VISVESVARAYA TECHNOLOGICAL UNIVERSITYJnana Sangama, Belgaum, Karnataka-590 014.A Seminar On“Scalable and Secure Sharing of...
A G E N D AoAbstractoPersonal Health Records in cloud computingoExisting systemoDrawbacksoProposed SystemoModulesoApplicat...
 Personal health record (PHR) is an emergingpatient-centric model of health informationexchange, which is often outsource...
 Issues such as risks of privacy exposure,scalability in key management, flexibleaccess and efficient user revocation, ha...
 To achieve fine-grained and scalable data access control forPHRs, we leverage attribute based encryption (ABE)techniques...
 Due to the high cost of building and maintaining specializeddata centers, many PHR services are outsourced to or provide...
 Difficult for long-term medication Several kinds of medicine Diagnosing Frustration of missing doses Manual Insurance...
ArchitectureThe proposed framework for patient-centric, secure and scalable PHR sharing on semi-trustedstorage under multi...
 In this paper, propose a novel patient-centricframework and a suite of mechanisms for dataaccess control to PHRs stored ...
Proposed System In order to protect the personal health data storedon a semi-trusted server, we adopt attribute-basedencr...
 PHR Owner Module Cloud Server Module Attribute based Access Policy Module Data confidentiality ModuleMODULES
 The key idea is to divide the system into multiple security domains(namely, public domains (PUDs) and personal domains (...
 users having read and write access as data readers andcontributors, respectively. Attribute based Access Policy Module...
 The owners upload ABE-encrypted PHR files to the server. Each owner’s PHR file is encrypted both under a certain finegr...
BLOCK DIAGRAM
Extensive analytical and experimental results are presentedwhich shows Data confidentiality On-demand revocation Write ...
SAMPLE MODEL
 Hospital Management Health Care WebsiteAPPLICATIONS
 This paper proposed a novel framework of secure sharing ofpersonal health records in cloud computing. Considering partia...
Scalable and secure sharing of personal health records in cloud computing using attribute based encryption
Scalable and secure sharing of personal health records in cloud computing using attribute based encryption
Scalable and secure sharing of personal health records in cloud computing using attribute based encryption
Upcoming SlideShare
Loading in …5
×

Scalable and secure sharing of personal health records in cloud computing using attribute based encryption

10,981 views

Published on

Scalable and secure sharing of personal health records in cloud computing using attribute based encryption

Published in: Technology, Business
7 Comments
34 Likes
Statistics
Notes
No Downloads
Views
Total views
10,981
On SlideShare
0
From Embeds
0
Number of Embeds
15
Actions
Shares
0
Downloads
0
Comments
7
Likes
34
Embeds 0
No embeds

No notes for slide

Scalable and secure sharing of personal health records in cloud computing using attribute based encryption

  1. 1. VISVESVARAYA TECHNOLOGICAL UNIVERSITYJnana Sangama, Belgaum, Karnataka-590 014.A Seminar On“Scalable and Secure Sharing of Personal Health Records in CloudComputing using Attribute-based Encryption”By, Guide:NAVEENA N Mrs. VIDYALAKSHMI1BT12SCS08 Lecturer of CSE departmentB.T.L INSTITUTE OF TECHNOLOGYDepartment of Computer Science & Engineering2012-13
  2. 2. A G E N D AoAbstractoPersonal Health Records in cloud computingoExisting systemoDrawbacksoProposed SystemoModulesoApplicationsoConclusion
  3. 3.  Personal health record (PHR) is an emergingpatient-centric model of health informationexchange, which is often outsourced to bestored at a third party, such as cloudproviders. However, there have been wide privacyconcerns as personal health informationcould be exposed to those third party serversand to unauthorized parties.A B S T R A C T
  4. 4.  Issues such as risks of privacy exposure,scalability in key management, flexibleaccess and efficient user revocation, haveremained the most important challengestoward achieving fine-grained,cryptographically enforced data accesscontrol. In this paper, we propose a novel patient-centric framework and a suite ofmechanisms for data access control to PHRsstored in semi-trusted servers.A B S T R A C T
  5. 5.  To achieve fine-grained and scalable data access control forPHRs, we leverage attribute based encryption (ABE)techniques to encrypt each patient’s PHR file. we focus on the multiple data owner scenario, supportsefficient on-demand user/attribute revocation and break-glassaccess under emergency scenarios. Extensive analytical and experimental results are presentedwhich show the security, scalability and efficiency of ourproposed scheme.A B S T R A C T
  6. 6.  Due to the high cost of building and maintaining specializeddata centers, many PHR services are outsourced to or providedby third-party service providers, for example, MicrosoftHealth Vault. The main concern is about whether the patients could actuallycontrol the sharing of their sensitive personal healthinformation (PHI), especially when they are stored on a third-party server which people may not fully trust.Existing System
  7. 7.  Difficult for long-term medication Several kinds of medicine Diagnosing Frustration of missing doses Manual Insurance ClimbingDisadvantage
  8. 8. ArchitectureThe proposed framework for patient-centric, secure and scalable PHR sharing on semi-trustedstorage under multi-owner settings.
  9. 9.  In this paper, propose a novel patient-centricframework and a suite of mechanisms for dataaccess control to PHRs stored in semi-trustedservers. To achieve fine-grained and scalable dataaccess control for PHRs, we leverageattribute based encryption (ABE) techniquesto encrypt each patient’s PHR file.Proposed System
  10. 10. Proposed System In order to protect the personal health data storedon a semi-trusted server, we adopt attribute-basedencryption (ABE) as the main encryptionprimitive. Using ABE, access policies are expressed basedon the attributes of users or data. Which enables a patient to selectively share PHRamong a set of users by encrypting the file undera set of attributes, without need to know acomplete list of users.
  11. 11.  PHR Owner Module Cloud Server Module Attribute based Access Policy Module Data confidentiality ModuleMODULES
  12. 12.  The key idea is to divide the system into multiple security domains(namely, public domains (PUDs) and personal domains (PSDs))according to the different users’ data access requirements. The PUDs consist of users who make access based on theirprofessional roles, such as doctors, nurses and medical researchers. For each PSD, its users are personally associated with a data owner(such as family members or close friends), and they make accesses toPHRs based on access rights assigned by the owner. PHR Owner Module
  13. 13.  users having read and write access as data readers andcontributors, respectively. Attribute based Access Policy Module Dark boxes are the categories that a PSD’s data readers have access to.
  14. 14.  The owners upload ABE-encrypted PHR files to the server. Each owner’s PHR file is encrypted both under a certain finegrained and role-based access policy for users from the PUD toaccess. Under a selected set of data attributes that allows access from usersin the PSD. Only authorized users can decrypt the PHRfiles, excluding the server. Data confidentiality Module
  15. 15. BLOCK DIAGRAM
  16. 16. Extensive analytical and experimental results are presentedwhich shows Data confidentiality On-demand revocation Write access control Scalability and usabilityADVANTAGES
  17. 17. SAMPLE MODEL
  18. 18.  Hospital Management Health Care WebsiteAPPLICATIONS
  19. 19.  This paper proposed a novel framework of secure sharing ofpersonal health records in cloud computing. Considering partiallytrustworthy cloud servers, argue that to fully realize the patient-centric concept, patients shall have complete control of their ownprivacy through encrypting their PHR files to allow fine-grainedaccess.CONCLUSION

×