International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionEditor IJCATR
The PHR is a tool that you can use to collect, track and share past and current information about your health or the health of someone
in your care. Personal health record (PHR) is considered as an emerging patient-centric model of health information exchange, where people can
share their health information to other people. Since there are wide privacy concerns about the health records and due to high operational cost,
users stored at a third party server called as Cloud Server. The issues such as risks of privacy exposure, scalability in key management, access
problem, user revocation, have remained the most important challenges towards achieving fine-grained, cryptographically enforced data access
control. In order to get rid off from this ,in this paper we introduce attribute-based encryption (ABE) techniques to encrypt each patient's PHR
file so that an unauthorised people won’t be able to view our PHR file.
This document discusses secure sharing of personal health records (PHRs) in cloud computing environments. It first describes existing systems that use attribute-based encryption (ABE) to encrypt PHRs and allow fine-grained access control. However, these systems have issues with key management complexity. The proposed system introduces a two-level access control model combining fine-grained and coarse-grained access control. It arranges resources into access blocks and enforces access control at the block level. This allows limited information to be learned while managing access requests. Distributed attribute-based encryption (DABE) is also introduced to improve security and reduce key escrow problems by having multiple parties manage attributes.
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...dbpublications
Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access, and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi trusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt each patient’s PHR file. Different fr previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into
multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multi authority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios.
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...dbpublications
Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access, and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi trusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt each patient’s PHR file. Different fr previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into
multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multi authority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability, and efficiency of our proposed scheme.
Iaetsd scalable and secure sharing of personal healthIaetsd Iaetsd
This document proposes a framework for securely sharing personal health records (PHRs) in cloud computing using multi-authority attribute-based encryption. It aims to provide fine-grained access control and scalability while storing PHRs across multiple semi-trusted servers. The framework splits users into personal and public domains and uses different encryption for each - key-policy ABE for personal domains managed by owners, and multi-authority ABE for public domains managed by multiple authorities. PHRs are encrypted using these techniques before being outsourced to cloud servers. The framework aims to give patients control over their PHRs while allowing for efficient key management and access revocation in a large-scale system.
Healthcare information exchange using blockchain technologyIJECEIAES
This document proposes a blockchain-based healthcare information exchange system using Hyperledger Fabric. The system would allow secure sharing of electronic health records between patients, doctors, hospitals, insurance companies, and research organizations. Medical data is sensitive, so a permissioned blockchain like Hyperledger Fabric is used to control access while maintaining privacy. The system aims to provide consistent and accessible health records for patients while giving them control over access permissions. A backup access system using wearable devices would allow access to critical health information in emergencies.
This document proposes a framework for securely sharing personal health records (PHRs) stored in the cloud. It uses attribute-based encryption (ABE) to encrypt PHR files and allow flexible access control. The framework divides users into public and personal domains to address key management challenges at scale. It also introduces an efficient revocation mechanism and supports dynamic policy updates. Evaluation shows the framework provides security, scalability and efficiency for patient-centric PHR sharing in cloud computing environments.
Scalable and secure sharing of personal health records in cloud computing usi...Harilal Punalur
This document proposes a framework for securely sharing personal health records (PHRs) stored in the cloud. It uses attribute-based encryption to encrypt PHRs in a way that enables fine-grained, scalable access control. The framework divides users into multiple security domains to reduce key management complexity. It ensures patient privacy and control over PHRs through multi-authority attribute-based encryption while allowing flexible sharing. The framework supports dynamic access policy changes, efficient user/attribute revocation, and break-glass emergency access.
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionEditor IJCATR
The PHR is a tool that you can use to collect, track and share past and current information about your health or the health of someone
in your care. Personal health record (PHR) is considered as an emerging patient-centric model of health information exchange, where people can
share their health information to other people. Since there are wide privacy concerns about the health records and due to high operational cost,
users stored at a third party server called as Cloud Server. The issues such as risks of privacy exposure, scalability in key management, access
problem, user revocation, have remained the most important challenges towards achieving fine-grained, cryptographically enforced data access
control. In order to get rid off from this ,in this paper we introduce attribute-based encryption (ABE) techniques to encrypt each patient's PHR
file so that an unauthorised people won’t be able to view our PHR file.
This document discusses secure sharing of personal health records (PHRs) in cloud computing environments. It first describes existing systems that use attribute-based encryption (ABE) to encrypt PHRs and allow fine-grained access control. However, these systems have issues with key management complexity. The proposed system introduces a two-level access control model combining fine-grained and coarse-grained access control. It arranges resources into access blocks and enforces access control at the block level. This allows limited information to be learned while managing access requests. Distributed attribute-based encryption (DABE) is also introduced to improve security and reduce key escrow problems by having multiple parties manage attributes.
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...dbpublications
Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access, and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi trusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt each patient’s PHR file. Different fr previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into
multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multi authority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios.
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...dbpublications
Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access, and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi trusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt each patient’s PHR file. Different fr previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into
multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multi authority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability, and efficiency of our proposed scheme.
Iaetsd scalable and secure sharing of personal healthIaetsd Iaetsd
This document proposes a framework for securely sharing personal health records (PHRs) in cloud computing using multi-authority attribute-based encryption. It aims to provide fine-grained access control and scalability while storing PHRs across multiple semi-trusted servers. The framework splits users into personal and public domains and uses different encryption for each - key-policy ABE for personal domains managed by owners, and multi-authority ABE for public domains managed by multiple authorities. PHRs are encrypted using these techniques before being outsourced to cloud servers. The framework aims to give patients control over their PHRs while allowing for efficient key management and access revocation in a large-scale system.
Healthcare information exchange using blockchain technologyIJECEIAES
This document proposes a blockchain-based healthcare information exchange system using Hyperledger Fabric. The system would allow secure sharing of electronic health records between patients, doctors, hospitals, insurance companies, and research organizations. Medical data is sensitive, so a permissioned blockchain like Hyperledger Fabric is used to control access while maintaining privacy. The system aims to provide consistent and accessible health records for patients while giving them control over access permissions. A backup access system using wearable devices would allow access to critical health information in emergencies.
This document proposes a framework for securely sharing personal health records (PHRs) stored in the cloud. It uses attribute-based encryption (ABE) to encrypt PHR files and allow flexible access control. The framework divides users into public and personal domains to address key management challenges at scale. It also introduces an efficient revocation mechanism and supports dynamic policy updates. Evaluation shows the framework provides security, scalability and efficiency for patient-centric PHR sharing in cloud computing environments.
Scalable and secure sharing of personal health records in cloud computing usi...Harilal Punalur
This document proposes a framework for securely sharing personal health records (PHRs) stored in the cloud. It uses attribute-based encryption to encrypt PHRs in a way that enables fine-grained, scalable access control. The framework divides users into multiple security domains to reduce key management complexity. It ensures patient privacy and control over PHRs through multi-authority attribute-based encryption while allowing flexible sharing. The framework supports dynamic access policy changes, efficient user/attribute revocation, and break-glass emergency access.
