duplicate
Variable length signature for near-duplicate
 
Robust representation and recognition of facial
Robust representation and recognition of facialRobust representation and recognition of facial
Robust representation and recognition of facial
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievalPareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrieval
 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsctMultifocus image fusion based on nsct
Multifocus image fusion based on nsct
 
Image super resolution based on
Image super resolution based onImage super resolution based on
Image super resolution based on
 
Fractal analysis for reduced reference
Fractal analysis for reduced referenceFractal analysis for reduced reference
Fractal analysis for reduced reference
 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchFace sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy search
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motion
 
Combining left and right palmprint images for
Combining left and right palmprint images forCombining left and right palmprint images for
Combining left and right palmprint images for
 
A probabilistic approach for color correction
A probabilistic approach for color correctionA probabilistic approach for color correction
A probabilistic approach for color correction
 
A no reference texture regularity metric
A no reference texture regularity metricA no reference texture regularity metric
A no reference texture regularity metric
 
A feature enriched completely blind image
A feature enriched completely blind imageA feature enriched completely blind image
A feature enriched completely blind image
 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitate
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detection
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware engine
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of network
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEslot gacor bisa pakai pulsa
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Recently uploaded (20)

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

PSMPA: Patient Self-Controllable Multi-Level Privacy Scheme

  • 1. PSMPA: Patient Self-Controllable and Multi-Level Privacy- Preserving Cooperative Authentication in Distributed m- Healthcare Cloud Computing System ABSTRACT: Distributed m-healthcare cloud computing system significantly facilitates efficient patient treatment for medical consultation by sharing personal health information among healthcare providers. However, it brings about the challenge of keeping both the data confidentiality and patients’ identity privacy simultaneously. Many existing access control and anonymous authentication schemes cannot be straightforwardly exploited. To solve the problem, in this paper, a novel authorized accessible privacy model (AAPM) is established. Patients can authorize physicians by setting an access tree supporting flexible threshold predicates. Then, based on it, by devising a new technique of attribute-based designated verifier signature, a patient self-controllable multi-level privacy-preserving cooperative authentication scheme (PSMPA) realizing three levels of security and privacy requirement in distributed m-healthcare cloud computing system is proposed. The directly authorized physicians, the indirectly authorized physicians and the unauthorized persons in medical consultation can respectively decipher the personal health information and/or verify patients’ identities by satisfying the access tree with their
  • 2. own attribute sets. Finally, the formal security proof and simulation results illustrate our scheme can resist various kinds of attacks and far outperforms the previous ones in terms of computational, communication and storage overhead. EXISTING SYSTEM: īļ A fine-grained distributed data access control scheme is proposed using the technique of attribute based encryption (ABE). A rendezvous-based access control method provides access privilege if and only if the patient and the physician meet in the physical world. īļ Recently, a patient-centric and fine-grained data access control in multi- owner settings is constructed for securing personal health records in cloud computing. īļ Lin et. al. proposed SAGE achieving not only the content-oriented privacy but also the contextual privacy against a strong global adversary. īļ Sun et al. proposed a solution to privacy and emergency responses based on anonymous credential, pseudorandom number generator and proof of knowledge. īļ Lu et al. proposed a privacy-preserving authentication scheme in anonymous P2P systems based on Zero-Knowledge Proof.
  • 3. DISADVANTAGES OF EXISTING SYSTEM: īļ It mainly focuses on the central cloud computing system which is not sufficient for efficiently processing the increasing volume of personal health information in m-healthcare cloud computing system. īļ Moreover, it is not enough to only guarantee the data confidentiality of the patient’s personal health information in the honest-but-curious cloud server model since the frequent communication between a patient and a professional physician can lead the adversary to conclude that the patient is suffering from a specific disease with a high probability. īļ The heavy computational overhead of Zero-Knowledge Proof makes it impractical when directly applied to the distributed m-healthcare cloud computing systems where the computational resource for patients is constrained. PROPOSED SYSTEM: īļ In this paper, we consider simultaneously achieving data confidentiality and identity privacy with high efficiency. In distributed m-healthcare cloud computing systems, all the members can be classified into three categories:
  • 4. the directly authorized physicians with green labels in the local healthcare provider who are authorized by the patients and can both access the patient’s personal health information and verify the patient’s identity and the indirectly authorized physicians with yellow labels in the remote healthcare providers who are authorized by the directly authorized physicians for medical consultant or some research purposes (i.e., since they are not authorized by the patients, we use the term ‘indirectly authorized’ instead). īļ They can only access the personal health information, but not the patient’s identity. For the unauthorized persons with red labels, nothing could be obtained. By extending the techniques of attribute based access control and designated verifier signatures (DVS) on de-identified health information, we realize three different levels of privacy-preserving requirement mentioned above. ADVANTAGES OF PROPOSED SYSTEM: īļ A novel authorized accessible privacy model (AAPM) for the multi-level privacy-preserving cooperative authentication is established to allow the patients to authorize corresponding privileges to different kinds of physicians located in distributed healthcare providers by setting an access tree supporting flexible threshold predicates.
  • 5. īļ Based on AAPM, a patient self-controllable multilevel privacy-preserving cooperative authentication scheme (PSMPA) in the distributed m-healthcare cloud computing system is proposed, realizing three different levels of security and privacy requirement for the patients. īļ The formal security proof and simulation results show that our scheme far outperforms the previous constructions in terms of privacy-preserving capability, computational, communication and storage overhead. SYSTEM ARCHITECTURE:
  • 6. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: īƒ˜ System : Pentium IV 2.4 GHz. īƒ˜ Hard Disk : 40 GB. īƒ˜ Floppy Drive : 1.44 Mb. īƒ˜ Monitor : 15 VGA Colour. īƒ˜ Mouse : Logitech. īƒ˜ Ram : 512 Mb. SOFTWARE REQUIREMENTS: īƒ˜ Operating system : Windows XP/7. īƒ˜ Coding Language : ASP.net, C#.net īƒ˜ Tool : Visual Studio 2010 īƒ˜ Database : SQL SERVER 2008 REFERENCE: Jun Zhou, Xiaodong Lin, Senior Member, IEEE, Xiaolei Dong, and Zhenfu Cao, Senior Member, IEEE, “PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud
  • 7. Computing System”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,VOL. 26, NO. 6, JUNE 2015.