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR systems in health care sector. The paper is discussing a cloud based patient health record management scheme which is highly secured. In this approach, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing using a single data query submitted by the data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content. Dinesh Soni | Dr. Lakshmi JVN "Personal Health Record over Encrypted Data Using Cloud Service" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41230.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41230/personal-health-record-over-encrypted-data-using-cloud-service/dinesh-soni
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
Information and communication technology (ICT) are becoming a natural part in healthcare. Instead of keeping patient information inside a written file, you can find all information stored in an organized database as well defined files using a specific system in almost every hospital. But those files sometimes got lost or information was split up in files in different hospitals or different departments so no one could see the whole picture from this point we come up with our idea. One of this paper targets is to keep that information available on the cloud so doctors and nurses can have an access to patient record everywhere, so patient history will be clear which helps doctors in giving the right decision. We present security architecture for establishing privacy domains in e-Health bases. In this case, we will improve the availability of medical data and provide the ability for patients to moderate their medical data. Moreover, e-Health system in cloud computing has more than one component to be attacked. The other target of this paper is to distinguish between different kinds of attackers and we point out several shortcomings of current e-Health solutions and standards, particularly they do not address the client platform security, which is a crucial aspect for the overall security of systems in cloud. To fill this gap, we present security architecture for establishing privacy domains in e-Health infrastructures. Our solution provides client platform security and appropriately combines this with network security concepts.
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...IJSRED
This document discusses privacy issues with storing personal health records (PHRs) in cloud storage. It proposes a framework that encrypts each patient's PHR data before giving it to third-party servers. Different encryption methods are used for different attributes to improve security. The framework aims to give patients control over access to their PHRs while leveraging cloud infrastructure for scalable storage and access across multiple "mirror" servers.
This document proposes a novel framework for securely sharing personal health records (PHRs) stored in the cloud. The framework uses attribute-based encryption to encrypt PHRs and allow fine-grained, patient-centric access control. It divides the system into multiple security domains (public and personal) with different types of users (e.g. doctors, friends). Role attributes are defined for public domains while data attributes are used for personal domains. The framework aims to reduce key management overhead while providing strong privacy and flexibility for PHR owners to specify access policies. It analyzes the complexity and compares to previous solutions. The proposed system uses HTML, JSP and Google App Engine for the web interface and cloud storage.
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Journals
Abstract Health Care is the most important unindustrialized field. Cloud is an emerging trend in software industry. In medical field, there are large dataset comprising highly sensitive data about patient’s medical records. Based on these records, diagnosis for the patient will be given. Moving data to the cloud makes to explore a large information for diagnosis as expert documentation will also be stored as part of health record. Physicians from anywhere at any time can get access over these reports for better treatment. The Medicare industry vacillates to store these data to the cloud as the patients might feel insecure about their health records. This work introduces the idea of combining Cipher Cloud, Inter Cloud and ABE schemes, proposes an innovative method to enhance security features in the cloud by double encryption using algorithms and tools. By this, only authorized entities are proficient of accessing these records. Rather than storing data in single cloud, Inter Cloud (Multi-cloud) also adds advantage for our proposed work. Keywords: Virtualization, Cipher cloud, Trust, Encryption, Inter cloud
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Scalable and secure sharing of personal health
records in cloud computing us...Duraiyarasan S
This document proposes a framework for fine-grained access control of personal health records (PHRs) stored in cloud computing environments. It aims to give patients full control over their PHR data while reducing the key management complexity in multi-owner settings. The framework uses attribute-based encryption to encrypt each patient's PHR data according to access policies. It divides the system into multiple security domains to distribute key management responsibilities and reduce overhead for each owner and user.
This document proposes a cloud-based architecture for wireless sensor networks used in e-health applications. It discusses three key components: 1) a wireless sensor network that collects patient health data, 2) monitoring applications for healthcare professionals to access stored data, and 3) a Healthcare Authority that specifies security policies. It then proposes using attribute-based encryption and symmetric encryption to encrypt health data and implement access control policies while outsourcing storage to the cloud. Performance analysis shows the proposed approach reduces overhead compared to solely using attribute-based encryption.
Cloud Compliance with Encrypted Data – Health Recordsijtsrd
several tending organizations area unit mistreatment electronic health record EHRS area unit period, patient centered records that create data accessible instantly and firmly to approved users. so information storage becomes associate evoking interest for developing EHRS systems. this can not price an excellent deal however it additionally provides the adjustable giant space mobile access more and more required within the gift world, however, before cloud based EHRSs system will become associate beingness, problems with information security, personal details of patients and overall performance should be shown. As normal cryptography techniques for EHRSs cause hyperbolic access management and performance overhead, this paper proposes the employment of Cipher text Policy Attribute Based cryptography CPABE to encrypted information is unbroken confidential although the storage server is untrusted EHRSs supported health care suppliers credentials to decipher EHRSs it ought to contain these several attributes required for correct access . the planning and usage of cloud related EHRS system supported CP ABE area unit galvanized and bestowed, beside introductory experiments to research the flexibleness and measurability of the planned approach. Mohan Prakash | Nachappa S "Cloud Compliance with Encrypted Data – Health Records" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30773.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/30773/cloud-compliance-with-encrypted-data-%E2%80%93-health-records/mohan-prakash
Paper MIE2016 from Proceedings pags 122-126vilaltajo
This document proposes using a Document Archiving and Communication System (DACS) to provide secure storage and access to clinical documents in a standardized way. A DACS would function similarly to a PACS for medical images. It describes the key components of a DACS including a web portal, server, and databases to store documents formatted according to HL7 CDA standards. Privacy rules and security protocols like SAML and XACML are used to control access to documents based on user roles. Clinical documents can be queried through the DACS using a finder application to retrieve time-series data, summaries, and facilitate complex searches across repositories.
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...IRJET Journal
This document proposes a new system called Dynamic Fine-grained Access Control and Multi-Field Keyword Search (DFAC_MKS) for cloud-based electronic health records (EHRs) that allows for dynamic updating of access policies and keywords over encrypted data. It aims to achieve efficient access policy and keyword updates without compromising data security, while supporting multi-field keyword searches in conjunctive normal form. The system model involves data owners uploading encrypted EHR files and indices to a cloud server. An authority authenticates users and issues credentials representing their attribute values. Users generate search capabilities from their credentials and queries to retrieve matching files from the cloud server.
Scalable and secure sharing of personal health records in cloud computing usi...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
This document discusses security issues related to mobile payment systems. It begins by defining mobile payment and m-commerce. It then outlines some key technologies used in mobile payments like SMS, GPRS, and wireless protocols. It identifies several security problems with these technologies, such as the vulnerability of encryption algorithms used in GSM networks. Finally, it discusses other mobile payment technologies and their security challenges, like threats to near-field communication systems if not implemented securely. Understanding and addressing these security risks is important for gaining user adoption of mobile banking and payments.
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
81% of companies have employee owned devices accessing their networks, but only 48% claim to have a well-defined mobile security strategy. To secure today’s mobile workforce businesses must consider adopting a framework to enable the use of mobile technology while minimizing the risks to both their employees and their customers. In this presentation, we review the unique challenges we all face and IBM’s approach to securing and managing the mobile enterprise.
http://securityintelligence.com/events/live-from-impact-2014-ibm-mobile-security-a-comprehensive-approach-to-securing-and-managing-the-mobile-enterprise/#.VMvT2vMo6Mo
This document provides an introduction to Boeing and Airbus, the two leading aircraft manufacturers, and compares their operations management practices. It explains that Airbus implemented total quality management and just-in-time practices successfully for the Airbus A380 project. In contrast, Boeing faced many failures in its operations for the Boeing 787 Dreamliner project, likely due to deficiencies in its quality management and supply chain practices. The document also discusses how Airbus used a master production schedule effectively to coordinate the large-scale production of the A380. In summary, the document analyzes differences in the operations management of Boeing and Airbus that contributed to problems with Boeing's 787 Dreamliner project versus the success of Airbus' A380.
Utilization of intestines as animal casingsDr. IRSHAD A
India exports high quality animal casings including cattle, sheep, and other animal casings. In 2014-15, India exported 260.15 MT of animal casing products worth Rs. 19.32 crores, primarily to South Africa, Turkey, Portugal, Lebanon and Tunisia. Natural casings come from intestines of slaughtered animals and are used to contain sausage mixtures, while artificial casings are made from materials like collagen and cellulose. Proper handling and processing is required to produce quality casings.
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR systems in health care sector. The paper is discussing a cloud based patient health record management scheme which is highly secured. In this approach, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing using a single data query submitted by the data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content. Dinesh Soni | Dr. Lakshmi JVN "Personal Health Record over Encrypted Data Using Cloud Service" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41230.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41230/personal-health-record-over-encrypted-data-using-cloud-service/dinesh-soni
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
Information and communication technology (ICT) are becoming a natural part in healthcare. Instead of keeping patient information inside a written file, you can find all information stored in an organized database as well defined files using a specific system in almost every hospital. But those files sometimes got lost or information was split up in files in different hospitals or different departments so no one could see the whole picture from this point we come up with our idea. One of this paper targets is to keep that information available on the cloud so doctors and nurses can have an access to patient record everywhere, so patient history will be clear which helps doctors in giving the right decision. We present security architecture for establishing privacy domains in e-Health bases. In this case, we will improve the availability of medical data and provide the ability for patients to moderate their medical data. Moreover, e-Health system in cloud computing has more than one component to be attacked. The other target of this paper is to distinguish between different kinds of attackers and we point out several shortcomings of current e-Health solutions and standards, particularly they do not address the client platform security, which is a crucial aspect for the overall security of systems in cloud. To fill this gap, we present security architecture for establishing privacy domains in e-Health infrastructures. Our solution provides client platform security and appropriately combines this with network security concepts.
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...IJSRED
This document discusses privacy issues with storing personal health records (PHRs) in cloud storage. It proposes a framework that encrypts each patient's PHR data before giving it to third-party servers. Different encryption methods are used for different attributes to improve security. The framework aims to give patients control over access to their PHRs while leveraging cloud infrastructure for scalable storage and access across multiple "mirror" servers.
This document proposes a novel framework for securely sharing personal health records (PHRs) stored in the cloud. The framework uses attribute-based encryption to encrypt PHRs and allow fine-grained, patient-centric access control. It divides the system into multiple security domains (public and personal) with different types of users (e.g. doctors, friends). Role attributes are defined for public domains while data attributes are used for personal domains. The framework aims to reduce key management overhead while providing strong privacy and flexibility for PHR owners to specify access policies. It analyzes the complexity and compares to previous solutions. The proposed system uses HTML, JSP and Google App Engine for the web interface and cloud storage.
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Journals
Abstract Health Care is the most important unindustrialized field. Cloud is an emerging trend in software industry. In medical field, there are large dataset comprising highly sensitive data about patient’s medical records. Based on these records, diagnosis for the patient will be given. Moving data to the cloud makes to explore a large information for diagnosis as expert documentation will also be stored as part of health record. Physicians from anywhere at any time can get access over these reports for better treatment. The Medicare industry vacillates to store these data to the cloud as the patients might feel insecure about their health records. This work introduces the idea of combining Cipher Cloud, Inter Cloud and ABE schemes, proposes an innovative method to enhance security features in the cloud by double encryption using algorithms and tools. By this, only authorized entities are proficient of accessing these records. Rather than storing data in single cloud, Inter Cloud (Multi-cloud) also adds advantage for our proposed work. Keywords: Virtualization, Cipher cloud, Trust, Encryption, Inter cloud
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Scalable and secure sharing of personal health
records in cloud computing us...Duraiyarasan S
This document proposes a framework for fine-grained access control of personal health records (PHRs) stored in cloud computing environments. It aims to give patients full control over their PHR data while reducing the key management complexity in multi-owner settings. The framework uses attribute-based encryption to encrypt each patient's PHR data according to access policies. It divides the system into multiple security domains to distribute key management responsibilities and reduce overhead for each owner and user.
This document proposes a cloud-based architecture for wireless sensor networks used in e-health applications. It discusses three key components: 1) a wireless sensor network that collects patient health data, 2) monitoring applications for healthcare professionals to access stored data, and 3) a Healthcare Authority that specifies security policies. It then proposes using attribute-based encryption and symmetric encryption to encrypt health data and implement access control policies while outsourcing storage to the cloud. Performance analysis shows the proposed approach reduces overhead compared to solely using attribute-based encryption.
Cloud Compliance with Encrypted Data – Health Recordsijtsrd
several tending organizations area unit mistreatment electronic health record EHRS area unit period, patient centered records that create data accessible instantly and firmly to approved users. so information storage becomes associate evoking interest for developing EHRS systems. this can not price an excellent deal however it additionally provides the adjustable giant space mobile access more and more required within the gift world, however, before cloud based EHRSs system will become associate beingness, problems with information security, personal details of patients and overall performance should be shown. As normal cryptography techniques for EHRSs cause hyperbolic access management and performance overhead, this paper proposes the employment of Cipher text Policy Attribute Based cryptography CPABE to encrypted information is unbroken confidential although the storage server is untrusted EHRSs supported health care suppliers credentials to decipher EHRSs it ought to contain these several attributes required for correct access . the planning and usage of cloud related EHRS system supported CP ABE area unit galvanized and bestowed, beside introductory experiments to research the flexibleness and measurability of the planned approach. Mohan Prakash | Nachappa S "Cloud Compliance with Encrypted Data – Health Records" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30773.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/30773/cloud-compliance-with-encrypted-data-%E2%80%93-health-records/mohan-prakash
Paper MIE2016 from Proceedings pags 122-126vilaltajo
This document proposes using a Document Archiving and Communication System (DACS) to provide secure storage and access to clinical documents in a standardized way. A DACS would function similarly to a PACS for medical images. It describes the key components of a DACS including a web portal, server, and databases to store documents formatted according to HL7 CDA standards. Privacy rules and security protocols like SAML and XACML are used to control access to documents based on user roles. Clinical documents can be queried through the DACS using a finder application to retrieve time-series data, summaries, and facilitate complex searches across repositories.
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...IRJET Journal
This document proposes a new system called Dynamic Fine-grained Access Control and Multi-Field Keyword Search (DFAC_MKS) for cloud-based electronic health records (EHRs) that allows for dynamic updating of access policies and keywords over encrypted data. It aims to achieve efficient access policy and keyword updates without compromising data security, while supporting multi-field keyword searches in conjunctive normal form. The system model involves data owners uploading encrypted EHR files and indices to a cloud server. An authority authenticates users and issues credentials representing their attribute values. Users generate search capabilities from their credentials and queries to retrieve matching files from the cloud server.
Scalable and secure sharing of personal health records in cloud computing usi...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
This document discusses security issues related to mobile payment systems. It begins by defining mobile payment and m-commerce. It then outlines some key technologies used in mobile payments like SMS, GPRS, and wireless protocols. It identifies several security problems with these technologies, such as the vulnerability of encryption algorithms used in GSM networks. Finally, it discusses other mobile payment technologies and their security challenges, like threats to near-field communication systems if not implemented securely. Understanding and addressing these security risks is important for gaining user adoption of mobile banking and payments.
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
81% of companies have employee owned devices accessing their networks, but only 48% claim to have a well-defined mobile security strategy. To secure today’s mobile workforce businesses must consider adopting a framework to enable the use of mobile technology while minimizing the risks to both their employees and their customers. In this presentation, we review the unique challenges we all face and IBM’s approach to securing and managing the mobile enterprise.
http://securityintelligence.com/events/live-from-impact-2014-ibm-mobile-security-a-comprehensive-approach-to-securing-and-managing-the-mobile-enterprise/#.VMvT2vMo6Mo
This document provides an introduction to Boeing and Airbus, the two leading aircraft manufacturers, and compares their operations management practices. It explains that Airbus implemented total quality management and just-in-time practices successfully for the Airbus A380 project. In contrast, Boeing faced many failures in its operations for the Boeing 787 Dreamliner project, likely due to deficiencies in its quality management and supply chain practices. The document also discusses how Airbus used a master production schedule effectively to coordinate the large-scale production of the A380. In summary, the document analyzes differences in the operations management of Boeing and Airbus that contributed to problems with Boeing's 787 Dreamliner project versus the success of Airbus' A380.
Utilization of intestines as animal casingsDr. IRSHAD A
India exports high quality animal casings including cattle, sheep, and other animal casings. In 2014-15, India exported 260.15 MT of animal casing products worth Rs. 19.32 crores, primarily to South Africa, Turkey, Portugal, Lebanon and Tunisia. Natural casings come from intestines of slaughtered animals and are used to contain sausage mixtures, while artificial casings are made from materials like collagen and cellulose. Proper handling and processing is required to produce quality casings.
Cloud based payments: the future of mobile payments?Thales e-Security
Since HCE first became available in Android handsets, card issuers have been using it to deliver mobile payment solutions to the customers. With scheme specifications and the arrival of tokenization there has been an increasing rate of adoption. Now, with a growing number of payment options becoming available from the 'X-Pays' and a growing convergence between on-line, in-store and in-app transactions, what is the future for cloud based payments?
Or why not listen to the webcast https://www.thales-esecurity.com/knowledge-base/webcasts/cloud-based-payments-the-future-of-mobile-payments
This document discusses security issues related to cloud computing. It defines cloud computing and outlines the essential characteristics, service models, and deployment models. It also addresses key security concerns including governance, legal issues, compliance, information lifecycle management, and risks associated with loss of control over data and applications in the cloud. The document emphasizes that security responsibilities are shared between cloud providers and users, and both parties need to understand their roles.
It's a simple presentation I did it with my friend Khawlah Al-Mazyd last year as a one topic should we cover it through doing Advanced Network course.
2010 - King Saud Universty
Riyadh - Saudi Arabia
Mobile cloud computing combines mobile web and cloud computing to address limitations of the mobile web like limited storage, small screens, and unreliable browsers and connections. It takes data processing away from mobile phones and into the cloud, creating a common platform across devices. While mobile cloud computing currently has under 1 billion subscribers, its potential is high given there are over 5 billion mobile subscribers that could benefit, especially in Africa. The concept involves innovating bespoke products and services suited for ubiquitous access on any mobile device.
Different Types of Mobile payments
Payment Models
- SMS/USSD-based transactional payments
- Direct mobile billing
- Mobile web payments (WAP)
- QR Code Payments
- Contactless Near Field Communication
- Cloud-based mobile payments (Please elaborate applepay, google, paypal and others)
- Audio signal-based payments
- Direct carrier/bank co-operation
This document provides an overview of mobile cloud computing. It begins with introductions to mobile computing and cloud computing individually, defining them and their key features and challenges. It then defines mobile cloud computing as the combination of these two, where data storage and processing occur remotely rather than on the mobile device itself. The architecture of mobile cloud computing connects mobile devices to remote cloud servers. Applications include offloading computation and storage to the cloud to improve battery life and processing speed on mobile devices. Challenges include costs of mobile networks and cloud services as well as issues with availability, heterogeneity, and security.
Mobile Cloud: Security Issues and Challenges discusses security concerns with mobile cloud computing. It outlines the evolution of cloud computing and features of mobile cloud computing. The document then discusses challenges such as bandwidth limitations and security issues including data ownership, privacy, and data security. Existing solutions and possible solutions to security issues are presented, along with a conclusion emphasizing the need for data security plans and addressing threats to attain more reliable and cost-effective mobile cloud computing.
This document discusses survey research methodology. It defines surveys as collecting data directly from a population or sample using a set of questions. The main types of surveys are described as cross-sectional, longitudinal, cohort, trend, and panel studies. The key steps in survey research are planning, sampling, constructing the instrument, conducting the survey, and processing the data. Validity and reliability are also addressed, along with limitations, ethics, and tools used in survey research.
The document proposes a Cloud Information Accountability (CIA) framework to address concerns about lack of control and transparency when data is stored in the cloud. The CIA framework uses a novel logging and auditing technique that automatically logs any access to user data in a decentralized manner. It allows data owners to track how their data is being used according to service agreements or policies. The framework has two major components: a logger that is strongly coupled with user data, and a log harmonizer. The CIA framework aims to provide transparency, enforce access controls, and strengthen user control over their cloud data.
Factors affecting quality and quantity of milk in dairy cattleDr. IRSHAD A
The document summarizes factors that affect the quantity and quality of milk produced by dairy cattle. It discusses physiological factors like breed, age, lactation stage, and environmental factors like nutrition, climate, and management practices. Higher quality milk has a lower somatic cell count and bacterial content. Milk quantity is most impacted by breed, age, lactation stage, dry period length, calving season, and nutrition. Milk composition varies by genetic factors, breed, lactation stage, milking practices, season, and health issues like mastitis.
This document discusses mobile banking and presents the results of a survey about public awareness and use of mobile banking in India. It defines mobile banking as allowing customers to access and manage their bank accounts through a mobile device. The document then provides details about typical mobile banking services, the benefits for both customers and banks, the security measures used, and an example of State Bank of India's mobile banking registration process. Survey results show that most respondents are aware of mobile banking but still prefer traditional banking methods due to security concerns. However, many feel mobile banking could benefit society by saving time and reducing dependency on bank branches.
IGCSE Business Studeies Unit 1 understanding business activity pptIrshad Tunio
1. Businesses produce goods and services to satisfy peoples' unlimited wants using limited resources. This leads to scarcity.
2. Specialization and division of labor are used to make the most efficient use of limited resources in production. Workers specialize in specific tasks to increase output.
3. Businesses have objectives like profit, growth, and survival that sometimes conflict with stakeholder objectives like customer satisfaction, employment, and environmental protection.
2015 North Bridge Future of Cloud Computing Study, with Wikibon |Broadest exploration of cloud trends, cloud migration & evolution of the cloud computing sector. Survey participation was the largest to date and included responses from 38 countries. 50 collaborators supported the 5th Annual Future of Cloud Computing study, which reveals that cloud has become an accepted and integral technology. Furthermore, the study shows that despite deployment gaps among clouds, we should expect a future powered by hybrid cloud technologies. The question of whether companies are using the cloud has morphed to how deeply cloud adoption is integrated within the business. From the bottom to the top, all products and services will in some way be powered by the cloud making the promise of goods and services that have the potential to be better tomorrow than today. IT departments have reclaimed the reins on driving company technology strategy and cloud adoption as roles, skills and processes have shifted. Importantly, We’re also seeing the emergence of the cloud as the only way businesses can truly get more out of their data including analyzing and executing on it real-time. On the investment front, 2015 could tip the scale from private to public capital for SaaS companies.
The document provides an overview of survey research and questionnaire design. It discusses that surveys are used to collect data and facts from a target population about a certain situation or issue. The key steps in survey research include developing hypotheses, designing the survey questions and format, sampling, data collection, analysis, and reporting findings. It also describes different types of surveys, methods of data collection including mail, interview and telephone surveys, and considerations for question structure, format, and response options. The document emphasizes that carefully designing and testing the questionnaire is important for effective survey research.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
This document proposes a framework for securely sharing personal health records (PHRs) stored in the cloud. It uses attribute-based encryption to encrypt PHR files under access policies. It divides users into public and personal domains to address key management challenges at scale. In the public domain, multiple attribute authorities distribute keys to manage professional users' role attributes without a single point of failure. Owners specify access policies during encryption. The personal domain allows owners to directly manage access for personal users. The framework supports dynamic policy updates, break-glass access, and an efficient revocation scheme.
This document proposes a framework for securely sharing personal health records (PHRs) stored in the cloud. It uses attribute-based encryption (ABE) to encrypt PHR files and allow flexible access control. The framework divides users into public and personal domains to address key management challenges at scale. It also introduces an efficient revocation mechanism and supports dynamic policy updates. Evaluation shows the framework provides security, scalability and efficiency for patient-centric PHR sharing in cloud computing environments.
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...IEEEGLOBALSOFTTECHNOLOGIES
This document proposes a framework for securely sharing personal health records (PHRs) stored in the cloud. It uses attribute-based encryption (ABE) to encrypt PHRs and enable fine-grained, scalable access control. Multiple owners can encrypt PHRs under different access policies. The framework addresses key management across owners and supports dynamic policy changes and efficient user revocation. It achieves patient-centric control over personal health data outsourced to semi-trusted cloud servers.
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET Journal
This document proposes a framework for privacy, access, and control of healthcare data stored on the cloud using a recommendation system. The framework uses attribute-based encryption to encrypt each patient's personal health records file. It also proposes a healthcare recommendation system to provide doctor recommendations based on user preferences and doctor attributes. The system aims to achieve fine-grained and scalable access control of personal health records stored on semi-trusted cloud servers while maintaining privacy. It compares with previous healthcare recommendation methods and datasets to provide more accurate recommendations.
Psdot 4 scalable and secure sharing of personal health records in cloud compu...ZTech Proje
FINAL YEAR IEEE PROJECTS,
EMBEDDED SYSTEMS PROJECTS,
ENGINEERING PROJECTS,
MCA PROJECTS,
ROBOTICS PROJECTS,
ARM PIC BASED PROJECTS, MICRO CONTROLLER PROJECTS
Scalable and secure sharing of personal health records in cloud computing usi...Harilal Punalur
This document proposes a framework for securely sharing personal health records (PHRs) stored in the cloud. It addresses privacy and access control issues with existing systems that rely on a single trusted authority. The proposed framework uses attribute-based encryption to encrypt PHRs and divides users into multiple security domains (public and personal) to reduce key management complexity. PHR owners act as authorities over personal domains containing friends and family, defining access policies for files labeled with attributes. The semi-trusted cloud server stores encrypted data and authorized users can decrypt files matching their access privileges. The framework aims to provide both scalable encryption and fine-grained, patient-centric access control for PHRs across multiple domains.
The document proposes a framework that uses attribute-based encryption to encrypt personal health records stored in the cloud, addressing privacy and security issues. It divides users into multiple security domains handled by separate attribute authorities to reduce key management complexity for owners and users. This approach allows flexible, fine-grained access control of personal health records while guaranteeing privacy. The framework supports dynamic policy changes, efficient user revocation, and break-glass access in emergencies. Evaluation shows it provides security, scalability and efficiency for patient-centric sharing of personal health records on semi-trusted servers.
Secure Personal Health Records Using Encryption Editor IJCATR
In the dispersed world, health information is exchanged based on the patients Personal Health Records (PHRs). Due to this reason, the construction and maintenance are focused by data centers, which are used for persons to gain high cost. The cloud providers are used in most of the PHR services to outsource the PHRs, which are stored by third party. The privacy is main anxiety because the PHRs information is shared to third party servers and illegal parties. To avoid this problem and to provide the guarantee security for PHRs, the encryption is applied for all PHRs before it is outsourcing. After encryption is applied still few major issues are present such as, flexible access, scalability in key organizations and well organized user revocation. These are the residual important challenges. In this proposed system, a patient-centric model has been generated with appropriate mechanisms for accessing PHR which are stored in semi confidential servers. Here the Attribute Based Encryption technique is used to encrypt every patients PHR’s. To support on demand, user revocations are also enabled dynamically based on the variations of access policies or file attributes to improve the process.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
The document proposes a framework for securely sharing personal health records (PHRs) stored in the cloud using attribute-based encryption (ABE). It aims to achieve fine-grained access control over PHRs while addressing challenges like privacy risks, complex key management, and user revocation. The framework divides users into multiple security domains to reduce complexity and uses multi-authority ABE to guarantee patient privacy. Access policies and file attributes can also be dynamically modified. Experimental results demonstrate the security, scalability and efficiency of the proposed scheme.
Android scalable and secure sharing of personal health records in cloud comp...Ecway2004
This document summarizes a research paper that proposes a novel framework for scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. The framework aims to address issues like privacy exposure, scalability in key management, flexible access control and efficient user revocation. It leverages attribute-based encryption techniques to encrypt each patient's health records and divides users into multiple security domains to reduce complexity. The scheme guarantees patient privacy, enables dynamic modification of policies, and supports efficient revocation and emergency access.
Android scalable and secure sharing of personal health records in cloud comp...Ecwayt
This document summarizes a research paper that proposes a novel framework for scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. The framework aims to address issues like privacy exposure, scalability in key management, flexible access control and efficient user revocation. It leverages attribute-based encryption techniques to encrypt each patient's health records and divides users into multiple security domains to reduce complexity. The scheme guarantees patient privacy, enables dynamic modification of policies, and supports efficient revocation and emergency access.
Scalable and secure sharing of personal health records in cloud computing usi...Ecwayt
This document summarizes a research paper that proposes a novel framework for scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. The framework aims to address issues like privacy exposure, scalability in key management, flexible access control and efficient user revocation. It leverages attribute-based encryption techniques to encrypt each patient's health records and divides users into multiple security domains to reduce complexity. The scheme guarantees patient privacy, enables dynamic modification of policies, and supports revocation and emergency access, as shown through analytical and experimental results.
Android scalable and secure sharing of personal health records in cloud comp...Ecwaytech
This document summarizes a research paper that proposes a novel framework for scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. The framework aims to address issues like privacy exposure, scalability in key management, flexible access control and efficient user revocation. It leverages attribute-based encryption techniques to encrypt each patient's health records and divides users into multiple security domains to reduce complexity. The scheme guarantees patient privacy, enables dynamic modification of policies, and supports efficient revocation and emergency access.
Android scalable and secure sharing of personal health records in cloud comp...Ecwaytechnoz
This document summarizes a research paper that proposes a novel framework for scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. The framework aims to address issues like privacy exposure, scalability in key management, flexible access control and efficient user revocation. It leverages attribute-based encryption techniques to encrypt each patient's health records and divides users into multiple security domains to reduce complexity. The scheme guarantees patient privacy, enables dynamic modification of policies, and supports efficient revocation and emergency access.
Similar to A Novel Framework for Securing Medical Records in Cloud Computing (18)
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
- Translucent concrete is a concrete based material with light-transferring properties,
obtained due to embedded light optical elements like Optical fibers used in concrete. Light is conducted
through the concrete from one end to the other. This results into a certain light pattern on the other
surface, depending on the fiber structure. Optical fibers transmit light so effectively that there is
virtually no loss of light conducted through the fibers. This paper deals with the modeling of such
translucent or transparent concrete blocks and panel and their usage and also the advantages it brings
in the field. The main purpose is to use sunlight as a light source to reduce the power consumption of
illumination and to use the optical fiber to sense the stress of structures and also use this concrete as an
architectural purpose of the building
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
A low cost automation system for removal of lint from cottonseed is to be designed and
developed. The setup consists of stainless steel drum with stirrer in which cottonseeds having lint is mixed
with concentrated sulphuric acid. So lint will get burn. This lint free cottonseed treated with lime water to
neutralize acidic nature. After water washing this cottonseeds are used for agriculter purpose
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
The incorporation of natural fibres such as munja fiber composites has gained
increasing applications both in many areas of Engineering and Technology. The aim of this study is to
evaluate mechanical properties such as flexural and tensile properties of reinforced epoxy composites.
This is mainly due to their applicable benefits as they are light weight and offer low cost compared to
synthetic fibre composites. Munja fibres recently have been a substitute material in many weight-critical
applications in areas such as aerospace, automotive and other high demanding industrial sectors. In
this study, natural munja fibre composites and munja/fibreglass hybrid composites were fabricated by a
combination of hand lay-up and cold-press methods. A new variety in munja fibre is the present work
the main aim of the work is to extract the neat fibre and is characterized for its flexural characteristics.
The composites are fabricated by reinforcing untreated and treated fibre and are tested for their
mechanical, properties strictly as per ASTM procedures.
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
Hybrid engine is a combination of Stirling engine, IC engine and Electric motor. All these 3 are
connected together to a single shaft. The power source of the Stirling engine will be a Solar Panel. The aim of
this is to run the automobile using a Hybrid engine
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
This document summarizes research on the fabrication and characterization of bio-composite materials using sunnhemp fibre. The document discusses how sunnhemp fibre was used to reinforce an epoxy matrix through hand lay-up methods. Various mechanical properties of the bio-composites were tested, including tensile, flexural, and impact properties. The results of the mechanical tests on the bio-composite specimens are presented. Potential applications of the sunnhemp fibre bio-composites are also suggested, such as in fall ceilings, partitions, packaging, automotive interiors, and toys.
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
The Greenstone belts of Karnataka are enriched in BIFs in Dharwar craton, where Iron
formations are confined to the basin shelf, clearly separated from the deeper-water iron formation that
accumulated at the basin margin and flanking the marine basin. Geochemical data procured in terms of
major, trace and REE are plotted in various diagrams to interpret the genesis of BIFs. Al2O3, Fe2O3 (T),
TiO2, CaO, and SiO2 abundances and ratios show a wide variation. Ni, Co, Zr, Sc, V, Rb, Sr, U, Th,
ΣREE, La, Ce and Eu anomalies and their binary relationships indicate that wherever the terrigenous
component has increased, the concentration of elements of felsic such as Zr and Hf has gone up. Elevated
concentrations of Ni, Co and Sc are contributed by chlorite and other components characteristic of basic
volcanic debris. The data suggest that these formations were generated by chemical and clastic
sedimentary processes on a shallow shelf. During transgression, chemical precipitation took place at the
sediment-water interface, whereas at the time of regression. Iron ore formed with sedimentary structures
and textures in Kammatturu area, in a setting where the water column was oxygenated.
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
In this paper, the mechanical characteristics of C45 medium carbon steel are investigated
under various working conditions. The main characteristic to be studied on this paper is impact toughness
of the material with different configurations and the experiment were carried out on charpy impact testing
equipment. This study reveals the ability of the material to absorb energy up to failure for various
specimen configurations under different heat treated conditions and the corresponding results were
compared with the analysis outcome
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
Robot guns are being increasingly employed in automotive manufacturing to replace
risky jobs and also to increase productivity. Using a single robot for a single operation proves to be
expensive. Hence for cost optimization, multiple guns are mounted on a single robot and multiple
operations are performed. Robot Gun structure is an efficient way in which multiple welds can be done
simultaneously. However mounting several weld guns on a single structure induces a variety of
dynamic loads, especially during movement of the robot arm as it maneuvers to reach the weld
locations. The primary idea employed in this paper, is to model those dynamic loads as equivalent G
force loads in FEA. This approach will be on the conservative side, and will be saving time and
subsequently cost efficient. The approach of the paper is towards creating a standard operating
procedure when it comes to analysis of such structures, with emphasis on deploying various technical
aspects of FEA such as Non Linear Geometry, Multipoint Constraint Contact Algorithm, Multizone
meshing .
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
This paper aims to do modelling, simulation and performing the static analysis of a go
kart chassis consisting of Circular beams. Modelling, simulations and analysis are performed using 3-D
modelling software i.e. Solid Works and ANSYS according to the rulebook provided by Indian Society of
New Era Engineers (ISNEE) for National Go Kart Championship (NGKC-14).The maximum deflection is
determined by performing static analysis. Computed results are then compared to analytical calculation,
where it is found that the location of maximum deflection agrees well with theoretical approximation but
varies on magnitude aspect.
In récent year various vehicle introduced in market but due to limitation in
carbon émission and BS Séries limitd speed availability vehicle in the market and causing of
environnent pollution over few year There is need to decrease dependancy on fuel vehicle.
bicycle is to be modified for optional in the future To implement new technique using change in
pedal assembly and variable speed gearbox such as planetary gear optimise speed of vehicle
with variable speed ratio.To increase the efficiency of bicycle for confortable drive and to
reduce torque appli éd on bicycle. we introduced epicyclic gear box in which transmission done
throgh Chain Drive (i.e. Sprocket )to rear wheel with help of Epicyclical gear Box to give
number of différent Speed during driving.To reduce torque requirent in the cycle with change in
the pedal mechanism
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
This document discusses integrating the Spring, Struts, and Hibernate frameworks to develop enterprise applications. It provides an overview of each framework and their features. The Spring Framework is a lightweight, modular framework that allows for inversion of control and aspect-oriented programming. It can be used to develop any or all tiers of an application. The document proposes an architecture for an e-commerce website that integrates these three frameworks, with Spring handling the business layer, Struts the presentation layer, and Hibernate the data access layer. This modular approach allows for clear separation of concerns and reduces complexity in application development.
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
Microcontroller based Automatic Sprinkler System is a new concept of using
intelligence power of embedded technology in the sprinkler irrigation work. Designed system replaces
the conventional manual work involved in sprinkler irrigation to automatic process. Using this system a
farmer is protected against adverse inhuman weather conditions, tedious work of changing over of
sprinkler water pipe lines & risk of accident due to high pressure in the water pipe line. Overall
sprinkler irrigation work is transformed in to a comfortableautomatic work. This system provides
flexibility & accuracy in respect of time set for the operation of a sprinkler water pipe lines. In present
work the author has designed and developed an automatic sprinkler irrigation system which is
controlled and monitored by a microcontroller interfaced with solenoid valves.
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
This document introduces and studies the concept of δˆ s-locally closed sets in ideal topological spaces. Some key points:
- A subset A is δˆ s-locally closed if A can be written as the intersection of a δˆ s-open set and a δˆ s-closed set.
- Various properties of δˆ s-locally closed sets are introduced and characterized, including relationships to other concepts like generalized locally closed sets.
- It is shown that a subset A is δˆ s-locally closed if and only if A can be written as the intersection of a δˆ s-open set and the δˆ s-closure of A.
- Theore
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
This paper present an approach based on the combination of, two techniques using
decision tree and Association rule mining for Probe attack detection. This approach proves to be
better than the traditional approach of generating rules for fuzzy expert system by clustering methods.
Association rule mining for selecting the best attributes together and decision tree for identifying the
best parameters together to create the rules for fuzzy expert system. After that rules for fuzzy expert
system are generated using association rule mining and decision trees. Decision trees is generated for
dataset and to find the basic parameters for creating the membership functions of fuzzy inference
system. Membership functions are generated for the probe attack. Based on these rules we have
created the fuzzy inference system that is used as an input to neuro-fuzzy system. Fuzzy inference
system is loaded to neuro-fuzzy toolbox as an input and the final ANFIS structure is generated for
outcome of neuro-fuzzy approach. The experiments and evaluations of the proposed method were
done with NSL-KDD intrusion detection dataset. As the experimental results, the proposed approach
based on the combination of, two techniques using decision tree and Association rule mining
efficiently detected probe attacks. Experimental results shows better results for detecting intrusions as
compared to others existing methods
Natural Language Ambiguity and its Effect on Machine LearningIJMER
This document discusses natural language ambiguity and its effect on machine learning. It begins by introducing different types of ambiguity that exist in natural languages, including lexical, syntactic, semantic, discourse, and pragmatic ambiguities. It then examines how these ambiguities present challenges for computational linguistics and machine translation systems. Specifically, it notes that ambiguity is a major problem for computers in processing human language as they lack the world knowledge and context that humans use to resolve ambiguities. The document concludes by outlining the typical process of machine translation and how ambiguities can interfere with tasks like analysis, transfer, and generation of text in the target language.
Today in era of software industry there is no perfect software framework available for
analysis and software development. Currently there are enormous number of software development
process exists which can be implemented to stabilize the process of developing a software system. But no
perfect system is recognized till yet which can help software developers for opting of best software
development process. This paper present the framework of skillful system combined with Likert scale. With
the help of Likert scale we define a rule based model and delegate some mass score to every process and
develop one tool name as MuxSet which will help the software developers to select an appropriate
development process that may enhance the probability of system success.
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
The present study investigates the creep in a thick-walled composite cylinders made
up of aluminum/aluminum alloy matrix and reinforced with silicon carbide particles. The distribution
of SiCp is assumed to be either uniform or decreasing linearly from the inner to the outer radius of
the cylinder. The creep behavior of the cylinder has been described by threshold stress based creep
law with a stress exponent of 5. The composite cylinders are subjected to internal pressure which is
applied gradually and steady state condition of stress is assumed. The creep parameters required to
be used in creep law, are extracted by conducting regression analysis on the available experimental
results. The mathematical models have been developed to describe steady state creep in the composite
cylinder by using von-Mises criterion. Regression analysis is used to obtain the creep parameters
required in the study. The basic equilibrium equation of the cylinder and other constitutive equations
have been solved to obtain creep stresses in the cylinder. The effect of varying particle size, particle
content and temperature on the stresses in the composite cylinder has been analyzed. The study
revealed that the stress distributions in the cylinder do not vary significantly for various combinations
of particle size, particle content and operating temperature except for slight variation observed for
varying particle content. Functionally Graded Materials (FGMs) emerged and led to the development
of superior heat resistant materials.
Energy Audit is the systematic process for finding out the energy conservation
opportunities in industrial processes. The project carried out studies on various energy conservation
measures application in areas like lighting, motors, compressors, transformer, ventilation system etc.
In this investigation, studied the technical aspects of the various measures along with its cost benefit
analysis.
Investigation found that major areas of energy conservation are-
1. Energy efficient lighting schemes.
2. Use of electronic ballast instead of copper ballast.
3. Use of wind ventilators for ventilation.
4. Use of VFD for compressor.
5. Transparent roofing sheets to reduce energy consumption.
So Energy Audit is the only perfect & analyzed way of meeting the Industrial Energy Conservation.
An Implementation of I2C Slave Interface using Verilog HDLIJMER
This document describes the implementation of an I2C slave interface using Verilog HDL. It introduces the I2C protocol which uses only two bidirectional lines (SDA and SCL) for communication. The document discusses the I2C protocol specifications including start/stop conditions, addressing, read/write operations, and acknowledgements. It then provides details on designing an I2C slave module in Verilog that responds to commands from an I2C master and allows synchronization through clock stretching. The module is simulated in ModelSim and synthesized in Xilinx. Simulation waveforms demonstrate successful read and write operations to the slave device.
Discrete Model of Two Predators competing for One PreyIJMER
This paper investigates the dynamical behavior of a discrete model of one prey two
predator systems. The equilibrium points and their stability are analyzed. Time series plots are obtained
for different sets of parameter values. Also bifurcation diagrams are plotted to show dynamical behavior
of the system in selected range of growth parameter
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Choosing The Best AWS Service For Your Website + API.pptx
A Novel Framework for Securing Medical Records in Cloud Computing
1. www.ijmer.com
International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2695-2697
ISSN: 2249-6645
A Novel Framework for Securing Medical Records in
Cloud Computing
Md. Irfan1, Sayeed Yasin2
1
M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India.
Asst. Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India.
2
ABSTRACT: The patient health records are maintained in a data server under the cloud computing environment. A novel
framework of secure sharing of personal health records (PHRs) under distributed environment in the cloud computing has
been proposed in this paper .Public and personal access models are designed with privacy and security enabled mechanism.
This framework addresses the unique challenges brought by multiple medical records owners and users, in that the
complexity of key management is greatly reduced while guaranteeing the privacy compared with previous works. The
attribute-based encryption (ABE) model is enhanced to support distributed ABE operations with MA-ABE. The system is
improved to support the dynamic policy management model. Thus, PHRs are maintained with security and privacy. It is a
server choice based security model and possess the central key management with attribute authorities.
Keywords: Cloud computing, Data privacy, Encryption, PHR.
I.
INTRODUCTION
Cloud computing is an emerging computing technology where applications and all the services are provided
through Internet. It is a model for enabling on-demand network access to various pool resources. Cloud computing can be
considered as a computing framework with greater flexibility and availability at lower cost [1]. Because of these
characteristics, cloud environment has been receiving a great nowadays. Cloud computing environment services benefit from
economies of scale achieved through versatile use of resources, specialization, and other efficiencies. The Internet has grown
into a world of its own, and its large space now offers capabilities that could support Physicians in their duties in numerous
ways. Nowadays software functions have moved from the individual user’s local hardware to a central server that operates
from a remote location. In recent years, is an emerging trend and medical records is a patient-centric model of health
information exchange and management. A health record is an electronic record of an individual user’s health information by
which the individual controls access to the information and may have the ability to manage, track, and participate in her own
health care.
Generally, medical record service allows a user to create, manage, and control her personal health data in one place
through the web, which has made the storage, retrieval, and sharing of the medical information more efficient. The general
principles of the security rule include that a covered entity must maintain both “reasonable and appropriate” administrative,
technical, and physical safeguards to protect Electronic Personal Health Information, e-PHI [2], which include requirements
to ensure integrity, confidentiality and availability of information; anticipation and protection against possible vulnerabilities
to the privacy of the information or against inappropriate use; and compliance by the entity’s workforce. Generally
information is recorded on secured systems, hard drives, backups, flash drives, shared folders, professional networks etc. As
health care professionals, physicians know that ensuring the accuracy of secret information involves more technical
approaches, to avoid the security pitfalls. Privacy laws that speak to the protection of patients secrecy are complex and often
difficult to understand in the context of an ever-growing cloud-based technology[3]. Due to the high cost of building and
maintaining specialized data centers, many medical record services are outsourced to or provided by third-party service
providers, for example, Samedi, Microsoft HealthVault and Medicine Brain. While it is exciting to have convenient medical
record services for everyone, there are many security and privacy risks which could impede its wide adoption[4].
II.
RELATED WORK
For access control of the outsourced data, partially trusted servers are often assumed. With cryptographic methods,
the aim is trying to enforce who has (read) access to which parts of a patient’s PHR documents in a fine-grained way.
Symmetric key methods are a class of algorithms for cryptography that use the same cryptographic keys for both encryption
of plaintext and decryption of ciphertext. The keys may be identical to each other or there may be a simple transformation to
go between the two keys. The keys, in practice, represent a shared secret key between two or more parties that can be used to
maintain a private information link. In [5], the authors proposed a solution for securing outsourced data on semi-trusted
servers based on symmetric key derivation methods, which can achieve fine-grained access control. Unfortunately, the
complexities of file creation and user grant or revocation operations are linear to the number of authorized users, which is
less scalable.
Public key cryptosystems(PKC) based solutions were proposed due to its ability to separate write and read
privileges. To realize fine-grained access control, the traditional public key encryption (PKE) based methods proposed by the
authors in [6] in their work “Patient controlled encryption: ensuring privacy of electronic medical records, they purpose the
solution scenario and shows how both public and symmetric based encryption used. The disadvantage of their solution is
either incurs high key management overhead, or require encrypting multiple copies of a file using different users’ keys.
www.ijmer.com
2695 | Page
2. www.ijmer.com
International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2695-2697
ISSN: 2249-6645
A number of works used ABE to realize fine-grained access control for the outsourced data, especially, there has
been an increasing interest in applying ABE to secure electronic healthcare records (EHRs). In [7], the authors proposed an
attribute-based infrastructure for EHR systems, where each patient’s EHR files are encrypted using a broadcast variant of
Cipher Text-ABE (CP-ABE). However, the encrypted text length grows linearly with the number of unrevoked users. In [8],
the authors applied ciphertext policy ABE (CP-ABE) to manage the sharing of PHRs, and introduced the concept of
social/professional domains but they do not use multi-authority ABE . In [9], the authors investigated using ABE to generate
self-protecting EMRs, which can either be stored on cloud servers or mobile phones so that EMR could be accessed when
the health provider is offline.
III.
PROPOSED WORK
A. Patient Centric Framework
The main aim of our framework (Figure 1) is to provide secure patient-centric medical record access and efficient
key management at the same time. The key idea is to divide the system into several security domains (namely, public
domains (PUDs) and personal domains (PSDs)) according to the different users’ data access requirements. The PUDs consist
of users who make access based on their professional roles, such as nurses, doctors and medical researchers. In practice, a
PUD can be mapped to an independent sector in the society, such as the government, health care or insurance sector. For
each PSD, its users are personally associated with the data owner (such as family members or close friends), and they make
accesses to medical records based on access rights assigned by the owner. In both types of the security domains, we utilize
ABE to realize cryptographically enforced, patient-centric PHR access.
Each data owner or patient is a trusted authority of her own PSD, who uses a KP-ABE system to manage the secret
keys and access rights of users in her PSD. In our framework, there are multiple owners, multiple SDs, multiple AAs, and
multiple users. In addition, two ABE systems are involved: for each PSD the YWRL’s revocable KP-ABE scheme is
adopted; for each PUD, our proposed revocable MA-ABE scheme is used.
Figure 1: Proposed Framework
B. System setup and Key Distribution
The system first defines a common universe of data attributes shared by every domain, such as “basic profile”,
“medical history”, “allergies”, and “prescriptions”. An emergency attribute is also defined for the break glass access. There
are two ways for distributing shared secret keys. First, when first using the health record service, a PHR owner can specify
the access privilege of a data reader in her PSD, and let her application generate and distribute corresponding key to the
latter, in a way resembling invitations in GoogleDoc. Second, a reader in domain could obtain the secret key by sending a
request (indicating which types of files she wants to access) to the record owner via HSN, and the owner will grant her a
subset of requested data types. In addition, the data attributes can be organized in a hierarchical manner for efficient policy
generation as shown in figure 2. When the user is granted all the file types under a category, his/ her access privilege will be
represented by that category instead.
In practice, there exist multiple Attribute authorities (AAs) each governing a different subset of role attributes. For
instance, hospital staffs shall have a different authorities from pharmacy specialists. This is reflected by (1) in Figure 1. In
addition, the authorities distribute write keys that permit contributors in their PUD to write to some patients’ PHR ((2)).
www.ijmer.com
2696 | Page
3. www.ijmer.com
International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2695-2697
ISSN: 2249-6645
Figure 2: The attribute hierarchy of files
C. PHR Encryption and Access
The owners upload ABE-encrypted record files to the server ((3)). Each owner’s record file is encrypted both under
a certain fine- grained and role-based access policy for users from the PUD to access, and under a selected set of data
attributes that allows access from users in the PSD. The data contributors will be granted write access to someone’s records,
if they present proper write keys ((4)). The data readers download record files from the server, and they can decrypt the files
only if they have suitable attributebased keys ((5)).
D. Break Glass
When an emergency occurs, the regular access policies may no longer be applicable. To handle this situation, a
method called break- glass access is needed to access the victim’s PHR. In our framework, each owner’s records access right
is also delegated to an emergency department (ED, (6)). To prevent from abuse of break- glass option, the emergency staff
needs to contact the department to verify her identity and the emergency situation, and obtain temporary read keys ((7)).
E. User Revocation
Here we consider revocation of a data reader or his attributes or access privileges. There are several possible cases:
1) revocation of one or more role attributes of a public domain user; 2) revocation of a public domain user which is
equivalent to revoking that entire user’s attributes. These operations are done by the attribute authority that the user belongs
to, where the actual computations can be delegated to the server to improve efficiency ((8)). 3) Revocation of a personal
domain user’s access privileges; 4) revocation of a personal domain user.
IV.
CONCLUSIONS
The personal health record (PHR) systems needs security against attackers and hackers. Scalable and Secure sharing
includes basic securities to protect the confidential information from unauthorized access and loss. This paper proposed the
new approach for existing PHR system for providing more security and privacy using attribute based encryption which plays
an important role because these are unique and not easily hackable. We are reducing key management problem and also we
enhance the privacy guarantee.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
Cong Wang and Kui Ren, Jin Li, “Toward Publicly Auditable Secure Cloud Data Storage Services”, IEEE Network ,pp. 19-24,
July/August 2010.
M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data
access control in multi-owner settings,” in SecureComm’10, Sept. 2010, pp. 89–106.
Zhiguo Wan, Jun‟ e Liu, and Robert H. Deng, “HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access
Control in Cloud Computing”, IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, Pp. 743-754, April 2012.
A. Vetro, H. Sun, P. DaGraca, and T. Poon, “Minimum drift architectures for three-layer scalable DTV decoding,” IEEE Trans.
Consumer Electron., vol. 44, no. 3, pp. 527-536, Aug. 1998.
S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “Over-encryption: management of access control
evolution on outsourced data,” in VLDB ’07, 2007, pp. 123–134.
J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient controlled encryption: ensuring privacy of electronic medical records,” in
CCSW ’09, 2009, pp. 103–114.
S. Narayan, M. Gagn´e, and R. Safavi-Naini, “Privacy preserving ehr system using attribute-based infrastructure,” ser. CCSW ’10,
2010, pp. 47–52.
L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Ciphertext-policy attribute-based threshold decryption with flexible
delegation and revocation of user attributes,” 2009.
A. Akinyele, C.U. Lehmann, M.D. Green, M.W. Pagano, Z.N.J. Peterson, and A.D. Rubin. Self-protecting electronic medical
records using attribute-based encryption on mobile device. Technical report, Cryptology ePrint Archive, Report 2010/565, 2010.
www.ijmer.com
2697 | Page